security – POFTUT

Tagged: security

0

How To Start and Use Tails Linux Distribution For Privacy, Security and Anonimity?

Tails is a Linux distribution where privacy, anonymity and security are aimed. The full name of the Tails is Amnesic Incognito Lice System. Tails is Debian based distributions which means most of the packages and package management system is derived from Debian. In this tutorial, we will learn how to boot or start Tails with different configurations and security metrics. Download Tails ISO or USB Image Tails OS is mainly...

0

What Is A Firewall and How Its Work?

Today Firewall is depicted as the main component of the security and networks. Firewalls provide a lot of different operations and features. In the old days, the firewall was simply used to block or allow some ports and management of the NAT. In these days there are a lot of different threats where the firewall is used to detect and stop these threats. Firewall Features Today modern firewall’s provides a...

0

HMAC (Hach-based Message Authentication Code) Tutorial

Hash-based Authentication Message Code or HMAC is used to authenticate message with hash functions. Message authentication is important mechanism in cyber security and used to check message authenticity. There are different ways and mechanisms for Message Authentication. Message Message is the data, text, image or whatever else we want to authenticate. Message is checked against it authenticity with given key by hashing them. Key Key is used to known by...

0

How To Generate and Configure Htpasswd Password In Linux For Apache and Nginx Server?

Today world is insecure. We have to provide different type of security measures like authentication. In HTTP servers like Apache or Nginx we can use HTTP Basic Authentication. HTTP Basic Authentication is authentication protocol provided by web server. We can use htpasswd tool to create HTTP Basic Authentication Database and Users. Using application level authentication is better solution by the way. Install Htpasswd Tool htpasswd is provided by Apache Utils...

0

What is CCNA or Cisco Certified Network Associate?

Cisco is very popular vendor in the IT network field. Cisco provides a lot of different type of solutions from access switch to SDN firewall. Cisco is penetrated to the network device market over the years. This will made a lot of network guys play with Cisco devices. Cisco create CCNX series certification over years. Here X may mean Associate, Professional. There is also CCIE certification which is one of...

0

What is chmod 777

chmod 777 is very popular ownership command. 777 simply means give all rights to the all users. chmod 777 generally used to make operations more smoothly because it will remove all ownership related problems. We generally use chmod 777 some error message like below.

All Files and Directories Recursively One of the most popular use case for chmod 777 is changing given directory and child directories permission recursively. We can use -R option for this....

0

Alignment of Security Function To Strategy, Goals and Mission

Security management policy will contain following security policy related steps; Security Policy Creation Security Policy Implementation Security Policy Enforcement every organization have some strategy, goals, mission and objectives. Security management planning will align security function with these. While creating a security plan there are things we should be aware and have limited resources to use. Restrictions We will have mainly following restrictions while planning security. Budget Personnel Requirements Organization Culture...

0

Introduction To Certified Information System Security Professional (CISSP)

There are a lot of security certifications in the IT sector. But only some of them are very prestigious and popular. Perhaps the most known and most respected security certificate is Certified Information System Security Professional (CISSP) certification. In this post we will get generally information about certification steps, topics, price etc. Information Systems Security Certification Consortium (ISC) CISSP exam is governed by ISC. ISC is global non-profit organization. ISC...

0

How To Download and Install Kali Security and Penetration Test Linux Distribution?

Kali is a Linux distribution or it is a security and penetration test distribution. It is beyond a Linux distribution and provides a lot of useful, popular and featureful tools to the security professionals. Some of popular tools Kali provides nmap metasploit burp sqlmap masscan nikto … Download Kali We should get Kali installation iso image from internet official Kali site. Light version provides only popular tools which seems to...

1

What Is Windows Sysinternal?

Windows experts named Mark Russinovich and Bryce Cogswell have started writing simple but useful tools in 1996. They are provided these tool in those books related with Windows system internals. These tools became popular and released by them. They can be downloaded from a lot of alternative locations but their official repository is https://technet.microsoft.com/en-us/sysinternals/bb545021.aspx Categories Sysinternals suit provides tools in the following categories. File and Disk Networking Process Security System...

Enjoy this blog? Please spread the word :)