TLS

Home/Tag: TLS

VPN

2020-09-02T05:35:40+00:00Categories: Computer & Network Concepts|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. In other words, A Virtual Private Network is a connection method used to add security and privacy [...]

Wireshark

2020-09-24T11:37:32+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , |

Wireshark is a network packet analyzer. This software one of the best packet analyzers available today and is available for free, and it is open source. This software, formerly known as Ethereal but the project was renamed Wireshark in May 2006 due to trademark issues. Sources: wireshark.org   and  en.wikipedia.org Wireshark is cross-platform and it runs [...]

SSL and TLS

2020-09-24T11:41:19+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , |

In this post, we'll take a look at SSL protocol and TLS protocol to help you understand the different aspects of these protocols. One of the most important topics in Cyber-security course is web secure.     What’s SSL?  SSL (Secure Sockets Layer) is a protocol for establishing authenticated and encrypted links between networked computers. [...]

E-mail Encryption

2020-07-13T11:49:23+00:00Categories: Network Security|Tags: , , , , , |

E-mail encryption is one of the most important aspects of security in organizational networks, personal use, and the Internet. By default, email messages are not secure. They are sent across the Internet in plain text. Hackers who gain unauthorized access to an email account can access attachments, content, and even hijack your entire email account. [...]

Go to Top