Posts

Showing posts from March, 2021

SSH KEYS - Explained in Detail

Image
SSH keys are the set of security keys that covers your data from the trespassers. These keys work on the most effective authentication systems and require passwords to unlock and allow one access to use the information secured. SSH stands for Secure Socket Shell, in a simple language it is also known as Secure Shell. SSH keys are two keys basically, paired together, namely - a public key and a private key. A private key is owned by the officials and the public key is familiar to everyone. The credentials to access the private keys are only given when required and needed. These keys are available in different sizes and different types. HISTORY - SSH keys were created in 1995 by Tatu Ylonen. He felt the need to come up with a better security network system because a lot of cybercrimes were being observed at that time and that is how SSH keys were made, with the concept of providing access to the data through username and password, and the one with correct credentials and identity can g...

LDAP And Its Uses

Image
With the rapid increase and advancement in the IT sector and business world, the need to keep credentials and data safe has become a necessity, because there are thousands of trespassers, hackers sitting out there, which are just waiting for your one tiny mistake to overtake your data and misuse it. Though, thanks to the progress of technology we are blessed with lots of security systems that are specialized in their own way to make sure no breaching of information or any data takes place.  Depending on the kind of organization you are having or you owe your requirements for the kind of security system you need would vary. Well, one of the most developed and often used security systems is LDAP (Lightweight Directory Access Protocol).  LDAP is security software that allows the users and applications to access, verify and find any sort of information required in an organization. The main aim and the ease of LDAP are that it connects the organization users with clients, which ma...