GeekPolice Tech TutorialsLog in

 

What is RADIUS Server

What is RADIUS Server


RADIUS was created by Livingston Enterprises to handle dial-in authentication.Then its usage broadened into wireless authentication and VPN authentication. RADIUS is the most popular of all the access control, authentication, and auditing (AAA) servers, including TACACS,TACACS+, and DIAMETER. An RAS must be able to authenticate a user, authorize the authenticated user to perform specified functions, and log (account for) the...

What is AirSnort Attack

What is AirSnort Attack



AirSnort is a tool used to recover encryption keys during the authentication process. AirSnort passively monitors transmissions and recreates the encryption key once it has collected enough packets. For AirSnort to be effective, it must collect between 5 and 10 million packets. Collecting this many packets takes time. In an 8-hour day, the average person produces approximately 250,000 packets.To collect the minimum...

How To Play Video At Low Resolution When On Battery in Windows 10

How To Play Video At Low Resolution When On Battery in Windows 10

You can optimize the battery life based on the quality of the video. If you choose battery life, then the video quality might be compromised. You specifically choose low resolution play option when your PC is running on battery. In this tutorial, we will show you how to do it. Here's how:


1. Press Windows + I keys to open Settings app.

2. Next, click on the Apps to open the Apps...

How To Disable Automatic Processing Of Video When On Battery

How To Disable Automatic Processing Of Video When On Battery

In this tutorial, we will show you how to disable automatic processing of video when on battery. Check it out.


Disable Automatic Processing Of Video When On Battery in Windows 10

1. Press Windows + I keys to open Settings app.

2. Next, click on the Apps to open the Apps...

How To Watch Online Videos In Low Resolution For Saving Network Bandwidth In Windows 10

How To Watch Online Videos In Low Resolution For Saving Network Bandwidth In Windows 10
If you have constraint on your network bandwidth you can choose to watch online videos in low resolution. Another feature which is quite interesting and useful is the ability to optimize battery life. We know that video playing drains a considerable amount of battery. You can optimize the battery life or the quality of the video. If you choose battery life, then the video quality might be compromised. You should choose...

What is Dumpster Diving

What is Dumpster Diving


Dumpster diving is the process of physically digging through a victim’s trash in an attempt to gain information. Often it is easy to find client or product information, internal memos, and even password information that have been placed in wastebaskets.

So, while the term can literally refer to looking through trash, it is used more often in the context of any method (especially physical methods) by which...

How To Change Your Default Browser in Windows 10

How To Change Your Default Browser in Windows 10
In Windows 10, there is a default app for every program and files. Microsoft Edge is the default browser for Windows 10. If you want to change the default browser to some other web browser, then follow the steps below:



Change Your Default Browser in Windows 10

1. Press Windows + I keys to open Settings app.

How To Download Offline Maps in Windows 10

How To Download Offline Maps in Windows 10

In Windows 10, you can download Maps of various places across the world. Offline maps can be downloaded maps before you go offline. Then later, search for places and get directions in the Maps app, even without Internet access. In the following tutorial, I will show you how to download offline maps in Windows 10.

The quickest way to download maps is through the system settings.  Here's how.



How To Delete Offline Maps In Windows 10

How To Delete Offline Maps In Windows 10
In Windows 10, you can download Maps of various places across the world. You are able to delete the maps downloaded for offline use at one time in Windows 10 computer, following the instruction below. BTW, you can still use them when you are online.

1. Press Windows + I keys to open Settings app.

2. Next, click on the Apps menu to open the Apps settings.

How To Disable The Windows Welcome Screen Experience In Windows 10

How To Disable The Windows Welcome Screen Experience In Windows 10

If you don't find the Windows 10 welcome screen informative after updates, in this guide, you'll find the steps to disable it in Windows 10.



Since the Anniversary Update, Windows 10 shows you a welcome screen that loads on Microsoft Edge as you sign in after installing a new feature update.

The following tutorial will show you how to disable the Windows...

How To Export Sticky Notes From Windows 7 To Windows 10

How To Export Sticky Notes From Windows 7 To Windows 10


Sticky Notes is a desktop notes application included in Windows 7, Windows 8, and Windows 10. It was present in Windows Vista as a gadget for the Windows Sidebar, and originated in Windows XP Tablet Edition in 2002. The program allows users to take notes using post-it note–like windows on their desktop.

If you’re a Windows 7 user, you can move all your sticky notes to Windows 10....

