Skip to main content

Posts

What is TCP/IP Model??

What is TCP/IP Model?? TCP stands for Transmission Control protocol/Internet Protocol . It is a communication protocol used to interconnect the devices in the internet. Initially, the Transmission Control Program provided only a common service to its users, not datagram. As experience with the protocol grew, functionality was divided into layers of distinct protocols, allowing users direct access to service.  TCP provides reliable, ordered delivery of  bytes between applications running on hosts communicating via network. TCP is connection oriented means a connection is established between a client and server before data is sent. The server waits for the connection requests from clients before any connection is formed.  TCP/IP has 5 layers  Application Layer : This layer allows the user to interact with the application.  Transport Layer : This layer is responsible for flow control, the data is sent through this layer. Network Layer : This layer is responsible f...

What is Access Control in cybersecurity??🙅✋🙌

What is Access Control in cybersecurity?? Lets learn about that in simple terms, Access control is restricting access to a place or any resource, while access management defines the process how to do. If we want to enter any resource, place we need permission. The permission to access that particular resource, getting into the particular place is Authorization . Example: While accessing any bank account we have to give the right credentials, or else the website would restrict your access to the server. Only the authorized would be able to login with the credentials. Access Control is a security term used to maintain who or what can access or view the computer resources. This could restrict the entry to the limited. Access control to any organization is of 2 types Physical Access Electronic Access Control (EAC) Physical Access limits the access of the persons to the security rooms, IT server Buildings, other departments. Electronic access control (EAC) is the limitation of access of r...

What are SSL and TLS?? What is the difference between SSL and TLS??

What are SSL and TLS?? What is the difference between SSL and TLS?? What is SSL? SSL (Secure Sockets Layer) is networking protocols which helps in securing the network. Transport Layer Security (TLS)  is the upgrade version of SSL. SSL is a digital document that secure the identity of any website. Basically it encrypts the data by using cryptographic key pairs which consists of public and private key. The public key is present in the certificate and allows the web browser to start off the communication given to the server. The private key is on the server and is used to digitally retrieve or sign the web pages and other files such as images, videos, scripting files. In SSL certificate we can see much information also which includes identifying information about the website, its domain name and identifying information about the site's owner. We could also see expiry information, serial number, company issued also about the certificates. To keep the website secure one should buy the...

Have you ever heard about DLP?? What is it ??🤔

 Have you ever heard about DLP?? What is it ?? DLP also known as Data Loss Prevention . It is a Software which detects the data breaches transmissions and prevents them by monitoring, detecting and also blocking the data in motion means in network traffic. Data loss, information leakage, Content filtering are the terms mostly used in the prevention system. In the tech industry employees dealing with data leakage are mainly divided into categories standard security measures, advanced security measures, access control and encryption and designated DLP systems.  Standard security measures are using antivirus software, IDS intrusion detection systems and using firewalls. Firewalls prevents from outsider to access any data inside of the organization. IDS - intrusion detection system detects intrusion attempts by outsiders.  Advanced security measures detect abnormal access to data by using the algorithms, abnormal  email exchange,  honeypots for detecting authorized...

What is Payload in Computer Network??

 What Does Payload Mean? A payload is a computer virus that executes a malicious activity. Basically the speed in which a virus spreads, the threat level of that virus is defined by the damage it makes. Viruses with high and most powerful  payloads would create more harm to the systems. Not all viruses carry a payload, few are dangerous would destroy the system, send spam messages, destroy the data etc., that harm the system or individual. A payload is also called as a destructive payload . Some viruses steal the data by unauthorized access, and destroy data by sending lots of payloads. Payloads are the small portion of the malware which performs malicious action. some Malware also has typical overhead code aimed at simply spreading itself, or avoiding detection.  In Programming sending of  the payload data is mostly sent in JSON Format and XML Format. Hackers send the payload through the emails by links or they bind with any other application, when installed could e...

How does DNS works??

 How does DNS works? Firstly  What is DNS? DNS is defined as the Domain Name System . Domain name system translates domain names into ip addresses, which is loaded by the browser. Every website, every domain has ip address. It is required for the functioning of the internet. How DNS works? Web browser (Client) sends request to the web server, and the web server contains the files of only authorized clients. To determine whether the client is on the authorized list or not, it sends a query to the DNS server and ask for mapping an address to the name. Then DNS resolver sends a request to the DNS server to obtain the IP address of a hostname. DNS resolver is a piece of software code. DNS resolver sends requests to the root server, then root server directs the DNS resolver to the correct TLD server for the requested domain. DNS resolver again redirects to the Top Level Domain (TLD) server, TLD server shares information of all the domain names that shares the extensions such has .c...

WHAT IS HTTP ?? HOW HTTP WORKS?

