Many Java application server use a keystore as a repository of their certificates and in general all Java applications use the one supplied with the JDK itself, Let’s see what is it and how to work with it. A keystore is a repository of security certificates, that can hold your keys and certificates and encrypt […]
Other cli uses of Openssl
After my previous article 7 Practical uses of Openssl I have received many comments and suggestions of other possible uses of this excellent program. With this article, i’ll show you other uses of the openssl command used from the command line.
Introduction to snort
Installing and using SNORT on Ubuntu Author: Mike Walton Snort is a very powerful IDS that in later versions can act like an IPS. Snort is free to download and use in the personal enviornment as was as in the business environment. In fact Snort is used by many Enterprises as a very effective option for […]
Cryptography and digital sign with GnuPG 2
Original article by Maurizio Antonelli In the previous article we presented some basic concepts of encryption and made some examples of symmetrical and asymmetrical keys, we concluded by saying that a good way to get a certificate with an asymmetric key is GnuPG. GnuPG is open-source and multiplatform. It uses native command line in a […]
Nmap the port scanner
Last article of my series on tools for network analysis, after wireshark, ntop and a fine assortment of tools to use with the command line is the time to see nmap. Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find […]