Useful tips for everyday
How are client and server certificates signed in OpenSSL? These client and server certificates will be signed using CA key and CA certificate bundle which…
Should I use DMZ host? A true DMZ is basically a section of your network that is exposed to the internet but do not connect…
Is AWS exam tough? AWS Associate-level exams are tough because they cover a LOT of ground. Test takers who fail once (or twice) report questions…
How many rounds are in MD5? 4 rounds Both compression functions are organised into rounds of 16 steps each. MD4 has three such rounds, while…
What is spoofing sniffing? Sniffing is a passive security attack in which a machine separated from the intended destination reads data on a network. IP…
Can you trace an unknown email? An anonymous email address done right hides your true identity. From sender name to the IP address and metadata,…
What do you do when you get a phishing text? How To Report Phishing If you got a phishing email, forward it to the Anti-Phishing…
What are the precautions undertake to prevent web application vulnerabilities? Avoid unnecessarily restricting input size. If you allow more characters, there are fewer chances for…
How are server-sent events implemented? SSE is based on something called Server-Sent DOM Events, which was first implemented in Opera 9. The idea is simple:…
What is the difference between weak and strong collision resistance? Even though they seem similar, there is a subtle difference between strong and weak collision…