Tag it

How to prepare CISSP Exam

CISSP (Certified Information Systems Security Professional) is a certification granted by the organization ISC2 (International Information System Security Certification Consortium). This post explains how you can prepare the exam to apply for CISSP certification. To find more information about the…

IPv6

IPv6 was developed to substitute IPv4, as it was expected to run out of addresses. IPv6 Characteristics IPv6 is more business-oriented, not defense-oriented like IPv4. It increases the number of nodes. IPv6 supports quality of services natively. IPv6 has a…

How to get OSCP Certification

OSCP (standing from Offensive Security Certified Practitioner) is a certificate issued by American company Offensive Security. It is focused on penetration testing using Linux-based operating system Kali Linux, that is maintained also by Offensive Security. The purpose of this post…

Fingerprint Recognition

Fingerprint recognition needs to steps: Fingerprint registration Fingerprint authentication During fingerprint registration, the fingerprint image(s) are converted into what is called Fingerprints Minutiae Data (FMD). FMD is saved into the database, not the fingerprint image itself. During fingerprint authentication, fingerprint…

Wireshark

      Filters TCP Ports tcp.port Filters the tcp port/s of packets displayed. Example: tcp.port == “21”   HTTP Request Methods http.request.method Possible values: get post Example: http.request.method == “POST”   Contains cookies http.cookie Example: http.cookie   External references…