Soft2Secure

Author Archive

Hacking Basics. Part 3

Hacking Basics. Part 3

5. Who hackers are – who are those guys out there? The next thing to be discussed is planning attacks, overview of this. The first thing in planning an attack is what you are trying to get out of the hack. You know, now people worry about stealing usernames for bank accounts, online banking. I […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Hacking Basics. Part 2

Hacking Basics. Part 2

3. The Fog of Law If you are hacking for malicious, nefarious, evil reasons, you probably already know you are on the wrong side of the law so can turn out this section; for those out there who are white or grey hat hackers you do need to listen to what I am about to […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Hacking Basics: Introduction to Hacking

Hacking Basics: Introduction to Hacking

This is a starting guide to hacking. In general, there will be a series of articles to show you how to hack computers, networks etc. Disclaimer! As far as posters and drafters of this article are concerned, hacking is simply a technical skillset, so understanding how hacking works, how hacking attack happens, the ability to […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Computer Security Basics. Part 3

Computer Security Basics. Part 3

Rule 8: Privileges and Permissions You can’t break what you can’t touch The next way to protect your computer is to properly use privileges and permissions. That means every computer has an operating system with users having different permission levels built into them. So the main user at any computer is considered to be Administrator, […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Computer Security Basics. Part 2

Computer Security Basics. Part 2

Rule 4: AntiVirus Software – Beware the Wolf in AntiVirus Clothing Yes, of course, updates are nice, but we also need to kill the viruses, to stab’em in the heart and kill’em dead; that is really cool, and that is where antivirus software comes in. Antivirus software is computer software that resides on your computer […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Cyber Crime Origin: Russia as a Nursery

Cyber Crime Origin: Russia as a Nursery

The article starts explaining why and how Russia hosts probably the most capacious source of malicious programs worldwide. It’s common knowledge that most of the contemporary computer threats come from countries which do not apply appropriate effort to nip malware developers/releasers. A good or rather the most striking example of such kind is Russia, notorious […]

Read more →

Posted in: News

Leave a Comment (0) →
Page 38 of 40 «...1020303637383940