Posts

Showing posts from June, 2022

Hashing vs Encryption

Image
            Hashing vs Encryption (cyber edition) Hashing :  So what is hashing ? and why do we use it ? hasing is nothing but ..... Not in a mood to introduce this way today 🤔 firstly let’s understand how passwords are stored on servers . Whenever we create an account by claiming a username and password , the password is not stored in the form of clear text on the server , rather the password is put into a process and a set of  meaningless or random looking characters are derived from it which is called as hash and the process is called hashing . The generated hash is sent to the server and it stores them .  Actually the hash that is generated or the so called random text derived out of the password isn’t random at all , it comes out to be same every time if the same password is entered (remeber the word same password ) , if a different password is entered a different hash is generated . So When we try to login , the hashed version of the e...

/etc/passwd file vs /etc/shadow file

Image
                                                /etc/passwd vs /etc/shadow Outcomes :  You will have a decent understanding regarding the format of passwd and shadow file. You will be able to customize your user accounts according to you needs. ----------------------------------------------------------------------------------------------------------------------------- The passwd and shadow files stores the details of the existing users of the operating system and changes to the details on any user account reflects on that particular user account.firstly let's create a user named naruto using the adduser command   Command 1: sudo adduser naruto Fig : 1.0 And you can see that we are prompted to assign a password and a home directory naruto is created . we are also prompted to enter the details like full name , room number and such things which I have skipp...