What is HTTP? HTTP is a protocol. HTTP stands for Hypertext standard protocol . It is defined as a set of rules used for communicating with servers while transmitting any message from client to server. then, what is HTTPS? HTTPS is a secure version of HTTP. "s" is Secure in HTTPS. In HTTPS the data sent is encrypted, so that people don't see the message transmitted over the network. By using the secured version the data sent or received is completely encrypted and no one can impersonate it. When we access a website, our browser sends requests to the server and then the server gives the response in the form of web pages. webpages consist of images, audio, video, html files, and more. How do we access a website? When we access a website, the browser sends a request to a web server and downloads the responses. You need to tell the browser specifically from where to access the resources, this is where the URLs help. URL is a uniform Resource Locator which gives instructio...

Google hacking techniques which many don't know, lets learn 👍💪😲🙌

 How many of know google hacking?? Yes, A search engine google helps in hacking. Google Hacking or google dorking is a search hacking technique that uses advanced queries to find the information. google dorks refer to specific search commands which is written in URL to find the information. A dork comprises of combination of parameter and search operators that are written in search bar. ethical hackers use this advanced search to find the crucial information. With the help of google dorking, any information hidden on public websites and vulnerabilities and sensitive information of any website is exposed. savvy criminals and security analysts also use  dorking for finding the information. osint and security professionals use the whole database and find the vulnerabilities. The Google Hacking Database (GHDB) was initially started by Johnny Long. but is now maintained and updated at Exploit Database. The Google Hacking Database (GHDB) is  categorized index of Internet sea...

DDOS (Distributed Denial-of-Service) Attack and its preventive measures🙌👀

 What is DDOS Attack?? Before knowing that lets know what is botnet? Botnet is defined as group of internet connected devices. It is connection between the computers, smartphones, and IoT. Botnet is combination of one or more bots.  Botnet Attack - Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allows the attacker to access the device and its connection. DOS(Denial of Service) attack is cyberattack in which machine or network resource is made unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. As the name suggests DOS denial of service means the particular host/website which is connected to the internet disrupt causing a error. Now lets learn about DDOS attack, DDOS means Distributed Denial-of-Service attack the incoming traffic flooding the victim originates from many different sources. Attempting to block a single source is not possible becau...

Clearing temporary files and gain additional disk storage space in PC👍💪🙌

 How to Delete Temporary Files in Windows?? Temporary files make use huge space in windows. That will make system storage less and could also have pressure on C drive, make our PC slow.  We have to clean our C drive often to smooth run our PC. If you are running low on hard drive space, is a good way to gain additional disk storage space. Easiest way to delete is below  1) open the Run dialog box, enter WIN+R 2) In the Run window or search box, enter the following command %temp% 3) Select all the files and folders within the Temp folder that you want to delete. CTRL+A to select all the files. Delete all the items in the folder if unnecessary. 4) If there is warning pop up window to delete then SKIP . If you're getting a lot of these messages, check them and  Do this for all current items checkbox and then select SKIP again. 5) In the Run window or search box, enter the following command temp 6) If there is warning pop up window to delete then SKIP . If you're gett...

Hidden URLS of Google Chrome Browser 🙌👍😁

Google Chrome is one of the most used products in todays world.  Whatever we search we type in search bar of chrome. Chrome has the largest consumers in the browser markets. Chrome has many hidden features many are unaware of. In plain terms, the browser has several hidden URLs which get access to many features.  In this article lets know few chrome URLs and their usage. There are many URLs which are meant for debugging purposes. 1) chrome://version/ it displays information about  google chrome version. 2) chrome://nacl/ It displays information about Chrome Native Client (NaCl). It helps developers to test their apps and websites in a sandbox.  3) chrome://media-internals It Show players, audio and video device details 4) chrome://net-export It helps developers in exporting the log of Chrome’s network activity. It helps in finding the illegitimate outbound connections which were established with the PC. 5) chrome://net-internals It lets you access various network s...

Ways to clean your google chrome browser history???🙌👍

 How to clean your google chrome browser history???🙌 It is good to clear chrome history often. In order to be as safe as possible online, it is necessary to delete your search history frequently. Failing to do so makes it much easier for hackers to collect enough of your personal information to scam and deceive you.  Steps to delete chrome history: 1) double click on the google chrome icon on system. 2) when chrome opens go to three dots to the right of the page 3) click on it 4) Go to history -> click on history 5) To the left clear browsing data click on it All the searching history would get cleared once for all. Is that true?? Although we clear the history from the google chrome browser, the system we are using stores some data which could be accessible. How the hackers and system operators get all the data after successful deletion? That's other story lets don't dig into it.  I will give you few techniques which would be helpful 1) open CMD   2) run as ...

Types of Computer Networks?

