Safe & Security Articles

Page 6 of 88

How is RSA Algorithm Calculated?

Ginni
Ginni
Updated on 04-Nov-2023 22K+ Views

RSA is a cryptosystem for public-key encryption, and it is broadly used for securing sensitive information, specifically when being sent over an insecure network including the Internet.RSA algorithm is the most popular asymmetric key cryptographic algorithm depends on the mathematical fact that it is simply to discover and multiply large prime numbers but complex to factor their product. It needs both private and public key.Example of RSA AlgorithmLet us take an example of this procedure to learn the concepts. For ease of reading, it can write the example values along with the algorithm steps.Choose two large prime numbers P and ...

Read More

Difference between Private Key and Public Key

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 01-Nov-2023 47K+ Views

Private Keys and Public Keys terms are used in cryptography. These keys are used to encrypt/decrypt sensitive data. Read through this article to find out more about private and public keys and how they are different from each other.What is Private Key?The private key is used in both encryption as well as decryption. This key is shared between the sender and receiver of the encrypted sensitive information. The private key is also called "symmetric" because it is shared by both parties. Private key cryptography is faster than public-key cryptography mechanism.A private key is generally a lengthy, non-guessable sequence of bits ...

Read More

What is the difference between session and cookies?

Kiran Kumar Panigrahi
Kiran Kumar Panigrahi
Updated on 31-Oct-2023 54K+ Views

The data that a user enters into multiple pages of a website can be saved using a combination of cookies and sessions. Cookies and sessions are both vitally important since they record the data that the user has provided for a variety of purposes.Cookies and Sessions are used to store information. Cookies are only stored on the client-side machine, while sessions get stored on the client as well as the server.Read through this article to find out more about cookies and sessions and how they are different from each other.What is a Cookie?Cookies are little text-based files that are kept ...

Read More

How to remove Bing from Chrome?

PranavBhardwaj
PranavBhardwaj
Updated on 25-Oct-2023 19K+ Views

Sometimes you might have noticed that the default search engine of your Chrome browser is automatically changed to Bing. If this is happening without any user intervention, it might be because of malware known as Browser Hijacker. Browser Hijacker takes control of your browser and modifies its settings for conducting malicious activities, including changing the default search engine, homepage, and others. In this post, we would discuss how Bing become your Chrome browser's default search engine and how to remove it from Chrome. What is Bing? Bing is one of the most popular search engines on the internet world. In ...

Read More

What are the principles of Public key Cryptosystem in Information Security?

Ginni
Ginni
Updated on 22-Oct-2023 45K+ Views

Public key cryptography has become an essential means of providing confidentiality, especially through its need of key distribution, where users seeking private connection exchange encryption keys. It also features digital signatures which enable users to sign keys to check their identities. The approach of public key cryptography derivative from an attempt to attack two of the most complex problems related to symmetric encryption. The first issue is that key distribution. Key distribution under symmetric encryption needed such as − that two communicants already shared a key, which somehow has been ...

Read More

What are the substitution techniques in information security?

Ginni
Ginni
Updated on 14-Sep-2023 54K+ Views

Substitution technique is a classical encryption approach where the characters present in the initial message are restored by the other characters or numbers or by symbols. If the plain text (original message) is treated as the string of bits, thus the substitution technique would restore bit pattern of plain text with the bit pattern of cipher text.There are various types of substitution ciphers which are as follows −Monoalphabetic Cipher − In monoalphabetic substitution cipher, a character in a plaintext is always restored or changed to the similar character in the ciphertext indifferent of its position in the text.For instance, if ...

Read More

What is Reverse Engineering Technique in Cybersecurity?

Pranav Bhardwaj
Pranav Bhardwaj
Updated on 11-May-2023 4K+ Views

Reverse engineering aka back engineering is a technique for extracting design knowledge from software, equipment, airplanes, architectural structures, and other items. It is the practice of evaluating a piece of software or hardware's functionalities and information flow in order to comprehend its functioning and behavior. In cyber protection, malware is frequently reverse-engineered.Reverse engineering is a technique used in older industries to improve computer hardware and software. The machine code of a program - the string of 0s and 1s transmitted to the logic processor - is the subject of software reverse engineering. To convert the machine code back to the ...

Read More

Social Engineering Attacks: Common Types and How to Prevent Them

Jui Mondal
Jui Mondal
Updated on 05-May-2023 489 Views

The phrase "social engineering" describes a wide variety of malevolent behaviors that may be carried out through interactions with other people. It employs deception to fool users into failing to take proper security precautions or disclosing private information. There might be several phases to a social engineering attack; before launching an assault, criminal profiles the target to learn details like access points and security flaws. The attacker then takes steps to acquire the victim's trust and provides stimuli for further acts that violate security norms, such as disclosing sensitive information or providing access to key resources. What is a Social ...

Read More

How to Add Antivirus and Spam Protection to Postfix Mail Server with ClamAV and SpamAssassin

Satish Kumar
Satish Kumar
Updated on 27-Apr-2023 3K+ Views

In today's world, email is a crucial tool for communication, both in personal and professional settings. However, it can also be a target for malicious attacks such as viruses and spam. As a result, it is vital to secure your mail server against these threats. One way to do this is by adding antivirus and spam protection to your Postfix mail server with ClamAV and SpamAssassin. In this article, we will guide you through the steps to add ClamAV and SpamAssassin to your Postfix mail server, and show you how to configure them to work together to protect your mail ...

Read More

Security Factors In IoT Devices

Devang Delvadiya
Devang Delvadiya
Updated on 21-Feb-2023 484 Views

The interconnection of physical devices, vehicles, and other things which relate to electronics, software, sensors, and connections that allows these objects to collect and share data is referred to as the Internet of Things (IoT). The Internet of Things (IoT) has altered our way of life and work. Ever since IoT came into our lives, we have had great experiences and easy lives. Hence its security is a factor that cannot be ignored. Major IoT Devices in Use Smart thermostats, security cameras, and home assistants are examples of IoT gadgets that have become standard in our homes and workplaces. As ...

Read More
Showing 51–60 of 875 articles
« Prev 1 4 5 6 7 8 88 Next »
Advertisements