-->

  • About Cryptography and VPNs

     

    About Cryptography and VPNs


    Clear Text Protocol handles data over any network without any transformation or encryption. The attacker will eavesdrop on the communication which is performing an unwanted attack in a way.
     

     

    About Cryptography and VPNs


    Because whatever data is written in human languages, its nature's according cleartext protocol can be intercepted, eavesdrop and mangle very easily. Because the data that is being translated is not encrypted information on the boon network, public network or private network. If there is absolutely no alternative to a clear text protocol you should use it only on trusted network.


    A cryptographic protocol provides services by encrypting any data or information over a network with tight security. Cryptographic protocols have many different goals one of them is to prevent is eavesdropping.

    Eavesdropping that's mean is an attack also known as sniffing or snooping attack, is a theft of information as it is transmitted over the network by a computer, smartphone or another connected device that attackers takes advantage of unsecured network communications to access data as it is being sent or received by its user.


    If an attacker intercept the traffic, they will not be able to understand it.
     

     

    About Cryptography and VPNs

     


    If you need to transmit private information such as username and password, then you should always use cryptographic protocol, this cryptographic protocol allows over the network communication with tight security.

    What if you need to run a clear text protocol on an untrusted network?

    You can wrap (tunnel) a clear text protocol into a cryptographic one.





    A great example of protocol tunneling is a VPN.

    A virtual Private Network (VPN) uses cryptography to extend a private network over the public one, like the internet. The extension is made by performing a protected connection to a private network (such as your office or home network). From the client point of view, being in the VPN is the same as being directly connected to the private network.


    About Cryptography and VPNs

    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.
     

     

     

  • 0 comments:

    Post a Comment

    For Any Tech Updates, Hacking News, Internet, Computer, Technology and related to IT Field Articles Follow Our Blog.