Quantcast
Channel: Magnus K Karlsson
Browsing all 526 articles
Browse latest View live
↧

Block Cipher (Encryption) Cheat Sheet

Block CipherINPUT: a plaintext block and a keyOUTPUT: a ciphertext block of same length A block cipher can be inverted (decrypted) with the keyEven if you know the plaintext and ciphertext it should be...

View Article


check_log

-------------------Introduction-------------------In mine previous blogs I have discussed how to setup the - Server...

View Article


op5

------------------Download OP5------------------op5-monitor-6.2.0.1-20131024.tar.gz[http://www.op5.com/download-op5-monitor/]------------------Query RPM Package------------------Det finns två rpm i...

View Article

SELinux

------------What is SELinux Boolean?------------"Booleans allow parts of SELinux policy to be changed at runtime, without any knowledge of SELinux policy writing. This allows changes, such as allowing...

View Article

Install and Configure Postfix

# yum install postfix mutt# service postfix start# adduser student# su - student$ mutt1. Press m to create a new message.2. In To write student@server1.example.com3. In Subject write something4. In...

View Article


Image may be NSFW.
Clik here to view.

The Kerberos Protocol

Key Concepts"Kerberos uses symmetric-key cryptography to authenticate users to network services" [1]"The Authentication Server maintain a database of principals and their secret keys." [2]"The secret...

View Article

Image may be NSFW.
Clik here to view.

Text Editor and IDE for Python

Text EditorAtom text editor for free, by the guys behind github - https://atom.io/.Sublime text editor for free, but asks you to pay - https://www.sublimetext.com/.Commercial IDEKomodo IDE has great...

View Article

Image may be NSFW.
Clik here to view.

Using Atom Text Editor for Python

In my previous blog Text Editor and IDE for Python I discussed different editors for Python. Here I will use Atom text editor and install plugin for Python.From Atom open Settings and search for plugin...

View Article


Getting Started with JSF 2.2 (Java EE 7) in JBoss EAP 7

IntroductionHere is a simple guide to get started with JSF 2.2 development with JBoss EAP 7.MavenLets start with maven war pom for Java EE 7. See also Minimalistic POM for Java EE 7<?xml...

View Article


Data Breach Fin7 Syndicate Hacks Saks Fifth Avenue and Lord & Taylor Stores

"On March 28, 2018, a notorious hacking JokerStash syndicate, also known as Fin7 announced the latest breach of yet another major corporation, with more than five million stolen payment cards offered...

View Article

Virtual Celebrities.

"Gorgeous, popular, sought-after by brands... but these models on Instagram aren't real. They're digitally created. And to a lot of people, that doesn't matter at...

View Article

15-Year-old Finds Flaw in Ledger Crypto Wallet

"A 15-year-old security researcher has discovered a serious flaw in cryptocurrency hardware wallets made by Ledger, a French company whose popular products are designed to physically safeguard public...

View Article

How to See the Used Cipher in IE, Chrome and Firefox

How to identify the Cipher used by an HTTPS Connectionhttps://helpcenter.gsx.com/hc/en-us/articles/207831828-How-to-identify-the-Cipher-used-by-an-HTTPS-Connection

View Article


Getting Started with Elasticsearch, Kibana, X-Pack and SSL/TLS

Introduction ElasticsearchWhy Elasticsearch? "Elasticsearch is a Near Realtime (NRT) search platform." [1]Elasticsearch stores only JSON Object (Document). A JSON Object is built up by name and value...

View Article

Big Vulnerability hits 7-Zip file archiver

"If you use, you can and should download v18.05 of the popular 7-Zip file archiver. The free to use WinZip replacement has a very critical vulnerability for which all it needed was a specially prepped...

View Article


Eight new Spectre Variant Vulnerabilities for Intel Discovered - four of them...

"News has just started spreading that researchers have sighted another eight Spectre like vulnerabilities in Intel processors, all resemble Spectre, four of them are critical. The new vulnerabilities...

View Article

How to Create a Certificate Signature Request (CSR) in Java

import java.io.ByteArrayOutputStream;import java.io.PrintStream;import java.security.KeyPair;import java.security.KeyPairGenerator;import java.security.PrivateKey;import java.security.PublicKey;import...

View Article


How to Create a X509 Certificate in Java without BouncyCastle?

IntroductionThe Java Keytool project has most of the code to create x509 certificates in java, but it has dependency to sun class, which are deprecated, which means that they can change. So be...

View Article

How to Read PEM or DER Encoded Certificate In Java

import java.io.InputStream;import java.math.BigInteger;import java.nio.file.Files;import java.nio.file.Paths;import java.security.KeyFactory;import java.security.PrivateKey;import...

View Article

How to Read PEM PKCS#1 or PKCS#8 Encoded Private Key In Java

import java.io.InputStream;import java.math.BigInteger;import java.nio.file.Files;import java.nio.file.Paths;import java.security.KeyFactory;import java.security.PrivateKey;import...

View Article
Browsing all 526 articles
Browse latest View live