Category IT

Encryption Concepts for IT

This post tries to summarize the basic concepts of cryptography and encryption that are relevant to information technologies, computer science and cybersecurity. It tries to focus on the basic concepts. Technical details about mathematics, calculations or implementations (like encryption algorithms…

How to install Windows XP

Disclaimer about Windows XP Windows XP is an operating system that is lacking official support from Microsoft since April 8, 2014. IT IS NOT RECOMMENDED TO USE THIS OPERATING SYSTEM ANYMORE. There are multiple known vulnerabilities that exposes your computer…

Cybersecurity Attack Phases

According to EC-Council EC-Council identify in the CEH course 5 hacking phases: Reconnaissance Scanning Gaining Access Maintaining Access Clearing Tracks According to ISACA ISACA identify 8 phases in a cybersecurity generalized attack processs: Perform reconnaissance Create attack tools Deliver malicious…