Posts

IETF 123 Hackathon - Testing for x25519MLKEM768

Image
x25519, MLKEM, x25519MLKEM768 x25519 is a Diffle- Hellman key exchange algorithm based on Curve25519. It is optimized for security, speed and resistance to side-channel attacks. It has been tested a lot to improve its security and  However, x25519 is an old version which is prone to quantum computing attacks, a growing concern among cybersecurity specialist. Hence why MLKEM, a newer version is introduced. It is a key encapsulation mechanism which allows two parties securely exchange a secret key over an insecure channel. MLKEM is quantum-safe but its only drawback is not being tested enough to look for bugs and vulnerabilities.  To counter this issue, both has been used together to improve the security and efficiency while still being quantum safe., hence the name x25519MLKEM768. MinIO MinIO is a cloud-native object storage which is optimized for speed, simplicity and scalability. How to install MinIO? The first step is to clone the repository from  Github  following...

Cloning a repository from Git-Hub

Image
 As stated in the title, this blog provides a stepwise process to help beginners understand how to clone a repository from Git-Hub.  1) Go to the repository page you wish to clone and click on code. 2) Choose HTTPS or SSH and then copy the URL provided. 3) Open your Terminal on your Virtual Machine or Git bash. 4) Create a folder and use " cd folderpath " on the terminal. 5) Use " git clone "https://github.com/unclecode/crawl4ai.git "" . If you receive and error message as shown below. Use " sudo apt install git " to install git and then write the git clone command again.

SSH (Secure Shell) and Virtual Private Network(VPN)

 As stated in my previous blog, SSH and VPN works almost similarly. They both provide the user with secure access to transfer data over an unsecured network. However, they serve different purposes. SSH is a protocol primarily designed for secure access to individual servers or devices. Users can execute commands, transfer files, and  forward specific ports, while encrypting the data. It is focused towards ensuring the completion of tasks, making it ideal for system admin and developers who need direct interaction over a remote server. VPN, on the other hand, is a wider solution that ensure the security of all internet traffic between devices and a remote server. It creates an encrypted tunnel to protect online activity and masks the IP address. It is used to provide remote access to an organization's private network, or perhaps enhance privacy on a public network like in Cafe, malls, etc... Both of them also possess drawbacks. SSH has limited network access and it requires exp...

Creating a new user and setting up their keys in SSH.

 SSH, shortly abbreviated for Secure Shell,  is a network protocol that provides secure access to a computer and manages devices over an unsecured network. It widely used by system admins, developers, and network engineers. SSH uses the port 22 and on a side note, HTTPS uses port 443 and port 80 is the default port for web servers. Some key features of SSH are: 1. It encrypts all data between the client and the server, making it reliable for crucial data. 2. It prompts the user with password authentication as well as key authentication ( public and private keys) which adds another layer of security. 3.  With port forwarding, SSH can forward network traffic, securing data. 4. With SCP (Secure Copy) and SFTP (SSH File Transfer Protocol) allow secure file transaction. 5. Users can interact on a remote session using commands via SSH session. Steps to set up the key for a new user: 1.  "useradd username" "useradd" command will allow the individual to add a new username t...

Domain Name System( DNS)- Recursive DNS

 What is DNS? When someone type in a domain name (Ex. google.com), it triggers a DNS lookup . During that process, the domain name will match a corresponding IP address that will be returned back to the client. There are 2 types of DNS lookups; iterative and recursive.   A recursive DNS lookup implies that one DNS server interacts with other DNS servers and returns a matching IP address to the client. On a side note, a DNS server is when a user types a domain name. This enable a DNS lookup where several remote computers return a corresponding IP address to the user's computer and allow them to access the correct website. A DNS query on the other hand implies that the client can communicate directly to each DNS server involved in the lookup. In a DNS lookup, there are several DNS servers involved; DNS resolver, DNS root server, DNS TLD (Top-Level Domain) server, and DNS authoritative nameserver. In iterative DNS lookup, DNS resolver asks each DNS one by one until it finds t...