Tagged: security

0

How To Start and Use Tails Linux Distribution For Privacy, Security and Anonimity?

Tails is a Linux distribution where privacy, anonymity and security are aimed. The full name of the Tails is Amnesic Incognito Lice System. Tails is Debian based distributions which means most of the packages and package management system is derived from Debian. In this tutorial, we will learn how to...

0

What Is A Firewall and How Its Work?

Today Firewall is depicted as the main component of the security and networks. Firewalls provide a lot of different operations and features. In the old days, the firewall was simply used to block or allow some ports and management of the NAT. In these days there are a lot of...

0

HMAC (Hach-based Message Authentication Code) Tutorial

Hash-based Authentication Message Code or HMAC is used to authenticate message with hash functions. Message authentication is important mechanism in cyber security and used to check message authenticity. There are different ways and mechanisms for Message Authentication. Message Message is the data, text, image or whatever else we want to...

0

How To Generate and Configure Htpasswd Password In Linux For Apache and Nginx Server?

Today world is insecure. We have to provide different type of security measures like authentication. In HTTP servers like Apache or Nginx we can use HTTP Basic Authentication. HTTP Basic Authentication is authentication protocol provided by web server. We can use htpasswd tool to create HTTP Basic Authentication Database and...

0

What is chmod 777

chmod 777 is very popular ownership command. 777 simply means give all rights to the all users. chmod 777 generally used to make operations more smoothly because it will remove all ownership related problems. We generally use chmod 777 some error message like below.

All Files and Directories Recursively One of the most...

0

Alignment of Security Function To Strategy, Goals and Mission

Security management policy will contain following security policy related steps; Security Policy Creation Security Policy Implementation Security Policy Enforcement every organization have some strategy, goals, mission and objectives. Security management planning will align security function with these. While creating a security plan there are things we should be aware and...

0

Introduction To Certified Information System Security Professional (CISSP)

There are a lot of security certifications in the IT sector. But only some of them are very prestigious and popular. Perhaps the most known and most respected security certificate is Certified Information System Security Professional (CISSP) certification. In this post we will get generally information about certification steps, topics,...

0

How To Download and Install Kali Security and Penetration Test Linux Distribution?

Kali is a Linux distribution or it is a security and penetration test distribution. It is beyond a Linux distribution and provides a lot of useful, popular and featureful tools to the security professionals. Some of popular tools Kali provides nmap metasploit burp sqlmap masscan nikto … Download Kali We...

1

What Is Windows Sysinternal?

Windows experts named Mark Russinovich and Bryce Cogswell have started writing simple but useful tools in 1996. They are provided these tool in those books related with Windows system internals. These tools became popular and released by them. They can be downloaded from a lot of alternative locations but their...

Enjoy this blog? Please spread the word :)