Thursday , February 21 2019
Home / IT Security / Security+ (page 10)

Security+

Linux Operating System

Linux Operating System: Enter our open source favorite, Linux, which is not a completely foolproof operating system but one with a reputation for being a much more secure player in the OS category than Windows or Apple. As we saw with firewalls, the equipment—or in this case the operating system—is …

Read More »

Tracing the Evolution Cryptography

Tracing the Evolution: As with the ancient Egyptians and Romans, who used secret writing methods to obscure trade or battle information and hunting routes, one of the most widely used applications of cryptography is in the safeguarding of communications between two parties wanting to share information. Guaranteeing that information is …

Read More »

Digital Millennium Copyright Act (DMCA)

Digital Millennium Copyright Act (DMCA): The DMCA is not often considered in a discussion of hacking and the question of information security, but it is relevant. The DMCA was passed in 1998 to implement the World Intellectual Property Organization Copyright Treaty (WIPO Copyright Treaty). The WIPO Treaty requires treaty parties …

Read More »

Ethics and The Law

Ethics and The Law: As an ethical hacker, you need to be aware of the law and how it affects what you do. Ignorance or lack of understanding of the law not only is a bad idea but can quickly put you out of business—or even in prison. In fact, …

Read More »

Understanding Hashing

Understanding Hashing Simply yet, hashing can be considered a type of one-way encryption. Most accurately, it is a process that creates a scrambled output that cannot be reversed—or at least cannot be reversed easily. The process of hashing takes plain text and transforms it into cipher text but does so …

Read More »

Gaining Network Information

Gaining Network Information Via Whois And Nslookup An important step in foot printing is to gain information, where possible, about a target’s network. Fortunately, there are plenty of tools available for this purpose, many of which you may already familiar with. Whois    This utility helps you gain information about a …

Read More »