The purpose of any cryptography is to ensure the confidentiality, authenticity, non-repudiation and integrity of the data. And all these goals are achieved with the use of cryptography keys. The 128 bit key is such a type of key that ensure all the intended objectives of using a crypto-system or cryptographic algorithm.it is the key which needs to be secret in order to keep … [Read more...] about What is 128 Bit Encryption?Why the Length is Important?
What is VPN and How it Works?
By reading this post you can learn about VPN and its workings. VPN is just a term we use to describe a system which makes communication between two computers, regardless of how far they are, within a secure channel. Here the secure channel means you can convert the public network secure. As you know that a public network is nothing but the Internet, where can have access to any … [Read more...] about What is VPN and How it Works?
Firefox Security Settings and Features
There are certain security issues that would help you keep your browsing experience smooth and safe with Firefox.As you know that web browser work as a middle man between you and the webpages. When you request for a webpage from your computer by typing a web address (URL), all the underline works such as grabbing the pages and displaying it to you in human readable format is … [Read more...] about Firefox Security Settings and Features
PIX Firewall Configuration Basics
This post intends to familiarize you with some of the basics skills that you need to configure a PIX firewall. The configuration commands will help you to assign name to a PIX interface to configure routing and to configure network address translation including PAT(port address translation). To erase configuration: write erase To save configuration: write terminal … [Read more...] about PIX Firewall Configuration Basics
How to Configure VPN,RAS and IPSec Policy in Windows Server
VPN is a trusted and secure network, which use tunneling and protocol(PPTP,L2TPIPSec) to make data transmission through the public network. RAS: remote access service used to access server remotely from client terminal using dial-up connection. IAS:Internet authentication service is used to remotely and centrally manage all RAS server and keep remote access policy … [Read more...] about How to Configure VPN,RAS and IPSec Policy in Windows Server
Windows DNS Server Configuration
DNS or domain name system is one of the most important parts of client-server model. Without a DNS no client could be part of a domain and there will be no way you can convert domain name into the IP address of the server. In this post you will find basic procedures that you can use to configure DNS for your domain controller. Though the procedures described in this post is … [Read more...] about Windows DNS Server Configuration
Exchange Server 2003 Tutorial
Exchange server 2003 installation process: Before installing exchange server on windows server you need to have installed the following Windows components: ASP.NET IIS SMTP NNTP WWW To install the above mentioned components you need to insert your Windows server CD in your CD or DVD drive and then select those components from the add remove components … [Read more...] about Exchange Server 2003 Tutorial
7 Different Types of Firewalls
There are several types of firewalls that work on different layers of the OSI model. Depending on the kind of service and security you need for your network, you need to choose the right type of firewall. The following are the list of seven different types firewalls that are widely used for network security. Screened host firewalls Screened subnet firewalls Packet … [Read more...] about 7 Different Types of Firewalls
Laptop Security Devices and Tips
Providing physical security to your laptop is your primary concern if you are a frequent travel or on the move. There are a number of devices and precautions that you can take to secure your laptop and even can get back your laptop if it gets stolen. The following are a list of devices and suggestions the you may consider as a solution to your laptop security. … [Read more...] about Laptop Security Devices and Tips
Host Based IDS vs Network Based IDS
Based on the location in a network, IDS can be categorized into two groups. One is host based IDS and the other is network based IDS. Both have its own advantages and distant ages. Before you decide which IDS suits your network environment the best you need to have a clear concept of both types of IDS. Network based IDS: these types of IDS are strategically positioned in a … [Read more...] about Host Based IDS vs Network Based IDS
Buffer Overflow Protection Tutorial
When you write a simple program, for example, to print user name with greetings. For this program to run you assign character string 38 in the following way Char name (38) Here “name” is the variable name. The above code specifies that you name or users’ input would not be more than 38 characters long because you have already assigned only 38 bit of data into the buffer. … [Read more...] about Buffer Overflow Protection Tutorial