What is Multi-Factor Authentication

What is Multi-Factor Authentication



Multi-factor authentication is the process in which we expand on the traditional requirements that exist in a single factor authentication like a password.To accomplish this, multi-factor authentication will use another item for authentication in addition to or in place of the traditional password.

Following are four possible types of factors that can be used for multi-factor authentication.

What is Challenge Handshake Authentication Protocol (CHAP)

What is Challenge Handshake Authentication Protocol (CHAP)


One of the methods that can be used protect information when using remote access to a resource is the Challenge Handshake Authentication Protocol (CHAP) CHAP is a remote access authentication protocol used in conjunction with Point-to-Point Protocol (PPP) to provide security and authentication to users of remote resources.

PPP allows users to use dynamic addressing and multiple...

What is Kerberos?

What is Kerberos?



Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free implementation of this protocol is available from the Massachusetts Institute of Technology. Kerberos is available in many commercial products as well.

Kerberos (currently Kerberos v5), is used as the preferred network authentication protocol in many...

What is SYN Attack

What is SYN Attack


A SYN attack exploits a basic weakness found in the TCP/IP protocol. A standard TCP session consists of the two communicating hosts exchanging a SYN | SYN/ACK | ACK. The expected behavior is that the initiating host sends a SYN packet, to which the responding host will issue a SYN/ACK and wait for an ACK reply from the initiator. With a SYN attack, or SYN flood, the attacker simply sends only the SYN packet, leaving the victim...

What is Network Adapter

What is Network Adapter


A network adapter, also known as a network interface card or NIC, is the device that enables you to send and receive data to and from your computer. This adapter might be integrated into the motherboard or act as a separate device that connects to a PCI slot, or perhaps a USB port.

An adapter can connect to the network by cable (wired) or by air (wireless). It has its own basic CPU to process transmitted data,...

What are Hardware Threats

What are Hardware Threats



Hardware problems are all too common. We all know that when a PC or disk gets old, it might start acting erratically and damage some data before it totally dies. Unfortunately, hardware errors frequently damage data on even young PCs and disks. Here are some examples.



Power Faults

What is Biometrics

What is Biometrics


Biometric devices can provide a higher level of authentication than, for example, a username/password combination. However, although they can be used for mutual authentication plans and tend to be relatively secure, they are not impervious to attack. For instance, in the case of fingerprint usage for biometric identification, the device must be able to interpret the actual presence of the print. Early devices that employed optical...

What is Access Control

What is Access Control


Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment.

There are two main types of access control: physical and logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access limits connections to computer networks, system files and data.


How To Enable The Virtual Keyboard In Windows 10

How To Enable The Virtual Keyboard In Windows 10
This tutorial will show you the steps to enable or disable the virtual keyboard in Windows 10.


How To Add The Virtual Keyboard To The Notification Area

1.  First of all, right-click on the taskbar. Now find out the ‘Show touch keyboard button’ option in the context menu.

What is Intranet

What is Intranet



An intranet, or internal network, is a locally available web network that is not accessible via the public Internet.  An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. The main purpose of an intranet is to share company information and computing resources among employees.

Many companies...

What is ARP Poisoning Attack

What is ARP Poisoning Attack



ARP (Address Resolution Protocol) poisoning is a type of network attack technique in which the ARP cache of systems on the network is modified to point to an IP address with the Media Access Control (MAC) address of an unauthorized user. ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of...

What is NULL Session Attacks

What is NULL Session Attacks


A null session is an anonymous connection to an Windows-based computers in which weaknesses in the NetBIOS networking protocol are exploited to allow a user to create an unauthenticated connection with a Windows-based computers. The service is designed to allow named pipe connections but may be used by attackers to remotely gather information about the system.

To the Windows system, the user appears as an...

What is Packet Sniffing Attack

What is Packet Sniffing Attack


Packet sniffing is the act of capturing packets of data flowing across a computer network. The software or device used to do this is called a packet sniffer. Most instant message (IM) programs send their data unencrypted, so if a user sends sensitive data such as logins, passwords, or banking information, it could be recorded by the packet sniffer and used by a malicious hacker. Some IM programs allow the user to...

What is DNS Poisoning Attack

What is DNS Poisoning Attack


DNS cache poisoning, also known as DNS spoofing, is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones.

The DNS poisoning technique takes advantage of a DNS server’s tables of IP addresses and host names by replacing the IP address of a host with another IP address that resolves to an attacker’s system....
 
Moderators
Permissions in this forum:

You cannot post new topics in this forum
You cannot reply to topics in this forum