Skip to main content


Nmap Cheat Sheet

Nmap is a network mapper that has emerged as one of the most popular, free network discovery tools on the market. Nmap is now one of the core tools used by network administrators to map their networks. The program can be used to find live hosts on a network, perform port scanning, ping sweeps, OS detection, and version detection. Basic Scanning Techniques
Recent posts

Understanding Core Cyber Security Goals and Basic Risk Concepts

 A use case helps professionals identify and clarify requirements to achieve a goal. Confidentiality ensures that data is only viewable by authorized users. Encryption is the best choice to provide confidentiality. Access controls also protect the confidentiality of data. Steganography (hiding data inside other data) is one method of supporting obfuscation by making the hidden data harder to see. Integrity provides assurances that data has not been modified, tampered with, or corrupted through unauthorized or unintended changes. Data can be a message, a file, or data within a database. Hashing is a common method of ensuring integrity. Non-repudiation prevents entities from denying they took an action. 

What is Tailgating Attack?

 A tailgating attack, also referred to as “piggybacking,” involves attackers seeking entry to a restricted area without proper authentication. In it, the perpetrators can simply follow an authorized person into a restricted location. They can impersonate delivery men carrying tons of packages, waiting for an employee to open  the door. They can ask the unknowing target to hold the door, bypassing security measures like electronic access control. Tailgating is a common type of social engineering attack. While they don’t always use computers per se, as in the sample scenario above, they always involve some sort of electronic identification.

Facts About PHP

10 interesting facts about PHP Programming language What stands for PHP? –  Personal Home Page . PHP which is now officially known as ‘Hypertext Preprocessor’ and It was released around the year 1995. PHP was originally made by Rasmus Lerdorf in 1995 . He wrote the original Common Gateway Interface (CGI) binaries. Initially written as a set of Common Gateway Interface (CGI) in ‘C’ (1994). This language was originally designed to replace a set of Perl scripts to maintain his Personal Home Pages (also known as PHP). Zeev Suraski and Andi Gutmans, two developers at the Technion IIT, rewrote the parser in 1997 and formed the base of PHP 3. PHP 3 was officially launched in June 1998. Suraski and Gutmans rewrote the PHP 3’s core, producing the Zend Engine in 1999. They also founded Zend Technologies in Ramat Gan, Israel. On May 22, 2000, PHP 4, powered by the Zend Engine 1.0, was released. For tutorials on PHP just visit tutorials.html The mai

15 Unexpected things about life at university

1.Your friends are all incredibly annoying

Benefits of migrating Workgroup to Active Directory domain

During making decisions about company's infrastructure decision-makers face the problem of managing users and equipment located in various locations. Users possess different knowledge about IT things, mainly adapted to their workplace environment. Software, hardware, operating systems, sometimes means nothing for them. Employees are part of departments that can work together or on the contrary - they should not be part of the team. To prevail on this diversity and to ensure an adequate level of security, Microsoft introduced Active Directory, which catalogs users data, computers, peripherals and allows for easier and automated management. There are many companies which started their work on one or few computers, grew slowly and suddenly bloomed to be businesses with hundreds of users. On the other hand the IT environment was not changed accordingly to company needs. Computers was still the part of working group, being really just a collection of independent unit

Active Directory Certificate Services Overview

Applies To: Windows Server 2008, Windows Server 2008 R2 Active Directory Certificate Services (AD CS) provides customizable services for issuing and managing public key certificates used in software security systems that employ public key technologies. In the following sections, learn more about AD CS, the required and optional features, and hardware and software used for running AD CS. At the end of this topic, learn how to open the management interface for AD CS and how to find more information. Features in AD CS By using Server Manager, you can install the following components of AD CS: Certification authorities (CAs). Root and subordinate CAs are used to issue certificates to users, computers, and services, and to manage certificate validity. CA Web enrollment. Web enrollment allows users to connect to a CA by means of a Web browser in order to request certificates and retrieve certificate revoc