What is authentication?
Authentication is the process of verifying identity. It requires using passwords, hardware tokens, or several other methods. In cyber security, authentication is verifying someone’s or something’s identity. Authentication usually occurs…
What is SSO? | How single sign-on works
Single sign-on (SSO) is a vital cloud security technology that reduces all user application logins to one login for greater security and convenience. What is single sign-on (SSO)? Single sign-on…
Cryptography Definition
Cryptography studies secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The term is derived from the Greek word “kryptos”, which…
How to Install and Use Gdu Disk Usage Analyzer on Ubuntu 20.04
GDU Disk Usage Analyzer is a graphical disk usage analyzer for GNOME. It was part of gnome-utils but was split off for GNOME 3.4. It was originally named Baobab after…
Beginning with Nessus on Kali Linux
Kali Linux, a Linux distribution designed specifically for penetration testing, comes prepackaged with many pen test tools. NessusĀ® provides a penetration tester with a wealth of capabilities that will assist…
Common Network tools – ping, telnet, netstat and arp
ping (Packet Internet Gropper) The Ping command allows a user to ping another network IP address. Ping command sends ICMP ECHO_REQUEST packets to other hosts, and this command can help…