Posts

Showing posts with the label Protection

Complete Basic Tutorial on DNS Hijacking

Image
Complete Basic Tutorial on DNS Hijacking DNS hijacking (sometimes said as DNS redirection) could be a style of malicious attack that overrides a computer’s TCP/IP settings to purpose it at a scallywag DNS server, thereby unsupportive the default DNS settings. In alternative words, once AN assaulter takes management of a laptop to change its DNS settings, in order that it currently points to a scallywag DNS server, the method is said as DNS hijacking. As we have a tendency to all grasp, the “Domain Name System (DNS)” is especially answerable for translating a user friendly name like “google.com” to its corresponding science address “69.134.227.26”. Having a transparent plan of DNS and its operating will assist you higher perceive what DNS hijacking is all concerning. If you're fairly unaccustomed the thought of DNS, i'd advocate reading my previous post on however name System Works. How DNS Hijacking Works? As mentioned before, DNS is that the one that...

6 Ways To Protect Your Data From Hackers - 2016 (Updated)

Image
6 Ways To Protect Your Data From Hackers - 2016 (Updated) The year 2016, is turning out to be the year of data breaches. Hackers have become particularly active and just today, we are hearing about two big data breaches: Millions of Gmail IDs and password almost went on sale and there is a suspect data breach in the IRCTC website that is used by crores of Indians. With hackers on the march, how can you be safe? If you think who would want to hack my account and steal my data, you couldn't be more wrong. According to a recent report, a hacker was sitting over 272 million email accounts and passwords, and he was ready to trade them, wait, not for money, but just for a good name in hacker forums. Any inconspicuous user could be a target. You as well. Unfortunately, most people keep only one password for different accounts, for example, same password for Gmail, Facebook, Twitter, or even online banking. Even a simple brute force attack can reve...

HOW TO PROTECT YOUR CLOUD STORAGE FROM GETTING HACKED

HOW TO PROTECT YOUR CLOUD STORAGE FROM GETTING HACKED ================================================= The concept of cloud storage has become more common these days especially when offered commercially since it’s more cost effective for a large corporation to store data on an off-site data center. It is cheaper and they don’t have to worry about finding space for storing data on server which can be the size of a warehouse. However, at individual level, it is preferred less over local storage devices like flash drive, hard drive and disk drive. What is cloud storage? To talk about the security level of cloud storage, we’ll first have to talk about what cloud storage is. Cloud storage is an off-site data warehouse where data is transferred and stored. It can be accessed anywhere in the world provided an Internet access is available. You can store virtually anything in a cloud storage model. I say virtually, because you are transferring it over the Internet on a web...