Terms used in the field of hacking.

Adware − Adware is software designed to force pre-chosen ads to display on your system. Attack − An attack is an action that is done on a system to get its access and extract sensitive data. Back door − A back door, or trap door, is a hidden entry to a computing device or software … Continue reading Terms used in the field of hacking.

Device Hardening

Device hardening involves implementing proven methods of securing the device and protecting its administrative access. Some of these methods involve maintaining passwords, configuring enhanced remote login features, and implementing secure login with SSH. Defining administrative roles in terms of access is another important aspect of securing infrastructure devices because not all information technology personnel should … Continue reading Device Hardening

Man In The Middle Attack (MITM)

There are 7 types of MITM attacks.Cybercriminals can use MITM attacks to gain control of devices in a variety of ways.  IP spoofing Every device capable of connecting to the internet has an internet protocol (IP) address, which is similar to the street address for your home. By spoofing an IP address, an attacker can … Continue reading Man In The Middle Attack (MITM)