back to homepage

requires authentication Free Articles

How to Get Windows Azure Multi-factor Authentication?

Azure Multi-factor authentication is an authentication system that requires more than one authentication factor for successful authentication

Read More

Cisco CCNP BSCI 642-901 Tutorial: Clear Text OSPF Neighbor Authentication

To pass the 642-901 BSCI exam, you have to know how to configure OSPF neighbor authentication. Learn how to configure clear-text authentication from Chris Bryant, CCIE #12933.

Read More

Biometric Authentication Implementation And Use

Explore this site to learn about different types of Biometric Authentication and see if it is right for your security needs

Read More

Using NTP Authentication

This article describes how to utilise the NTP security features to authenticate time references when synchronizing network time clients to a NTP server.

Read More

Token-Based Authentication for Web Apps

In this article, we have discussed the process of token-based authentication, its process, and the reason for its popularity over traditional cookie-based authentication.

Read More

The Concept of Two Factor Authentication

Two-Factor Authentication (also abbreviated as 2FA) is a form of authentication where it authenticates combining the one factor authentication with another factor regardless of software or hardware. In this type of authentication, there will be a requirement where you need to present what you have that the server know before being authenticated. There are many 2FA products in the market now and also many types of 2FA products. A few of the popular one are PKI USB Token, OTP Token and also Smart Card. These hardware will provide another piece of information that is required to succeed the authentication.

Read More

Cisco CCNA and CCENT Practice Exam: 10 Questions on Point-To-Point Connections, PPP, and HDLC

Cisco CCNA and CCENT Practice Exam: 10 Questions on Point-To-Point Connections, PPP, and HDLC

Read More

Tokenless Two Factor Authentication Ensures Secure Remote Access

Tokenless two factor authentication solutions are an improvement on the traditional choices, which eliminate the vulnerability associated with lost or stolen tokens or other PKI authentication issues subject to attack by viruses and other malicious programs. In addition, tokenless solutions greatly eliminates any cost barriers that previously existed, especially among large enterprises.

Read More

Mobile App Security: Risks & Tips

More than 5 billion world population use mobile phones. Mobile applications are the prime revenue generators for many small and enterprise businesses. However, these applications’ threat to data loss and getting hacked has also raised the need for mobile app security. Any business’s most essential criteria are to protect their user’s critical information. But because of the rise in digital fraud cases from notorious hackers – mobile app developers task has become more challenging than ever. This article is about how hackers or malware – attack the app’s security and effective tips to secure the mobile application.

Read More

SSL VPN Authentication Through Two Factor Authentication

In the world of identity theft, data confidentiality, user authentication and every other form of network security or lack thereof, SSL VPN authentication provides an invaluable resource for data integrity, especially across remote access infrastructures.

Read More

How to Use Private Keys for SSH Authentication from Windows to Linux

Learn how to generate and use RSA public/private keypairs for SSH authentication from your Windows computer to your Linux/UNIX server in this handy "how-to" guide.

Read More

Azure Multi-Factor Authentication

What is Azure Multi-Factor Authentication? Multi-factor authentication is a method of authentication that requires the use of more than one verification method and adds a critical second layer of security to user sign-ins and transactions. It works by requiring any two or more of the following verification methods:

Read More

COMMON LIVE MAIL OUTGOING SERVER (SMTP) ERRORS

the errors are totally recoverable at the hands of experts who can offer their services at the least time. Users can get the problems resolved at the quickest to get back onto their Live Mail account.

Read More

Securing a NTP Time Server Installation

This article describes the security aspects of the NTP protocol and specifically using MD5 keys to authenticate a time server.

Read More