Skip to content
Cristian Thous – Ciberseguridad al alcance de todos
Ciberseguridad al alcance de todos
Cristian Thous - Ciberseguridad al alcance de todosCristian Thous - Ciberseguridad al alcance de todos
  • Home
  • News
  • Hacking
    • Methods of attack
    • Prevention methods
    • Connectivity methods
    • Windows hacking
    • Linux hacking
  • Research
  • Contact
  • Español
  • English
Search:
Instagram page opens in new windowFacebook page opens in new windowTelegram page opens in new window
  • Home
  • News
  • Hacking
    • Methods of attack
    • Prevention methods
    • Connectivity methods
    • Windows hacking
    • Linux hacking
  • Research
  • Contact
  • Español
  • English

Category Archives: Connectivity methods

You are here:
  1. Home
  2. Category "Connectivity methods"

SMB What is it and how does it work?

Connectivity methods, Hacking ENBy Cristian SantanaApril 15, 2024Leave a comment

Short for Server Message Block, SMB is an application layer protocol that enables file, printer and device sharing and inter-process communication (IPC) between applications on a network through a client-server architecture. In other words, computers (SMB clients) on a network can connect to SMB servers to access shared files and directories or perform tasks such…

What is a proxy and what is it for?

Connectivity methods, Hacking ENBy Cristian SantanaMarch 6, 2024Leave a comment

A proxy is a well-known technology in the market, although sometimes it is not well understood how it works. Therefore, in this opportunity we will explain what a proxy is and how it is useful. But before we start talking about the logical structure of proxy servers, I consider it important to clarify how it…

What is Kerberos, how does it work and what is it used for?

Connectivity methods, Hacking ENBy Cristian SantanaNovember 20, 2023Leave a comment

Cybercrime is an unfortunate fact of life today, regardless of whether we are talking about individual consumers or the business world in general. No company or organization is safe, and the problem is not going to get better any time soon. Experts predict that the damage caused by cybercrime will cost the world $6.1 trillion…

AS2 protocol and differences with SFTP

Connectivity methods, Hacking ENBy Cristian SantanaOctober 18, 2023Leave a comment

How are sensitive sectors such as commercial airlines, healthcare or transport communicated and shared data? How do you transfer structured B2B data safely and reliably through risk networks like the Internet? The answer is the AS2 protocol. What is AS2? Applicability Statement 2 ( AS2 ) is a type of file transfer mechanism based on…

SSH What is it? ¿How does it work?

Connectivity methodsBy Cristian SantanaSeptember 14, 2023Leave a comment

SSH or Secure Shell, is a remote administration protocol that allows users to control and modify their remote servers over the Internet through an authentication mechanism. Provides a mechanism to authenticate a remote user, transfer entries from the client to the host, and retransmit the output back to the client. The service was created as…

Cristian Thous - Ciberseguridad al alcance de todos
Pagina creada por Unic Services
Go to Top
Utilizamos cookies en nuestro sitio web para ofrecerle la experiencia más relevante al recordar sus preferencias y visitas repetidas. Al hacer clic en "Aceptar", consiente el uso de TODAS las cookies.
Configuración de las cookiesAceptar
Manage consent

Resumen de la privacidad

Este sitio web utiliza cookies para mejorar su experiencia mientras navega por el sitio web. De ellas, las cookies clasificadas como necesarias se almacenan en su navegador, ya que son esenciales para el funcionamiento de las funciones básicas del sitio web. También utilizamos cookies de terceros que nos ayudan a analizar y comprender cómo utiliza usted este sitio web. Estas cookies se almacenan en su navegador sólo con su consentimiento. También tiene la opción de excluirse de estas cookies. Pero la exclusión de algunas de estas cookies puede afectar a su experiencia de navegación.
Necesario
SAVE & ACCEPT
Responsibility

On this website you will find news and content related to cybersecurity, also hacking techniques are used, with the sole purpose of learning. We do not promote its use for profitable or improper purposes. We are not responsible for any damage or impairment that may be generated in the systems used. The responsibility is entirely the user’s.