NetBIOS
Network Basic Input/Output System (NetBIOS) is a protocol of OSI session layer 5. It provides a NetBIOS name to each computer, in addition to the already existing IP address from OSI network layer 3. Nowadays, NetBIOS runs over TCP The…
Network Basic Input/Output System (NetBIOS) is a protocol of OSI session layer 5. It provides a NetBIOS name to each computer, in addition to the already existing IP address from OSI network layer 3. Nowadays, NetBIOS runs over TCP The…
This post lists cryptoanalysis tools. List of Cryptanalysis Tools List of Cryptanalysis tools: CrypTool CryptoBench Cryptol Ganzúa EverCrack AlphaPeeler Mediggo subCipher The most popular is CrypTool. CrypTool CrypTool is free and open source (FOSS). CryptoBench CryptoBench Cryptol …
This post lists disk encryption tools. VeraCrypt Symantec Drive Encryption BitLocker Drive Encryption Gilisoft Full Disk Encryption Endpoint Full Disk Encryption Dell Data Protection | Encryption AxCrypt Folder Lock Full Disk Encryption Software SafeGuard Encryption Alertsec DriveCrypt ShareCrypt PocketCrypt DriveCrypt…
This post lists some cloud security tools List of Cloud Security Tools Cloud Security Tools featured on this post: ScoutSuite ScoutSuite is developed by Spanish company NCC Group. It is free and open source (FOSS) under a GPL-2.0 license. It…
This post features some SSH Tunneling Tools. List of SSH Tunneling Tools List of SSH Tunneling Tools. Bitvise Secure Pipes Bitvise Bitvise SSH Server provides secure remote login capabilities to Windows workstations and servers by encrypting data during transmission.…
This post features HTTP tunneling tools. List of HTTP Tunneling Tools Tools: Among the most popular, there are HTTPTunnel, Super Network Tunnel and HTTPort and HTTHost. HTTPTunnel HTTPTunnel use this technique of tunneling traffic across TCP port 80. HTTPTunnel is…
This post features different types of clouds. This post is part of the introduction to cloud computing. Virtual Private Cloud (VPC) Featured Cloud Deployment Models Cloud Deployment Models: Private Cloud: A private cloud, also known as internal or corporate cloud,…
This post summarizes the types of software licenses. When comparing software licenses, some are more permissive or restrictive than others, indicating that the limitations of use are more expanded or limited. These licenses are introduced on this post in descending…
This post is about summarizing different ways to check if user is admin in Java Use system calls to check if user is admin A Java application can call system command through the class Runnable You can see this post…