Skip to main content

Posts

Showing posts with the label cyber security

What is Cryptography?

  What is Cryptography? Cryptography is protecting the confidentiality and integrity of the information without being vulnerable to attackers or threats. It is an encryption technique when ensures the data is only visible to the sender and recipient and no middle man can steal the data and snoop for information. There are three most common types of cryptographic techniques in general. They are – Symmetric key cryptography   – Here the sender and receiver share a similar key and it can be used for both encryption and decryption. Hash functions  – There is no key used, rather a hash value is used to encrypt text, contents, and passwords. Public key cryptography   – In this two different keys such as a public key for encryption and a private key for decryption is used. Only the private key is kept as secret. Encryption Tools and Techniques: There are few tools available for encryption technique. They include – Triple DES – Replaces Data encryption standard(DES) algorithm, uses 3 individu

Secret Hack Codes for Android Mobile Phones

  Secret Hack Codes for Android Mobile Phones :- Hello friends! Today I will share several  secret hack codes   for Android  Mobile Phones . These   A ndroid codes   will help you   hack android mobiles  in order to explore your phone’s capabilities. Secret hack codes are usually hidden from users to prevent misuse and exploitation. Android is a very new platform so there aren’t many  hack codes for Androids  available. Today I will share all of the  hack codes of Android cellphones  that I know. I have tested these codes on my Samsung Galaxy with the Android OS version 2.2. I am sure these will work on all previous versions. Secret Hack Codes for Android Mobile Phones: 1. Complete Information About Your Phone   *#*#4636#*#*  This code can be used to get some interesting information about your phone and battery. It shows the following 4 menus on the screen: Phone information Battery information (How to maximize or boost battery life in android phones) Battery history Usage statistics 2

What is a computer port? | Ports in networking

  What is a computer port? | Ports in networking- What is a port? A port is a virtual point where network connections start and end. Ports are software-based and managed by a computer's operating system . Each port is associated with a specific process or service. Ports allow computers to easily differentiate between different kinds of traffic: emails go to a different port than webpages, for instance, even though both reach a computer over the same Internet connection. What is a port number? Ports are standardized across all network-connected devices, with each port assigned a number . Most ports are reserved for certain protocols — for example, all  Hypertext Transfer Protocol (HTTP) messages go to port 80. While IP addresses enable messages to go to and from specific devices, port numbers allow targeting of specific services or applications within those devices. How do ports make network connections more efficient? Vastly different types of data flow to and from a computer over

Social Engineering attacks and theirypes:

  Social Engineering attacks and their types: Social engineering attacks are used to gain access to the system and carry out actions that reveal confidential/secret information of the user. It makes the user break the security procedures and tricks to gain access to the system. There are different types of social engineering attacks such as- Phishing – Attackers create a similar fake website and acquire personal and bank details through this. He targets customers through email and other means. Spear phishing – Similar attack like phishing but the target is narrow towards a specific group. Vishing – Attack through phone as a medium Pretexting – Based on a scripted scenario, used to extract PII. The attacker resembles himself as a known person. Baiting – Attacks happen through download links, infected USB’s etc. Denial of Service Attack vs Distributed Denial of Service Attack: S.no DOS DDOS 1 In DOS, the attacker uses a single computer and internet connection to flood the target resourc

Top 10 Secure Computing Tips

Top 10 Secure Computing Tips:-   "Top 10" List of Secure Computing Tips Tip #1 - You are a target to hackers Don't ever say, "It won't happen to me." We are all at risk and the stakes are high - both for your personal and financial well-being and for the university's standing and reputation.  Cybersecurity is everyone's responsibility. By following the tips below and remaining vigilant, you are doing your part to protect yourself and others. Tip #2 - Keep software up-to-dat e Installing software updates for your operating system and programs is critical. Always install the latest security updates for your devices: Turn on Automatic Updates for your operating system. Use web browsers such as Chrome or Firefox that receive frequent, automatic security updates . Make sure to keep browser plug-ins (Flash, Java, etc.) up-to-date. Tip #3 - Avoid Phishing scams - beware of suspicious emails and phone calls Phishing scams are a constant threat - using variou

A simple way to Understand how you get attack from Phishing (Emails, Messaging Apps etc.)

  A simple way to Understand how you get attacks from Phishing (Emails, Messaging Apps etc ) What is Phishing? Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords, and credit card details, by disguising oneself as a trustworthy entity in electronic communication such as (Email, SMS, Text messages, Mobile app messages, and social media posts.) So how does phishing attacks work- A malicious link will be sent, once clicked, It begins the process to Steal data, financial card information, login credentials, and also infect your device, phones with malware(Virus) when you download the attached document. Phishing links don’t just come in emails alone. several malicious links that lead to stolen data and infected devices can be found in SMS text messages, Mobile app messages, Social media posts . How I received these compromised messages.- The phishing emails and text may usually look like a message from a company you know or trust. They ma