There is a large number of cryptographic hash algorithms out there and it’s not always obvious which one should be used. I’m going to talk about the most popular ones: Md5, Sha1 and Sha2. Md5 Md5 should never be used
What is ARP Cache Poisoning?
Remember that each network interface maintains a table of (IP->MAC) mappings in its ARP cache. The ARP protocol packet has the following structure: There are two types of ARP packets: request and reply. The type is determined by the Operation
Do Government Websites use SSL?
Government in the United States has a long history of serving the citizens of the country in a variety of ways. For decades or even centuries, government has run the postal service, guarded the borders, maintained the military, and regulated
SSL Certificates from Name.com
At name.com they take great care when it comes to helping their customers and clients create and register their domain names and get their websites up and running. This is a web hosting group that is committed to providing the
What is a VPN?
A VPN is an acronym for a Virtual Private Network, in layman’s terms a secure connection from one network to another over the Internet. Establishing a VPN connection creates something called a ‘Tunnel’, which is the secure connection between two
StrongVPN Review
StrongVPN AKA Reliablehosting.com, has set the standard the last couple of decades when it comes to VPN, and internet services. They started business in 1994 in South Lake Tahoe, and have been steadily dominating the VPN market ever since. Not