A MAC (Media Access Control) address is a unique value assigned to a network interface card (NIC, also called network adapter) by the manufacturer to uniquely identify it. This tutorial...
When working as system administrator in the Linux, may be needed to perform network configurations. Before doing this, it can be useful to determine which network interfaces are available in...
Cryptographic hash functions can be used for verifying file integrity. For example, to check that the file has not been altered during transfer over the network. This tutorial explains how...
Certutil is a command line tool that allows to perform various operations related with digital certificates on Windows. Certutil also allows to generate hash of a file such as MD4...
Nmap is a network scanning tool which has various scripts that provide additional functionality. This tutorial shows how to check SSL certificate on server using Nmap.
The ssl-cert script allows...
Applications listen to various network ports. Open ports can pose a security risk because they can be a target by attackers. Recommended to close any unused ports. Nmap supports port...
Nmap supports operating system (OS) detection on a remote host. Detection is based on TCP/IP stack fingerprinting. TCP and UDP packets are sent to the remote host and responses are...
While troubleshooting problems, it can be useful to scan available services and detect their versions on a particular host. This type of scanning can be used to find security holes...
When troubleshooting SSL/TLS handshake issues, it can be useful to check which SSL/TLS ciphers are supported on the server. This tutorial demonstrates how to do that using Nmap.
Nmap has...
Asymmetric cryptography (also known as public key cryptography) is a cryptographic system that uses a public and private key pair. Private key can be used for message signing and public...