From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Unlock this course with a free trial
Join today to access over 24,300 courses taught by industry experts.
Linux encoding and hashing - Linux Tutorial
From the course: Complete Guide to Linux Security: Protecting Your Linux Server Environment
Linux encoding and hashing
- Let's get into a little bit of Linux encoding, and cryptographic hashing. Encoding is the process of converting binary information into text. Normally it's used to take information, and convert it to its ask key equivalent and binary number, and then convert that into an encoding scheme. For example, base 64 or hex. So here's an example. In ASCI, we would have the capital letter M. The capital M is the decimal number 77 in ASCI. And if we convert that to binary, that becomes 01001101. That will then be encoded as base 64 to TQ equals equals. And we always add some padding information to these. So 77 became this in binary, but we add four zeros, and those effectively become the two equals signs. So a note about this, encoding is not encryption, as the converted result is static. It's always the same. So if we were to encode the capital M in base 64, it would always become TQ equals equals, no matter what system you're working on. So, encoding is not encryption, but encryption could…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Learning objectives1m 34s
-
(Locked)
Introduction to nftables and the nft command2m 34s
-
(Locked)
nftables setup4m 5s
-
(Locked)
Tables > Chains > Rules2m 31s
-
(Locked)
Building the nftables configuration, part 18m 41s
-
(Locked)
Building the nftables configuration, part 28m 39s
-
Saving and restoring the nftables configurations8m 36s
-
(Locked)
Translating iptables to nftables7m 49s
-
(Locked)
-
-
(Locked)
Learning objectives1m 18s
-
(Locked)
Review of SSH1m 47s
-
(Locked)
Using keys to connect via SSH12m 57s
-
(Locked)
The sshd_config file3m 19s
-
(Locked)
Modifying the default SSH port7m 32s
-
(Locked)
Disabling password-based SSH2m 57s
-
(Locked)
Disabling root login via SSH2m 32s
-
(Locked)
Exclusive SSH groups4m 37s
-
(Locked)
Authentication settings10m 6s
-
(Locked)
Terminating SSH connections, part 17m 45s
-
(Locked)
Terminating SSH connections, part 26m 51s
-
(Locked)