SSH

Home/Tag:SSH

What is John the Ripper and How Does it Work?

2021-01-26T12:13:56+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , , , , , , , , |

John the Ripper is a free password cracking software tool. It was designed to test password strength, brute-force encrypted (hashed) passwords, and crack passwords via dictionary attacks. John the Ripper is a part of the Rapid7 family of penetration testing/ hacking tools. Also, John is already installed on Kali Linux. First, we advocate for ethical [...]

TCP/UDP Ports

2020-09-24T07:17:33+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , |

This post is dedicated to TCP/UDP ports. But what's port? In computer networking, a port is a communication endpoint. A computer port is a type of electronic, software (or programming) related docking point through which information flows from a program on your computer or to your computer from the Internet or another computer in a [...]

Securely Transfer Files

2020-09-24T06:45:04+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , |

We, as individuals or organizations, often need to securely transfer files over the Internet to another person or organization on the Internet. In this post, we will try to get acquainted with the common solutions for this purpose and examine these file transfer methods from a security point of view. Sending a file over the [...]

Go to Top