cyber security

Home/Tag: cyber security

TDoS Attack

2021-01-30T09:10:30+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , |

In this post, we are going to talk about TDoS attack. First of all, we recommend that you read our other post, in which we describe the DoS and DDoS attacks: DoS and DDoS Attacks In its annual report "Internet Crime Report" for 2019, the U.S. Federal Bureau of Investigation (FBI) estimated that TDoS attack [...]

What is Kali Linux?

2021-01-20T13:55:44+00:00Categories: Network Administration, Network Security|Tags: , , , , , , , , , , , , , , |

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security,a leading information security training company. In fact, it’s a Debian-based rewrite of their previous Knoppix-based digital forensics and penetration testing distribution BackTrack. One of the biggest reasons cyber professionals use Kali Linux is [...]

Auvik

2020-12-22T10:19:58+00:00Categories: Network Administration, Network Monitoring|Tags: , , , , , , , , , , , , , , , , |

In this post, we are going to introduce you to a powerful tool in the field of network monitoring. It is better to read this blog first of all: Network Monitoring. The tool we are going to discuss is called Auvik network management and monitoring. It is a cloud-based software. Official site of the manufacturer [...]

Technical Support Scam

2020-10-06T08:46:09+00:00Categories: Network Security|Tags: , , , , , , , , |

A technical support scam refers to any class of telephone fraud activities in which a scammer claims to offer a legitimate technical support service. The scammers may pretend to be from a well-known tech company, such as Microsoft. The scammer will typically attempt to get the victim to allow remote access to their computer so [...]

Features of a Powerful Anti-malware

2020-09-23T10:14:48+00:00Categories: Anti-malware & Firewalls|Tags: , , , , , , , , , , , , , , , , , , , , , , |

There are small and large manufacturers that produce powerful anti-malware. So you have to choose one of the products of these manufacturers. There are not many differences between the products of these manufacturers in terms of quality. In fact, there is a very close competition between these products. In this website, we have introduced the [...]

8-Steps to Secure Your Computer

2020-09-23T04:09:03+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

8-Step to Secure Your Computer Whether you use your computer primarily for work tasks or personal use or both, it’s highly likely you want to keep it and its contents safe and secure. Keeping your computer secure helps you avoid malware and direct hacking attempts designed to steal your personal information. In this post, we’ll [...]

DMZ Networks

2020-09-22T07:04:01+00:00Categories: Network Security, Networking|Tags: , , , , , , , , , , , , |

The subject of this post is DMZ networks. But what exactly are the DMZ networks? DMZ ((DeMilitarized Zone) is essentially a military and political term meaning a civilian area. The most famous example of a demilitarized zone right now is the demilitarized zone on the border between South Korea and North Korea:   In [...]

Watchguard Firewall

2020-09-11T12:44:34+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , |

We have introduced several hardware firewalls on this website so far. In this post also, we intend to do the same. Watchguard is one of the well-known manufacturers of network security products. We have examined several well-known firewalls in the network world. Now it is time to check the firewalls of this manufacturer. Watchguard generally [...]

Go to Top