-
Period: to
cyber
-
MARK_FileHashingExercise
Changing the hashes -
HashingAlgorithmResearch
types of hashes
purpose of hashes -
Mark_Quiz_1
type of hackers
dealing with hackers -
Mark_Quiz_2
security devices
key encryption
technologies -
Mark_Quiz_3
-
Thoughts on Kevin Mitnick interview (key points on Word)
-
Symmetric/Asymmetric Examples
-
1st Cipher Chart from lesson practical
-
Google Data Centre / Security Key
-
1st PKA Lab - Creating a Cyber World
-
configure the FTP server
The File Transfer Protocol ( FTP) is a standard network protocol used for the transfer of computer file between a client and server on a computer network. -
configure the web server
A web server is computer software and underlying hardware that accepts requests via HTTP, the network protocol created to distribute web pages, or its secure variant HTTPS. -
configure the email server
An email server, or simply mail server, is an application or computer in a network whose sole purpose is to act as a virtual post office. -
configure the DNS server
The Domain Name System ( DNS) is the phonebook of the Internet. -
configure the NTP server
Local (aka internal) NTP servers are those you own yourself and install in your premises, establishing a physical network connection between your servers and clients. -
configure the AAA server
An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization, and accounting (AAA) services.