Meet the Three-headed Hell-hound … Kerberos

… and Trent

Introduction

As we become more dependent on the Web, we can never be 100% sure that everything is correct and as it should be. This might relate to receiving an email from someone who says that they know you, but how can you tell if the person is genuine? The email address looks fine, but the email content does not have the same writing…

--

--

--

This publication brings together interesting articles related to cyber security.

Recommended from Medium

DDoS Attacks from Proxy Servers the New Normal | Alibaba Cloud Security Operations Center

Is it too late to regulate network?

How small and medium-sized businesses can prevent potential cyber threats?

Token Bulk Sender

Automate your recon With Censys | HOW Pro hacker use Censys

Saying Goodbye to Napier’s Logs, and Hello To Elliptic Curves

But What’s The Human Contract Tracer Process?

One code To rule E’m all (1C2R3A)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Prof Bill Buchanan OBE

Prof Bill Buchanan OBE

Professor Cryptography. Serial innovator. Believer in fairness, justice & freedom. EU Citizen in heart. Living by the sea. Old World Breaker. New World Creator.

More from Medium

NIZK (Non-interactive Zero Knowledge) Proofs of Discrete-log Equality

From crypt To GPU Breakers … thank Morris!