Posts

BYOD Policy

This document is intended to communicate corporate policies established for Bring Your Own Device(BYOD) practices. Devices such as smart devices (i.e. Smart Phones and Tablets PCs) and laptops are concerned by this document. Usage and access to corporate network and corporate resources are provided under the condition that users have carefully read and understood the contents of this document and sign that they agree to adhere to this corporate BYOD policy. Expectation of Privacy SLIIT will requests access to the device by technicians to respect their privacy with your personal device and to respond only to security checks or to legitimate requests for discovery resulting from administrative criminal proceedings or civil. Acceptable Use ·          Devices should not be used by the users in a way that it will not hares others. ·          Devices should not be used by the users to navigate ...

Firewall

Hellow Peeps!! Today i'm going to talk about  the firewall. so let's see what is firewall and what firewall can do. What is the Firewall? Most of us may have heard the term, and know it’s related to security in some way, but do you really know what is a firewall? Traditionally, firewalls were built to keep danger at bay, they were doors (or walls) to block fire from coming into another area, hence the name firewall. When you’re thinking in terms of your online security, modern-day hardware and software firewalls are similar. They act as barriers to prevent unauthorized access to your personal information. Firewalls are software programs or hardware devices that filter the information coming through your Internet connection to your computer (and all the devices that are connected to that connection). A firewall protects you and your devices by examining each piece of information that flows between your devices and the Internet. Hardware firewalls, such as those includ...

VPN

Image
Hellow Peeps!!! Today I'm going to say some kind of thing, we need to know before the hacking or when we use the internet. What is VPN?  VPN is a Virtual Private Network. A VPN hides the IP address, communication of your computer and the internet.  This impenetrable tunnel prevents criminal organizations, your ISP or even your government to spy on your communications. It enables a host computer to send and receive data across shared or public networks as if they were an integral part of the private network with all functionality, security, and management policies of the private network. This is done by establishing a virtual Point To Point connection through the use of dedicated connections, encryption, or a combination of the two.   Why we need the VPN? Get a new IP address: - when we use the VPN it will give a new IP address to us. then nobody can discover our identity through it. Bypass censorship: - with the VPN you will taste ...

IoT Fuels Growth of Linux Malware

Malware targeting Linux systems is growing, largely due to a proliferation of devices created to connect to the Internet of Things. That is one of the findings in a report WatchGuard Technologies, a maker of network security appliances, released last week. The report, which analyzes data gathered from more than 26,000 appliances worldwide, found three Linux malware programs in the top 10 for the first quarter of the year, compared with only one during the previous period. "Linux attacks and malware are on the rise," wrote WatchGuard CTO Corey Nachreiner and Security Threat Analyst Marc Laliberte, coauthors of the report. "We believe this is because systemic weaknesses in IoT devices, paired with their rapid growth, are steering botnet authors towards the Linux platform." However, "blocking inbound Telnet and SSH, along with using complex administrative passwords, can prevent the vast majority of potential attacks," they suggested. New Avenue for...

OAuth 2.0 - FaceBook App

Image
What is OAuth OAuth is a framework for delegated authorization. The OAuth 2.0 specification defines a delegation protocol that is useful for conveying authorization decisions across a network of web enabled application and APIs. OAuth is used in a wide variety of applications, including providing mechanisms for user authorization. Facebook apps are very fashionable because of varied reasons, most of the time these apps are designed for entertainment functions. In nowadays we all can see the attractive facebook app in your timeline. when you have clicked that app, they ask you to log in with Facebook, Gmail, Twitter like this. that means you can perform an action on a behalf of the user. In a way, that application owners are getting information about you. OAuth allows an end user's account information to be used by third-party services such as Facebook without exposing the user's password. In this blog, I'm going to write how to make Facebook app using OAuth 2.0 ...

Phishing

Image
Phishing on Course web at SLIIT What Is Phishing?                   Phishing is the attempt to obtain sensitive information such as usernames, passwords and credit card details , often for malicious reasons, by disgusting as a trustworthy entity in electronic communication. What is spear phishing attack ?                   S pear phishing  is an email that appears to be from an individual or business that you know. But it isn't. It's from the same criminal hackers who want your credit card and bank account numbers, passwords, and the financial information on your PC. Introduction ?         First you need know some details about how it will be work. Phishing attack can be done creating web pages like original web sites. Attacker create similar site like original one and host that site in the server and send that link to the target person o...