In this post I will discuss about Trojans that What are Trojans, How do trojan work, And How does trojan affect or devices. So let’s start –
In this post, I will describe the open-source vulnerability scanning and network scanning tool that is NMAP. The full-form of NMAP is network-Mapper. NMAP is a very popular tool. Because this tool is free and open-source and used world-widely to find any vulnerability in any system or to scan a network. We can gather much important information from this tool like operating system detection, host scanning, open ports, any security risk, and much more.
In this post, we will ‘How are the public and private keys generated?‘ Here you will learn about asymmetric cryptography. Besides this, you will also learn about the ways of encryption and decryption of a text file in different ways by using public and private keys along with, the usage of private keys with the passphrase and without the passphrase. But first of all, we must basic info about asymmetric cryptography. As you want to become a cyberman so you must have full knowledge of cryptography. Because it is the most important requirement of cybersecurity. It is also essential for the purpose of security. So we must have proper knowledge about cryptography. Continue reading “How are the public and private keys Generated? Encryption and Decryption of the file using Asymmetric Cryptography.”