How to show all the previously connected WiFi Networks using CMD in Windows?

Wi-Fi(Wireless Fidelity) Launched in September 1997 is affiliated with WLAN (Wireless Local Area Network). It is a wireless communication technology that uses radio waves to provide a high-speed network and Internet connection.
Sometimes there is a need to know the previously connected WiFi networks to get details on some network. There is a wide range of Softwares available for the same. But, this can be done easily with the use of the command prompt of the windows.

[mai mult...]

Getting hash of a file using CMD

A cryptographic hash is a fixed size string (or text) that is used as an identifier/fingerprint of some data. These are particularly useful in determining the integrity of files after they are transferred over a communication channel. Hashes are even utilized by certain OS-level processes for their working. The command processor of Windows OS (cmd.exe) provides the user with the ability to compute hashes on files/Directories via an utility command named Certutil. In this article we would learn about computing hashes on command prompt (cmd).

Description of command:
The command Certutil is primarily used for working with digital certificates and not hashes. The ability to hash files is due to the presence of a -hashfile switch in it.

> Certutil -hashfile
-hashfile  -- Generate and display cryptographic hash over a file
[mai mult...]

IP Filtering in Wireshark

Wireshark is a network packet analyzer or tracer. Network Packet Analyzer displays captured packet data in as much detail as possible. It is a popular open-source network protocol analyzer used by ethical hackers to analyze network traffic to identify vulnerabilities or potential security breaches.

[mai mult...]

Linux Firewall

A virtual wall in the security system world is designed to protect our system from unwanted traffic and unauthorized access to our system. The security system in Linux OS is known as Linux Firewall, which monitors and governs the network traffic (outbound/inbound connections). It can be used to block access to different IP addresses, Specific subnets, ports (virtual points where network connections begin and end), and services.

We have a daemon’s name called Firewalld which is used to maintain the firewall policies. A dynamically managed firewall tool in a Linux system is known as Firewalld, it can be updated in real-time if there are any changes in the network environment.

[mai mult...]

Getting hash of a file using CMD

A cryptographic hash is a fixed size string (or text) that is used as an identifier/fingerprint of some data. These are particularly useful in determining the integrity of files after they are transferred over a communication channel. Hashes are even utilized by certain OS-level processes for their working.

The command processor of Windows OS (cmd.exe) provides the user with the ability to compute hashes on files/Directories via an utility command named Certutil.

[mai mult...]