GnuPG {PGP Keys}

  Index Introduction GnuPG OpenPGP Installation Use Encryption with phrase Generating Keys Adding More Information to the Keys Managing Keychain Exporting / Importing Keys Exporting Importing Encrypting files with keys Decrypting files with keys Using Servers Sending Keys Downloading Keys Conclusion References Introduction Gnu Privacy Guard [0] (or GnuPG, or further reduced GPG) is an…Read more GnuPG {PGP Keys}

Auditing and creating vulnerability analysis report with Nessus

  Nessus is one of the best tools to do vulnerability assessment, due to present an interactive interface and be able to generate and robust reporting. We will bring here how to install it, and how to make a vulnerability assessment (scanning) on ​​the target, showing some of its features such as report generation. Entering…Read more Auditing and creating vulnerability analysis report with Nessus

What’s Worse: APTs or Spear Phishing?

In this article, we are going to look into advance persistent threat (APT) and spear phishing, the role of spear phishing in APT attacks, the level of difficulty to perform APT attacks or spear phishing attacks, and, last but not least, the comparison of damage caused by an APT attackand spear phishing. But, before we…Read more What’s Worse: APTs or Spear Phishing?

How Can We Protect Our Website By Common Web Attacks

  How Can We Protect Our Website By Common Web Attacks ? On this post i am telling about five types of common web attacks, which are used in most types of defacements or dumps of databases. Following five exploits are listed SQL injection, XSS, RCE, RFI, and LFI. Most of the time, we missed…Read more How Can We Protect Our Website By Common Web Attacks


Introduce: Personal software firewalls * Personal firewalls are applications that protect an individual computer from unwanted Internet traffic. Exampls: windows firewall, zone-alarm, ipfirewall (Mac OS). Personal firewall: + promp the user for permission to enable particular applications to access the Internet. + have the capability to detect intrusion to a computer an block that intrusion.…Read more SECURITY BASICS PART 3


Localized Authentication Technologies There are several types of technologies for authenticating a user to a local area network. Examples that are software-based include LDAP and Kerberos, whereas an example that includes physical characteristics would be 802.1X. Keep in mind that there is a gray area between localized and remote authentication technologies. I’ve placed each technology…Read more SECURITY BASICS PART 2