Posts

Showing posts from January, 2022

what's secure shell and how do I use it ?

  What’s a secure shell(ssh)? It is a protocol implemented by other programs to access one computer from another computer securely. It is often used to log in and access remote computers but it can also be used to transfer data. How do I  use ssh? To connect to your server using ssh, two things are required •             Login Credential •             An interference If you use Mac or Linux, you don’t need to install a ssh client since there is inbuilt interference with the operating system.   If you have a windows operating system. Here are some clients for Windows  1.           Putty 2.            Solat putty 3.            SecureCRT 4.     ...

MAN-IN-THE-MIDDLE ATTACK

Image
  There are different cyber-attack methods in cyberspace or on the internet. One of the oldest attacks is MITM (MAN-IN-THE-MIDDLE ATTACK). As the name implies, the attacker plays a middle man role between the end-user and an application. The attacker intercepts the communication between the two parties and manipulates it. The attacker may use this method to steal login credentials, personal information, or to spy. This method usually has two phases' interception and encryption.     How to protect yourself from MITM Avoid using wifi that is not password protected. Pay attention to browser notifications, Don't use public WIFI when accessing sensitive information. https://www.iflscience.com/technology/maninthemiddle-attack-tips-for-mitm-attack-prevention-and-detection/

What is a cyber attack ?

Image
A cyber-attack is an unwelcome attempt to steal, expose, alter, disable or destroy information through unauthorized access to computer systems.  It has been a common word on different media lately. As any other actions, cyber-attacks have actors, reasons, targets, and impacts. Who is behind cyber-attacks? Cyber attackers broadly fall under two categories:   Insider threats          These are  individuals working within the organization and have legitimate access.    O utside threat            pose threats to organizations from outside.     it  includes: Organized criminals or criminal groups Professional hackers, like state-sponsored actors Amateur hackers, like hacktivists what are the reasons behind cyber-attacks? The motive depends on the actor behind the attack. the most common reasons behind cyber-attacks are    To make a poli...