Wednesday , August 22 2018
Home / IT Security / Security+ (page 9)

Security+

VPNs and VPN Concentrators

VPNs and VPN Concentrators

VPNs and VPN Concentrators: A virtual private network (VPN) is a private network connection that occurs through a public networks. A private network provides security over an otherwise unsecure environment. VPNs can be used to connect LANs together across the Internet or other public networks. With a VPN, the remote …

Read More »

NIKTO: INTERROGATING WEB SERVERS

NIKTO: INTERROGATING WEB SERVERS

NIKTO: INTERROGATING WEB SERVERS: After running a port scan and discovering a service running on port 80 on port 443, one of the first tools that should be used to evaluate the service is Nikto. Nikto is a web server vulnerability scanner. This tool was written by Chris Sullo and …

Read More »

USING NMAP TO PERFORM AN SYN SCAN

USING NMAP TO PERFORM AN SYN SCAN: The SYN Scan is arguably the most popular Nmap port scan. There are many reasons for its popularity, including the fact that it happens to be the default Nmap scan. If you run the Nmap command without specifying a scan type (using the …

Read More »

Linux Operating System

Linux Operating System: Enter our open source favorite, Linux, which is not a completely foolproof operating system but one with a reputation for being a much more secure player in the OS category than Windows or Apple. As we saw with firewalls, the equipment—or in this case the operating system—is …

Read More »

Tracing the Evolution Cryptography

Tracing the Evolution: As with the ancient Egyptians and Romans, who used secret writing methods to obscure trade or battle information and hunting routes, one of the most widely used applications of cryptography is in the safeguarding of communications between two parties wanting to share information. Guaranteeing that information is …

Read More »

Digital Millennium Copyright Act (DMCA)

Digital Millennium Copyright Act (DMCA): The DMCA is not often considered in a discussion of hacking and the question of information security, but it is relevant. The DMCA was passed in 1998 to implement the World Intellectual Property Organization Copyright Treaty (WIPO Copyright Treaty). The WIPO Treaty requires treaty parties …

Read More »

Ethics and The Law

Ethics and The Law: As an ethical hacker, you need to be aware of the law and how it affects what you do. Ignorance or lack of understanding of the law not only is a bad idea but can quickly put you out of business—or even in prison. In fact, …

Read More »

Understanding Hashing

Understanding Hashing Simply yet, hashing can be considered a type of one-way encryption. Most accurately, it is a process that creates a scrambled output that cannot be reversed—or at least cannot be reversed easily. The process of hashing takes plain text and transforms it into cipher text but does so …

Read More »