Run Windows

8:10 AM 1

Run Windows We know, we know - who wants to run Windows? But sometimes it's handy, whether to play the latest games or run some niche...

How to hack WIFI

11:32 PM 1

How to hack WIFI You must have desperately wanted to check your mail when you shifted to your new house. The hardest time in your life is...

Targeted Attack

12:53 AM 1

Targeted Attack  Emails can be sent using any "from” email address so it’s possible for someone to send me an email that appears to ...

Snooping

12:42 AM 1

Snooping This is when someone looks through your files in the hopes of finding something interestingwhether it is electronic or on paper. I...

Ransomware

12:32 AM 1

Ransomware What it is: Ransomware is a type of malware that restricts access to your computer or your files and displays a message that de...

Password attack

12:28 AM 1

Password attack  Password attack An attacker tries to crack the passwords stored in a network account database or a password—protected fil...

Junk Mail

12:24 AM 1

Junk Mail You get an email from someone you don’t know, or an impersonal one from your bank —that includes an attachment, a link or a for...

Insider attack

12:19 AM 0

Insider attack An insider attack involves someone from the inside, such as a disgruntled employee, attacking the network Insider attacks ...

Backdoor Attack

12:08 AM 0

Backdoor Attack This can have two different meanings, the original term back door referred to troubleshooting and developer hooks into sy...

SQL Injection

11:49 PM 0

SQL Injection SQLI uses parameters to run SQL statements via your webpages. The SQL statements could be used to dump the contents of a da...

Defacing

11:38 PM 0

Defacing Defacement is a substitution of a web page (or part of a page) by hackers. Defacement is the online equivalent of grafiti.

Botnets

11:26 PM 0

Botnets Botnets are not commonly used for hacking Facebook accounts, because of its high setup costs. They are used to carry more advanced...

Malware

10:32 PM 1

Malware  What is malware and how can we prevent it? Malware is an abbreviated term meaning malicious software. This is software that is s...

keystroking

10:20 PM 1

keystroking K eystroke logging, often referred to as keyloggingor keyboard capturing, is the action of recording (logging) the keys struc...

Worms

9:53 PM 1

Worms A computer worm is a standalone malware computer program that replicates itself in orderto spread to other computers. Often, it uses...

Trojan

7:23 AM 1

Trojan  In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious. The term comes from Greek mythology a...

viruses

11:15 PM 1

virus A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishe...

All Technology @ Tips And Triks 2018. Theme images by enot-poloskun. Powered by Blogger.