What is a Trojan Horse?
A Trojan horse is type of malware (malicious software) like viruses, worms, rootkits, and spyware. However, unlike viruses and worms a Trojan horse is not able to create copies of itself or in tech...
View ArticleCommon Types of Spyware
There are a many of types spyware. Some of them function solely as spyware, while other only contain features of spyware. Some of the frequently observed spyware types and their characteristics are:...
View ArticleWhat is a Remote Administration Trojan?
Remote Administration Trojans (RATs), sometimes called a remote administration tool, uses a Trojan as the delivery mechanism for a malicious tool, which is used to remotely connect and manage a single...
View ArticleTips to Counter Spyware
In the field of computers and networked communications, spyware has become a menace for lots of computer users and working professionals. Hence, it is essential to take certain precautions to counter...
View ArticleWhat is a Phishing Attack?
Social engineering attacks are designed to trick or deceive victims into disclosing secure or private information. A simple example of this type of attack is a recently fired information technology...
View ArticleHow to Avoid Phishing Attacks
The number and sophistication of phishing scams sent to consumers is increasing rapidly. If you do not know what phishing is you can find out HERE. Because phishing uses social engineering to trick...
View ArticleWhat is Cryptography?
Cryptography is an important part of preventing private data from being stolen. Even if an attacker were to break into your computer or intercept your messages they still will not be able to read the...
View ArticleWhat is a Digital Certificate?
In order to fully understand digital certificates, learning a little about cryptography is helpful. To learn the basics of cryptography go HERE. Digital certificates rely upon public key cryptography...
View ArticleWhat is a Digital Signature?
Like digital certificates a digital signature is created with asymmetric or public-key cryptography. In the same way as signing your name to a document legally binds the document to you, a digital...
View ArticleWhat is Public Key Infrastructure?
Using the technology of asymmetric or public key cryptography, a digital certificate is used to verify a user’s public key. In other words, digital certificates ensure that a user is who he says he is...
View ArticleWhat is a Hash?
A hash, also called a digest, is a unique string of data. A hash is created when a collection of information that you want to protect is run through a hash function. The process of creating a hash is...
View ArticleWhat is Environmental Security?
Environmental security, from a computer networking standpoint, involves protecting and controlling the facilities where your systems are stored. The benefits of well-constructed environmental security...
View ArticleWhat is Access Control?
Access control involves managing who has access to specific systems and resources at a given time. The concept of access control revolves around the process comprised of three steps. These steps are...
View ArticleWhat are Access Control Models?
Access control is the process of deciding who can use specific systems, resources, and applications. An access control model is a defined set of criteria a system administrator utilizes to define...
View ArticleWhat are Password Attacks?
Everyone is probably familiar with passwords. Passwords are the most common access control method used by system administers to manage the usage of network resources and applications. Usernames are...
View ArticleWhat is a Rainbow Table?
A rainbow table is a used to break passwords that have been encrypted into a hash. Rainbow tables are huge sets of precomputed hashes for nearly every possible combination of special characters,...
View ArticleWhy Wi-Fi is Vulnerable to Attack
Wi-Fi, also called wireless internet or a Wireless Local Area Network (WLAN), has increased the availability of internet access greatly. Unfortunately, it has also introduced new security concerns that...
View ArticleWhat is a Spoofing Attack?
Spoofing is when an attacker pretends to be someone else in order gain access to restricted resources or steal information. This type of attack can take a variety of different forms; for instance, an...
View ArticleWhat is a DNS Poisoning Attack?
A Domain Name System (DNS) poisoning attack, also called DNS spoofing, is when an attacker is able to redirect a victim to different website than the address that he types into his browser. For...
View ArticleWhat is ARP Poisoning?
Address Resolution Protocol (ARP) poisoning is a type of attack where the Media Access Control (MAC) address is changed by the attacker. Also, called an ARP spoofing attacks, it is effective against...
View Article
More Pages to Explore .....