Recently Updated Pages
Discovery Protocols
An enumeration of some common host discovery protocols. Cisco Discovery Protocol Used in all Ci...
Application Header
aliases: AH A core protocol of IPSec. AH performs a cryptographic hash on the whole pa...
Encapsulating Security Payload
aliases: ESP A core protocol of IPsec. ESP is used to encrypt only the payload, and do...
Temporal Key Integrity Protocol
A security protocol designed to enhance the security of WEP without introducing breaking changes.
Screened Subnet
A network segment that's isolated from the rest of a private network by one or more firewalls tha...
Block Ciphers
A symmetric encryption algorithm that encrypts data in set chunks, with varying chunk sizes. Com...
Stream Ciphers
A symmetric encryption method that encrypts data one bit at a time. The stream cipher is based o...
Digital Signature Algorithm
A more modern asymmetric encryption algorithm.
Transport Layer Security
An authentication and encryption service for the TCP/IP stack. Developed from the now obsolete SS...
Diffie-Hellman
An asymmetric encryption algorithm created to let two users that are stranger to each other to sa...
Elliptic Curve Cryptography
A more modern asymmetric encryption algorithm. ECC is able to generate smaller keys and is more ...
Rivest-Shamir-Adleman
A commonly used asymmetric encryption algorithm used for creating digital signatures.
Overview of Cryptography
The process of writing or solving messages using a secret code. This would be the proper definit...
Hardware
A reference to the physical devices and circuits that make up the different parts of a computer s...
1.1.7 Internal Components of a PC
Component List Power Supply Central Processing Unit (CPU) Heatsink Motherboard Memory Modules | ...
9.3.1 Data Transmission Encryption
Learn what network protocols to use to protect data being transmitted over the internet. An attac...
9.1.2 Common Windows File Locations
Learn common file locations that are used in Windows-based systems.o Name Purpose Location ...
8.6.1 System Backups
Learn about backups and how and when to perform them. A backup is an archived copy of data you ca...
Malware
Software that serves a malicious purpose, typically installed without the user's consent (or know...
Social Engineering
Use Loki's tactics to convince unsuspecting users to provide sensitive data or to violate securit...