authentication – POFTUT

What Is AAA (Authentication, Authorization, and Accounting)?

What Is AAA (Authentication, Authorization, and Accounting)?

AAA or Authentication, Authorization and Accounting is a term used to describe 3 functions in IT. Mainly AAA is used to control access to different IT resources like network, service, server, etc. AAA simply consists of 3 steps where each completes others for perfect security. What Is Authentication? Authentication is the process of identifying a … Read more

What Is TACACS / XTACACS / TACACS+ (Terminal Access Controller Access Control System)?

What Is TACACS / XTACACS / TACACS+ (Terminal Access Controller Access Control System)?

Terminal Access Controller Access Control System or TACACS is a protocol used for AAA (Authentication, Authorization, and Audit). TACACS is created in 1984 .TACACS is heavily used by the Cisco and Cisco created some extended version of TACACS named XTACACS , TACACS+. TACACS is defined with the IETF RFC 927 in 1984 and then updated … Read more

What Is Radio Frequency Identification or RFID?

Radio Frequency Identification or RFID is a technology used different areas of life. As we guess it uses radio technology in order to operate. RFID can be use d in; Access control, Advertising, Promotion tracking, Intelligent transportation systems, Hose stations, Public transport, Passports, Animal identicication, Human identification, Sport, Barcode … We will look the concepts … Read more

WPS (Wi-Fi Protected Setup) Tutorial With Examples

WPS (Wi-Fi Protected Setup) Tutorial With Examples

Wi-Fi is a league of standards created by the Wi-Fi Alliance. Wi-Fi gives the ability to connect a network without any physical connection or cable. This makes Wi-Fi a very practical, easy, and popular solution for LAN or WAN network connections. Wireless connection ability creates some security problems for the Wi-Fi. In order to prevent … Read more

How To Secure Linux, Unix, Windows Servers and IT Systems?

Servers provide different types of infrastructures to implement different solutions for IT. Security is another issue that must be solved in the IT area. In recent years security became a need. In this tutorial, we will look at how to secure our servers. Patching Operating systems use a lot of internal and external tools and … Read more

What is VPN and VPN Tunnel with Free Vpn List?

Virtual Private Network simply VPN is one of the most known IT terms between people. What is a VPN? Virtual means the network or tunnel we will create is virtual not a physical network. This virtual network is isolated from existing public networks. Private means this network traffic will not know, seen from parts we … Read more

How To Create and Setup SSH Keys For Passwordless and Public Key Based Authentication In Linux?

How To Create and Setup SSH Keys For Passwordless and Public Key Based Authentication In Linux?

Ssh is a protocol designed to make network connections between hosts secure. Ssh is a defacto standard for Linux and related operating systems. Ssh encrypts the connection between sides. Ssh gives terminal access between host and server. To get a terminal there need to be an authentication process. The authentication process is generally password-based but … Read more