Googlefold.com
Security+ Links
In a sinister world where ignorance divides us, awareness is all but elusive.

KEEP America Great!
Disclaimer: No guarantee is made to the truthfulness or content of all links; use at your own discretion.
  Network+   OSI Model   Ports   IEEE   Cables   IPv4   IPv6   Security+  

Under Construction
Under ConstructionUnder ConstructionUnder Construction
Under Construction
We are at the beginning and end of so much that descends and ascends upon us. As new technologies transform standards, old human laborious capacities of current worth will have to grapple with many of these fundamental changes, redefining security and basic human efforts. Left in realms of miraculous achievements, social conditions will be challenged climbing toward or running from all the nebulous overwhelming voids, new to human creation and invention, avalanched upon our childrenís children, truth will remain in the midst of lies. Skewing exponentially the times unwind and without moral decency to knit civilization in a bond of unity, no compass will direct us. In a troubling world God has always led the humble to sanctuaries beyond human comprehension, while darkness consumes itself in evil pursuits, Godís own blessings come to the humble remnant. To count the stars of heart is a task left to the dreams of tomorrow.

Useful Images
CLICK 
FOR 
Multifactor Authentication Security MultiFactor Types XXX  LARGER
 PICTURE








PENDING INSERT AREA
(Under Construction)
    Multi-factor Autentication
TYPE INCLUDES
Something you know
          (Knowledge)
Password, PIN,
CAPTCHA, Security Questions
Something you have
         (Possession)
Smart Card, USB Token
RFID Badge, USB Dongle, Key,
Military CAC card, Phone, PC
Something you are
         (Inherence)
Fingerprint, Face, DNA,
Voiceprint, Iris, Biometrics
Somewhere you are
           (Location)
Geographical location,
Geofencing, GPS, IPv4
Something you do
         (Behavior)
Handwriting,
Keypad Typing
Events and Incidences
   True Positive Problem detected
   True Negative True, No problem
   False Positive
Wrong Alarm   
Better
if some
allowed
   False Negative      Missed Incident BAD  

           UNDER CONSTRUCTION ...
Focus Hash
Algorithm
Symmetric
Algorithm
Asymmetric
Algorithm
Key Size Output
Length
Comment Obsolete
MD5       128 bits Message Digest X
MD6       Up to 512 Message Digest  
RIPEMD       128,160,320 Developed in 1992 and 1996  
SHA-1       160 Many collision attacks identified X
SHA-2       256,512 X  
SHA-3       224,256,384,512 Released by NIST in 2015  
Whirlpool       512 X  
NTLM       128 Password  
bcrypt       184 bit Password - based on the
Blowfish cipher in 1999
 
PBKDF2       X Password  
DES     56-bit   Data Encryption Standard: Created
in 1975, 64-bit block and a 56-bit key
X
3DES     Three 56-bit   Triple DES - 168-bit and uses
48 rounds of cryptographic computations
 
IDEA     128   International Data Encryption  
AES     128,192,256   Advanced Encryption Standard  
BLOWFISH     32 to 448   First strong public domain
cipher
 
TWOFISH     128,192,256   Improved Blowfish, AES competitor  
SERPENT     128,192,256   AES finalist, powerful but slow  
RC4     40, 128   Rivet Cipher/Ron's Code
Stream Cipher, old
X
RC5     0-2040   X  
RC6     128,192,256   X  
SLIPJACK     80   X  
CAST     128,256   X  
RSA     Up to 4096   Rivest,Shamir,Adleman
Key generated from two prime numbers
Widely used for digital signatures
 
DSA     512,1024   Digital Signature Algorithm  
ECC     163,256,384,512   Elliptic Curve Cryptography
ECC is for phones except
if military phone uses AES
 
El Gamal     #   X  
DH     #   Diffie-Hellman (used with IPSec)  
Quantum     #   X  
X     #   X  