Before getting into detailed about any other concepts. Lets learn few Networking concepts What is a Computer Network? Computer network refers to interconnected computing devices that can exchange data and share resources with each other. A computer network is a set of devices connected through links for sharing the data. Lets say when two devices are connected to each other they are in network. Computer networks make it very easy to communicate. The four efficient means of data communication Delivery :  The system must deliver data to the correct destination without any interruption. Accuracy :  The system must deliver the data accurately  Timeliness : The system must deliver data in a timely manner. Data delivered late are useless.  Jitter : Jitter refers to the variation in the packet arrival time. If some of the packets arrive with 30-ms delay and others with 40-ms delay, an uneven quality in the video is the result. A data communications system has five compo...

Attacks that are happening in our daily lives!!!

Lets see Few more attacks that are happening in our daily lives but are unaware about it . Social engineering is a term we are hearing now a days a  lot. But  what is it?  Social engineering is a technique which is aimed to target a victim to reveal the information or performing some illegitimate tasks for his benefits. It is like psychological manipulation for the performing actions. Lets see few techniques with examples below Phishing refers to a technique of fraudulently obtain the private information. It is an attack to steal your money, by getting to know about the personal information by the person. Example : The e-mail which gets especially in festival times usually contains a link to a fraudulent web page that seems legitimate—with company logos and content—and has a form requesting everything from a home address to an ATM card's PIN or a credit card number. Vishing also known as " voice phishing ", is again the same practice of revealing the information over a ...

What is Malware?

What is Malware? Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Few are listed Below A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. It infect other computer without the permission or knowledge of the user. Virus may corrupt the system or can steal any data. A worm is a stand-alone malware software that actively transmits itself over a network to infect other computers and can copy itself without infecting files.  A backdoor is a computer program that allows an attacker to gain unauthorized remote access to a victim's machine often without their knowledge. A Trojan horse is any malware that misleads ...

Who is an Hacker?

 Who is an Hacker? The person who enjoys learning  the details of the computer Systems and stretch their capabilities. Someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them – hacking can also be utilized by legitimate figures in many situations. What is Hacking? Hacking is defined as the Reverse engineering of already existing software to make the code better. It may also mean either the attacking of systems to cause a corruption of systems. It is unauthorized access to or control over computer network security systems. Who is a Cracker? Cracker who refers his hacking skills for offensive purpose. They are the people who hack a system by breaking into it and violating it with bad intentions. They attempts to access computer systems without authorization. Types of Hackers White Hats are those having professional hacking skills used for the defensive purposes. These kind of ...

What is an Threat?

What is an Threat? Threat  is a potential violation of security. It is the intention to inflict harm.  What is an Attack? Attack is defined as any action that violates the security. There are two types of attacks passive and active attacks.  1)  An " active attack " attempts to alter system resources or affect their operation. Due to these attacks, systems get damaged, and information can be altered. 2)  A " passive attack " attempts to learn or make use of information from the system but does not affect system resources (e.g., wiretapping). Again here the attack can be carry out by anyone inside the organization or may be outside the organization.  Inside attack is defined as the attack that is initiated inside of the security perimeter in organization. Outside attack is defined as person outside of organization, some unauthorized user. What is a Vulnerability? Vulnerability is the weakness or implementation error that leads to the unexpected event comp...

What is a CYBERATTACK?

 What is a CYBERATTACK A cyberattack is any offensive activity that targets computer information systems, computer networks, infrastructures, personal computer devices or smartphones. In the past few months due to covid-19 cyber attacks have been increased as per the statistics. Many companies, organization's , individuals have to effected because of the cyber attacks. Many factors are involved for the happening of the attack. Some cybercriminals want money, information, others might just want to cause harm for there own pleasure.  Effects of CYBERATTACK Cyber attack could cause financial loss such as theft of money any private information. It can also defame any individual , damage of reputation to any business. Especially teens face cyberbullying through social media/other. Cybercrime has psychological impact on the individuals, those faces may even get into depression, trauma or suicide. It is important to educate kids/teens/youth about cybercrimes. Children and adolescent...

Types of CYBERSECURITY

 Types of CYBERSECURITY The term cybersecurity applies in many contexts, from business to mobile computing. Among them few are listed below Network security is involved in organizations, enterprises, and other types of institutions. It ensures that internal networks are secure by protecting the infrastructure and inhibiting access to it by the intruders. Now a days security teams are using Machine learning to flag abnormal traffic and alert threats in real-time to help better manage network security. Application Security refers to the process of securing the application during software development life cycle (SDLC). Its aim is to improve security practices and, through that, to find, fix and preferably prevent security issues within applications. Security measures are taken in various stages like design, implementation, verification as well as maintenance. Web application security is one branch of application security which is comprises of specifically internet and web systems. C...

What is CYBERSECURITY?

 What is CYBERSECURITY? CYBER : is relating to or involving computers or computer networks. SECURITY :  is protection from, or resilience against, potential harm caused by others, by restraining the freedom of others to act. CYBERSECURITY : Cybersecurity or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide. Cybersecurity is one of the most significant challenges of the contemporary world, due to the complexity of information systems. The field has become of significance due to the expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet ...