At present, the reach of the internet in our lives has become so high that it is very important for us to be aware of cyber security. Thousands of users on the internet are cheated by hackers every day. In such a situation, it is important for you to know about cyber security on the internet. What are the dangers, what are their types and how to avoid them, we are going to know in this post.
Do you know?
what is spoofing
This is a way by which the attacker does unauthorized access to your computer or server. In this, the attacker sends a message in the computer network and you feel that it has been sent by an unknown person. In this, the attacker changes the IP address. Spoofing is mostly used for DDOS. The full form of DDOS is Distributed Denial of Service Attack. This is an attack on a website or server in the Internet world due to which a website is taken down or closed.
Here, when an attacker hacks a website, he operates that website as per his wish or closes it, then if any user wants to access that website, then it shows the site unavailable. All this work is done by a single person. This is not done by a hacker, for this there is a whole team which together carries out a DDoS attack. In this, the attacker sends many spoofed IP addresses to the server or computer, due to which a lot of traffic comes to the computer, which your computer can handle. In spoofing, the attacker sends you a mail which looks exactly like an email and a link is given in it. As soon as you click on that link, a virus enters your computer or server.
gather knowledge 👇
what is hacking
Nowadays the demand for computers and smartphones has increased so much that people cannot do their work without using them. Whether you work in a company or have a business, you need both these things. Have you heard about cybercrime? This will be a crime in which hackers steal important information and personal files from other people’s computers or smartphones and blackmail them and demand money or they can also put your personal information on the internet. The person doing the hacking will be called a hacker. And he knows a lot about computers
In hacking, the hacker finds an entry point in the computer from where he can enter the computer. The purpose of hacking is to damage a computer or to extract special information from the computer. We can see hackers in two ways. There are some hackers who do hacking for good work and do not cause any harm to anyone. We call them White Hat Hackers and there are some hackers who use hacking to harass others or to steal their important files from their system. They are called Black Hat Hackers to steal from
what is cracking
Cracking is a technique by which computer software is used to break or destroy the system completely. It is similar to hacking. Cracking is a big crime. You can understand Crackers in the same way as theft in a bank. In the same way a thief breaks the lock to break the lock, a Cracker also cracks the programs and accounts of the computer. There are three types of Cracking, Password Cracking, Software Cracking, Network Cracking, Cracking is done for those Software’s which we either store or If you buy it from a dealer or buy it online, a hacker breaks the codes of those softwares and activates those softwares through illegal means without paying. These softwares are also called Pirated Software.
what is phishing
The very name of Phishing shows that just as you are talking about catching fish in a pond, just like a fish is caught by throwing something in the pond, in the same way a mail or message is sent to you in the computer through which a hacker can gain access to your computer. Or can extract your information from smartphone, Phishing is a cyber crime in which getting information about your important information like banking, credit/debit card details, password etc. is called Phishing.
In this, you are called or messaged by any bank or any legitimate organization but they have not really come from them, they are fake. Phishing is a type of social engineering attack which is often used to steal user’s data. Phishers use social media sites and emails to get information about someone and from here they extract your personal details like your name, work history, about your hobbies, there are five types of phishing –
what is spam
With the increasing use of computers and mobile devices, we get to hear many other things. If you use these devices or have an email account, then you must have heard the word Spam. The word Spam means any unwanted e-mails. Even the receiver of these e-mails does not know where they have come from and who has sent them. Although e-mails are used to give important information, some attackers use them to harass others. To do this, we call the unwanted mails that come to you as Spam.
Nowadays, it is common to receive spams and email companies have installed antispam programs for security purpose so that no such mail can reach you and even if it comes, a separate folder is created with the name Spam and they go into it, which The person who sends spam is called Spammer. Because of Spam Mails, many frauds happen these days. Some people have made it their source of income. They send wrong mails to people and take their personal information. If your system is working properly. So you should understand that the number of Spams in your account is less. The only way to stop Spams from coming into your system is to keep changing your password frequently or keep it so that no one can hack it. Some Spammers will attack your Mails. Adopt new technology to enter into
what is adware
Adware is a software package that automatically breaks any advertisement into pieces and shows it on the screen. It is completely free software. When you are doing any work, you can visit any website with the help of Adware. An Internet connection is required to run. Before installing Adware in your computer, you should check whether it is from a good company or not because some Adware work as spyware which gives information about your computer to the Internet. send to another computer through
Adware reduces the speed of the computer. If the speed of your computer is slow, then there may be Adware in your computer. The reason for creating Adware is to earn money or to steal any of your personal details from your computer and share it with a third person. There are some software’s with the help of which you can catch Adware in your computer or prevent them from coming like Avast, AVG etc. Most of the Adware are safe but some are so dangerous that they can be installed on your computer. can steal your information
what is a rootkit
Rootkits are usually used to do wrong things. They create a place in the computer where usually there is no software. Even the user is not aware of it. Sometimes they take the shape and form of other software. When you install any software, it gets installed in your computer along with that software and the user does not even know. When Rootkit is installed on your computer, then all the control over your computer is lost. It becomes an attacker’s power, he can extract any of your personal information from your computer and blackmail you. Rootkit Viruses are not easily caught by Anti Virus Software. Rootkit Scanner is required to detect them.
If Rootkit is installed in your computer then either you have to completely install your operating system due to which the entire information of your computer is lost. If there is Rootkit in your computer then it turns off your Antimalware Protection and if If the Windows Settings of your computer are changing automatically, then this is also due to Rootkit Infection. It is made in such a way that it is not easy to catch and remove it. To catch and remove it, you either have to uninstall your operating system. You have to install it completely or there are other software available with the help of which you can detect them.