Networking Basics
A network is simply a way for machines/computers to communicate.
At the physical level, it consists of all the machines you want to connect...
Introduction To Cyber Security
Introduction
Cybersecurity is the protection of Internet-connected systems, including hardware, software, and data from cyber-attacks. It can be made up of two words one...
Firewall Implementation
Administrators must be able to evaluate implementation issues to achieve a successful security solution for their systems. Understanding the type of firewall means knowing how the firewall...
Components, Processes, and Implementation of IDS
Regardless of what IDS you select, they all have certain components in common. It is important to have a general understanding of these components.
The History of Encryption
Encrypting communications is a very old idea. People have found the need to send private communications for most of the history of civilization. The need for privacy...
OWASP Top 10 Web Application Vulnerability 2020
1. Injection
Injection flaws occur when untrusted data sent to an interpreter through a form input or some other data submission to a web...
Introduction to VPN
Virtual Private Networks (VPNs) are a common way to connect remotely to a network in a secure fashion. A VPN creates a private network connection over the...
Common Examples of Social Engineering
Let us try to understand the concept of Social Engineering attacks through some examples.
Example 1
You must have noticed old company documents being thrown into dustbins as garbage. These documents...
Windows Firewalls
Windows first started shipping a primitive firewall, called Internet Connection Firewall (ICF), with Windows 2000. It was very simple. Each version of Windows since then has expanded...
Intrusion Detection System (IDS) Concepts
There are six basic approaches to intrusion-detection and prevention. Some of these methods are implemented in various software packages, and others are simply strategies that an organisation...