When you surf the Internet, you may feel that you are alone but in fact, everything you do is being watched and recorded. The website you click will retain detailed information about each visitor, the ISP will monitor and store logs of all users, and even plugins and operating systems will collect and share informationRead More
Category: Network Security
HOW TO SET UP DHCP SERVER IN REDHAT LINUX?
INTRODUCTION DHCP is the abbreviation of Dynamic Host Configuration Protocol, mainly used to simplify network management in: The problem of “troublesome” in the configuration of workstation / host network configuration, commonly known as: “” dynamic allocation of IP “”. Compared with the dynamic allocation mechanism, it uses manual and manual methods to set by one,Read More
Best 15 Network Scanning Tools for Network Security
Podcasting:- Best 15 Network Scanning Tools for Network Security Network, the foremost crucial side of the telecom system, is employed to share information and resources exploitation electrical circuit. once it involves sharing of information and resources, security issue crops up. Network scanning, a covenant of Network Security, identifies loopholes and vulnerabilities of the network to safeguard it from new and abnormal behavior that poses a threat to the system spoiling any confidential and private data.Read More
How To Hack Wireless Networks
How Are Wireless Networks Hacked? There are two main types of encryptions used. WEP (Wired Equivalent Privacy) Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standards ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wiredRead More
Mobile Hacking – How to Hack an Android Phone?
Podcasting – Mobile Hacking – How to Hack an Android Phone? A mobile device allows communication between users on radio frequencies. It is used to send emails, multimedia sharing, and also used for internet access. In this period of time mobile has taken over desktops and computers as mobile phones now enable the user toRead More
HOW TO CHECK IF THE LINUX SERVER IS HACKED?
Symptoms of compromised server When servers are invaded by inexperienced attackers or automated attack programs, they often consume 100% of the resources. They may consume CPU resources to mine digital currencies or send spam, or they may consume bandwidth to launch DoS attacks. So the first manifestation of the problem is that the server “slowedRead More
Configuring the X Window System
This document describes how to obtain , Install, configure (configure) XFree86 of Linux system . XFree86 is an enhanced version of Windows x 11r5, mainly in all kinds of support to intel i386 / 486 hard Unix system body platform, of course, this also includes the Linux. It currently supports a considerable number of videoRead More
TOP 7 CYBER SECURITY STANDARDS
When identifying the most useful best-practice standards and guidance for implementing effective cyber security, it is important to establish the role that each fulfils, its scope and how it interacts (or will interact) with other standards and guidance. Cybersecurity standards are generally applicable to all organisations regardless of their size or the industry and sectorRead More
Router As DHCP Server
We love technologies that make our work easy ,one such technologies is DHCP when the network gets bigger and your network admin becomes unreachable to every device on the network he calls one of his friend in deed yes you guessed it right it’s his friend DHCP. Well someone’s friend can be your friend butRead More
What is Boot sequence of router?
Unless you happen to be really savvy about the inner and outer workings of all your car’s systems and its machinery and how all of that technology works together, you’ll take it to someone who does know how to keep it maintained, figure out what’s wrong when it stops running, and get it up andRead More