security – POFTUT

How To Start and Use Tails Linux Distribution For Privacy, Security and Anonimity?

Tails is a Linux distribution where privacy, anonymity, and security are aimed. The full name of the Tails is Amnesic Incognito Lice System. Tails is Debian based distributions which means most of the packages and package management system is derived from Debian. In this tutorial, we will learn how to boot or start Tails with … Read more

What Is A Firewall and How Its Work?

Today Firewall is depicted as the main component of the security and networks. Firewalls provide a lot of different operations and features. In the old days, the firewall was simply used to block or allow some ports and management of the NAT. These days there are a lot of different threats where the firewall is … Read more

HMAC (Hach-based Message Authentication Code) Tutorial

Hash-based Authentication Message Code or HMAC is used to authenticate message with hash functions. Message authentication is important mechanism in cyber security and used to check message authenticity. There are different ways and mechanisms for Message Authentication. Message Message is the data, text, image or whatever else we want to authenticate. Message is checked against … Read more

How To Generate and Configure Htpasswd For Apache?

How To Generate and Configure Htpasswd For Apache?

Today the world is insecure. We have to provide different types of security measures like authentication. In HTTP servers like Apache or Nginx, we can use HTTP Basic Authentication. HTTP Basic Authentication is an authentication protocol provided by the webserver. We can use htpasswd tool to create HTTP Basic Authentication Database and Users. Using application-level … Read more

What is CCNA or Cisco Certified Network Associate?

Cisco is very popular vendor in the IT network field. Cisco provides a lot of different type of solutions from access switch to SDN firewall. Cisco is penetrated to the network device market over the years. This will made a lot of network guys play with Cisco devices. Cisco create CCNX series certification over years. … Read more

What is chmod 777?

What is chmod 777?

chmod 777 is very popular ownership command. 777 simply means give all rights to the all users. chmod 777 generally used to make operations more smoothly because it will remove all ownership related problems. We generally use chmod 777 some error message like below. You don’t have permission to access /bin/ on this server. All Files and Directories Recursively … Read more

Alignment of Security Function To Strategy, Goals and Mission

Security management policy will contain following security policy related steps; Security Policy Creation Security Policy Implementation Security Policy Enforcement every organization have some strategy, goals, mission and objectives. Security management planning will align security function with these. While creating a security plan there are things we should be aware and have limited resources to use. … Read more

Introduction To Certified Information System Security Professional (CISSP)

There are a lot of security certifications in the IT sector. But only some of them are very prestigious and popular. Perhaps the most known and most respected security certificate is Certified Information System Security Professional (CISSP) certification. In this post we will get generally information about certification steps, topics, price etc. Information Systems Security … Read more

How To Download and Install Kali Security and Penetration Test Linux Distribution?

Kali is a Linux distribution or it is a security and penetration test distribution. It is beyond a Linux distribution and provides a lot of useful, popular and featureful tools to the security professionals. Some of popular tools Kali provides nmap metasploit burp sqlmap masscan nikto … Download Kali We should get Kali installation iso … Read more

What Is Windows Sysinternal?

Windows experts named Mark Russinovich and Bryce Cogswell have started writing simple but useful tools in 1996. They are provided these tools in those books related to Windows system internals. These tools became popular and released by them. They can be downloaded from a lot of alternative locations but their official repository is provided below. … Read more