Posts

CrackStation importance in Network system

  CrackStation uses massive pre-computed lookup tables to crack password hashes. These tables store a mapping between the hash of a password, and the correct password for that hash. The hash values are indexed so that it is possible to quickly search the database for a given hash.  If the hash is present in the database, the password can be recovered in a fraction of a second. This only works for "unsalted" hashes. For information on password hashing systems that are not vulnerable to pre-computed lookup tables, see our hashing security page. Crackstation's lookup tables were created by extracting every word from the Wikipedia databases and adding with every password list we could find. We also applied intelligent word mangling (brute force hybrid) to our wordlists to make them much more effective. For MD5 and SHA1 hashes, we have a 190GB, 15-billion-entry lookup table, and for other hashes, we have a 19GB 1.5-billion-entry lookup table. Read more :  lm hash generator

What are the differences of workstations, servers and PC?

    To buy a personal computer, we know that there are desktops, business books, game books, but occasionally have seen workstations. If you are working in the enterprise also know that there are servers. What are the differences of workstations, servers and PC? In essence, whether it is a desktop or a notebook, a game book, a workstation or a server, it can be collectively referred to as a computer. And in the hardware configuration, it is also composed of the chassis, power supply, motherboard, processor, graphics card, memory, hard disk, etc. From the operating system, currently mainly Windows 10, Linux and so on. Therefore, we first understand the difference between these two types of computers from both hardware and software. The other is the demand, that is, the use. You can not buy a server for browsing the web, watching videos. If you are a professional e-sports player, it is impossible to buy a thin business book for playing games. It should be noted that the servers,...

SD- WAN utilities

  Software defined wide area networks (SD-WAN) is a new approach to multisite network connectivity that lowers operational costs and improves resource usage. Currently all the rage in IT, large corporations are buying up established players to integrate as part of their core offerings at an alarming rate. Often buzz words and IT concepts aren’t well explained, but instead assumed understood. Therefore, I’d like to step back in order to explain and explore SD-WAN. Before we get bogged down with terms like QoS, MPLS and packet-based routing, let’s first review some general networking concepts and terms to build off of : A local area network (LAN) is a private collection of devices in a small geographic location (i.e. your office building or home) connected together in a network in order to share resources. A wide area network (WAN) works much the same way, but for devices geographically diverse. In order to ensure private and consistent communication between WAN locations, a leased, ...

What is the purpose of a Windows Workgroup?

 Windows for Workgroups is an extension that allowed users to share their resources and to request those of others without a centralized authentication server. It used the SMB protocol over NetBIOS. The Microsoft Windows family of operating systems supports assigning of computers to named workgroups. Macintosh networks offer a similiar capability through the use of AppleTalk zones. The Open Source software package Samba allows Unix and Linux systems to join existing Windows workgroups. Workgroups are designed for small LANs in homes, schools, and small businesses. A Windows Workgroup, for example, functions best with 15 or fewer computers. As the number of computers in a workgroup grows, workgroup LANs eventually become too difficult to administer and should be replaced with alternative solutions like domains or other client/server approaches. More about :  windows 7 hash

Security management is one of the most overlooked domains

  The first domain I’d like to discuss has more to do with people and processes than it does with computers. Security management is one of the most overlooked domains, which I think is a shame because almost nothing we do in the other domains means anything without it. Security management is made up of several tasks: Risk assessments, which is the process we use to identify risks to the organization and systemically identify methods to combat those risks, usually relying on input from experts in the below domains Overseeing the processes for other security functions to ensure those align with business/operations processes Change management processes and procedures in place User security awareness training find more :  lm security

network portion in IPv4 Subnetting

  During the early stages of the internet, organizations assigned IP addresses like crazy until we nearly ran out. Luckily, the designers of IP addressing came up with a way to end this wasteful practice: Dividing networks using subnetting. The process of taking an extensive network and splitting into smaller networks is known as subnetting — and it’s freeing up more public IPv4 addresses. There are two parts to an IP address: The network portion and the host portion. It’s like the address for a house. The network portion is like the city, state, and zip code. The host portion is like the house and street number. A subnet defines the number of bits, out of 32, used for the “network portion” of the address. Subnet masks can also be defined in a more common ‘slash’ representation, known as CIDR notation. In the following table, the red digits represent the bits used for the network. The black digits will be used for device IP addresses. Note that the 255.0.0.0 mask can also be repres...

Cybersecurity for Modern-day defense

Let’s start by defining defense in depth. To understand defense in depth, picture a castle from medieval times. Think of all the security measures they put in place. First, you had the moat and only a single retractable bridge across it. If you somehow made it across the moat, you had to deal with the wall. So, you made it across the moat and scaled the wall? Now the castle is at the top of the hill, you’re wearing 100 pounds of armor and weaponry, walking uphill, sometimes several miles. Some castles even had interior walls that forced you to take a certain, often very narrow, path. But you have to do all of that while archers are shooting at you, they’re rolling huge boulders down the hill at you, they’ve probably dumped something on the ground to make it slick, the list goes on and on and on. And then, when you finally breach the castle, you have to climb a whole host of stairs, usually fighting (fully rested) enemy soldiers as you go. For this reason, many would-be attackers decide...