Memory mnemonic:
3
2
B
R
A
I
D
S
3DES
TWOFISH
BLOWFISH
RC
AES
IDEA
DES
SERPENT


UNDER CONSTRUCTION:
Authentication Standards

PAP
CHAP               NTLM
MS-CHAP

PPTP
L2TP                VPN
IPSec
802.1x (NAC)
802.1i (WPA2)

RADIUS
TACACS+       KERBEROS
LDAP

  Network+   OSI Model   Ports   IEEE   Cables   IPv4   IPv6   Security+  

Security+ 501 Help Useful Videos Utility
Security Performance Based Test

Security 401 Test Review questions

Security 501 Test Review questions

SecurityPlusPro.com

Mike Myers 501

CBT Nuggets Security+ 501

Security Related, by Keith Barker

501 Security+ Professor Messer

Common Security Issues

Secure Protocols



Blockchain components in a network

SSLs.com

Hoax-Slayer.net

Snopes.com - Misinformation SCAMs

SecTools.org

NetworkMiner

Immersive Labs 🌠

Network Forensics

LookingGlassCyber.com

NorseCorp.com

National Vulnerability Database

CyberChef


Disclaimer: All pictures used with my webpages have been
obtained from internet image collections or linked sites, and the use
of which is intended to instruct and to assist all students. Images and
or sites are presented for informational purposes only and do not
constitute endorsement of any websites or other sources. I disclaim
any liability in connection with the use or misuse of this information.
I will link images to any valid request.

XXX

XXX

XXX

XXX

Door Security Videoes

James Veitch respnds to SPAM

Terms and Conditions May Apply

Iran and STUXnet, Iran is HACKED (Cyberwar)

Bomb Blast Simulator


If the chains of evil cannot be broken, a possible time is coming where the wasted petty arguing we do today in the modern civilized world will become so insignificant, as nations implode upon the shear hate for life, and then comes the assault on all those that would hope for peace as the children cry. Most of time is filled with the cries of all that is unjust. Truth stands for justice and our senses are deceived as lies have too often overwhelmed times, past regrets, where ashes crush the people.

If through our tears we can regain laughter, in this hope might strength return with purpose where commendations replace criticisms, and godly humbled hearts can unapologetically rest upon love shared for one another in the open. Hate is the cancer that steals laughter, that one precious component of innocence. Truth is not right when it rests in lies. Those today screaming victimization due to prejudice often are the ones found to be the most prejudice, unable to bury the hate that divides all cold hearted souls to turmoils within self-inflicted isolated narcissistic oblivions. Timeless corruption, for all that is unholy, and whom passionately hate life itself with anger as their only vision, this is why security implementations must take precedence into the foreseeable future, and even more so as governments collide, and perhaps internally splinter. May our children find greater unity than the divisions we now must face with piercings of heart.


These are NOT LINKS. Example images included here expose evil threats that put us all at risk.
Unfortunately the Internet is filled with unethical entities
CLICK 
FOR 
Bad website choices can lead to having all your files encrypted by bad individuals The elderly are being fooled by liars   
  These scams have the appearance of being authentic using known industry logos These fake warnings introduce urgency as a weapon of fear Often these stealthy assaults  offer convenience to resolve the immediate problem These annoyances usually disable the ability to close the Warning window Even the best of us can be fooled so caution must always be in mind  LARGER
 PICTURE
Never click on these: [Ctrl-Alt-Del] Task Manager & turn Browser off


Change background color to:
Sky Blue White Plum Maroon Green Brown Gray
Tan Teal Black Gold Tomato Purple Orange Pink
COLORS ARE A GIFT WITHOUT CHARGE


Click here to add this page to your favorites


Home Page | ScienceLinks | Network+ | OSI Model | Ports | IEEE | E-Mail Me | Blank
Pending work to be published
Follow me on Twitter Follow me on Facebook     Visit My YouTube Channel     View my Linkedin Profile     Follow me on pinterest