message

commands

Which of the following commands checks for valid users on an SMTP server?

Which of the following commands checks for valid users on an SMTP server? Option 1 : RCPT Option 2 : CHK Option 3 : VRFY Option 4 : EXPN 1. RCPT The RCPT Commands you tell the mail server who the recipient of your message is by using the RCPT command. you’ll send quite one RCPT command for multiple recipients. The server will respond with a code of 250 to every command. The syntax for …

Which of the following commands checks for valid users on an SMTP server? Read More »

Stegnography Softwares

Steganography Software

Steganography Steganography is that the art of hiding a secret message within a traditional message. this is often wont to transfer some secret message to a different person; with this method, nobody else in between will know the key message you wanted to convey. This art of hiding secret messages has been used for years in real-life communications. Since the evolution of data communication, it’s also been utilized in digital conversations. On a computer, this …

Steganography Software Read More »

Understand-Steganalysis

Understand Steganalysis

Understand Steganalysis is the process of discovering the existence of the hidden information within a cover medium. Steganalysis is the reverse process of steganography. It is one of the attacks on information security in which an attacker, called steganalyst, tries to detect the hidden messages embedded in images, text, audio, and video carrier mediums using steganography. It determines the encoded hidden message, and if possible, it recovers that message. It can detect the message by …

Understand Steganalysis Read More »

ISO-27001-Annex-A.13.2-Information-Transfer

ISO 27001 Annex : A.13.2 Information Transfer

ISO 27001 Annex : A.13.2  Information Transfer Its objective is to maintain the security of information transferred to any external entity and within the organization. A.13.2.1  Information Transfer Policies and Procedures Control- In order to protect the transferees by using all types of communication facilities, official transfer policies, procedures and controls should be developed. Implementation guidance – The following items should be addressed in the procedures and controls required to use communications facilities to transmit …

ISO 27001 Annex : A.13.2 Information Transfer Read More »

dhcp-request-reply-messages

DHCP Request/Reply Messages

DHCP DHCP Request/Reply Messages a device that already has an IP address can use the simple request/reply exchange Message to get other configuration parameters from a DHCP server. When the DHCP client receives a DHCP offer, the client immediately responds by sending back a DHCP request packet. Devices that aren’t using DHCP to accumulate IP addresses can still utilize DHCP’s other configuration capabilities. A client can broadcast a DHCP INFORM message to request that any …

DHCP Request/Reply Messages Read More »

Top-5-Key-Elements-of-an-Information-Security

Top 5 Key Elements of an Information Security

Top 5 Key Elements of an Information Security and its critical elements, including systems and hardware that use, store, and transmit that information. Necessary tools: policy, awareness, training, education, technology etc. IS is the application of measures to ensure the safety and privacy of data by managing its storage and distribution. Information security has both technical and also social implications. Information security system is the process of protecting and securing the data from unauthorized access, …

Top 5 Key Elements of an Information Security Read More »