Guys give me few days, I will be back... During this gap time enjoy with a fk..ing server
Welcome to Hell
"Be quieter learn Fast"
Friday, 17 April 2020
Saturday, 28 November 2015
HOW OPTICAL FIBER COVERED OUR WORLD
There is a video that is show how optical fiber covered our world. if you want to know about this please watch the video, i think you enjoy it.
WHAT IS HTTPS
HTTPS is nothing it is combination of HTTP+SSL. SSL means secure socket layer. please watch the bellow video for something do better.
OSI (Open Systems Interconnection) Model Explain
OSI layer is a nothing but it has 7 type of logical layer. When two computer connected and one computer send a data(information) to another computer, this time OSI layer works silently. There is a picture of OSI model :
1. PHYSICAL LAYER - Physical layer is nothing, it is all the wiring and cabling, if data cable is unplug that is a physical layer problem.
2. DATA LINK LAYER - Data link layer is nothing, it is the layer that switches operator. when many computer connected in a switch they can talk to each other, that happening is called data link layer.
3. NETWORK LAYER - Network layer is the layer that is router operator. if you know your home router, it is operate the network layer, so your IP(internet protocol) address is a network layer.
4. TRANSPORT LAYER - This layer works to decide how much information should be send in one time between one computer to another computer.
5. SESSION LAYER - Every time a computer communicate with a another computer they have to create a session. when you open your bank website or facebook page this time you create a session between your computer and their computer.
6. PRESENTATION LAYER - Presentation layer is nothing it is basically Operating system. it is also GIF, JPEG, MP3 etc. Mainly it is represent your data's extension.
7. APPLICATION LAYER - Application layer is actually application that the user interacting with to send information back before, example - internet explorer, google chrome, mozila firefox etc.
So, friends i think now osi model is easy to you. if there are any confusion then please mail me or comment bellow i will resolve it as soon as possible.
Sunday, 21 June 2015
Man in the Middle Attack
A man-in-the-middle attack is one in which the attacker secretly
intercepts and relays messages between two parties who believe they are
communicating directly with each other. It’s a form of eavesdropping but
the entire conversation is controlled by the attacker, who even has the
ability to modify the content of each message. MIM attacks
pose a serious threat to online security because they give the attacker
the ability to capture and manipulate sensitive information in real-time
while posing as a trusted party during transactions, conversations, and
the transfer of data. Every important data will be lose when someone create a middle attack, so secure your system.Everything in my blog is only for education purpose.
Monday, 1 June 2015
What is phishing page?
Phishing is the illegal attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.[1][2] The word is a neologism created as a homophone of fishing due to the similarity of using fake bait in an attempt to catch a victim. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware.[3] Phishing is typically carried out by email spoofing[4] or instant messaging,[5] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users,[6] and exploits the poor usability of current web security technologies.[7] Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. Many websites have now created secondary tools for applications, like maps for games, but they should be clearly marked as to who wrote them, and users should not use the same passwords anywhere on the internet.
Phishing is the illegal attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.[1][2] The word is a neologism created as a homophone of fishing due to the similarity of using fake bait in an attempt to catch a victim. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware.[3] Phishing is typically carried out by email spoofing[4] or instant messaging,[5] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users,[6] and exploits the poor usability of current web security technologies.[7] Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. Many websites have now created secondary tools for applications, like maps for games, but they should be clearly marked as to who wrote them, and users should not use the same passwords anywhere on the internet.
Phishing is a continual threat that keeps growing to this day. The risk grows even larger in social media such as Facebook, Twitter, Myspace etc. Hackers commonly use these sites to attack persons using these media sites in their workplace, homes, or public in order to take personal and security information that can affect the user and the company (if in a workplace environment). Phishing is used to portray trust in the user since the user may not be able to tell that the site being visited or program being used is not real, and when this occurs is when the hacker has the chance to access the personal information such as passwords, usernames, security codes, and credit card numbers among other things(this post is only for education)
thanks to wikipedia
Subscribe to:
Posts (Atom)