DDOS ATTACK

DDOS ATTACK IS AS SIMILAR AS DOS ATTACK

In a DDOS attack more traffic comes into a victim’s system on many different sources and the victim is impossible to stop their traffic the victims system can’t handle this traffic then crash their system …



How to know your system is hacked by DDOS attack???

  • Slow access to your file
  • Network disconnected
  • Problem accessing all websites
  • Excessive amount of spam emails
  • More fake websites pop up to your system

How to protect yourself from ddos attack??

  • Rate limit your router to prevent from being overwhelmed.
  • DNS is the weapon to secure yourself from DDOS attack because in this case your ip address will be hidden and anybody can’t detect you..

DDOS ATTACKS MORE TRAFFIC??

DDOS attack effective more than 2.5 to 3 years , it effects 5% of monthly gaming related traffic , and 30% of gaming traffic while they are occurring.

WHAT CAN DO THE POLICE IF A DDOS ATTACKER CATCHED ?

First thing this is illegal , and if the hacker caught then 10 years in prison and 5,00,000$ fine according to federal act.

TROJEN HORSE

You protect your devices from trojen horse through some knowledge

WHAT IS TROJEN HORSE ATTACK ?

A trojen horse software is a malicious software look like a legitimate, but if any way it’s come in to your system then destroy all files..


HOW TO DETECT TROJEN VIRUS INTO YOUR SYSTEM ??

  1. Press ctrl+alt+del
  2. When the task manager is detected , click on the “processes” tab .
  3. Check for any suspicious file running application without verified publishers.
  4. Click on it and end it processes.

WHO IS INVENTED TROJEN HORSE ?

John Walker firstly find trojen horse in 1975 …

HOW DOES TROJEN HORSE WORK ON YOUR SYSTEM ??

You think you have received an email from someone who know , you click on it and look like a legitimate attachment but you have been fooled , when u click on these emails then ultimately the malicious software installed .. when you execute the program the malware spreads to other file and harm your computer and damage your file .


HOW TO PROTECT YOURSELF FROM THESE TYPES OF ATTACKS??

  • Never click on that guy emails u don’t trust .
  • Never open an attachment or run a program to sent u in an email through unknown person.
  • Keep all your system in your computer upto date.
  • Make sure in your system trojen anti-virus installed.

TYPES OF TROJEN VIRUS ATTACK??


  • Backdoor trojans
  • Exploit computer
  • Rootkit trojans
  • Banker trojans
  • DDOS attack
  • Downloader Trojans

Examples of Trojans:

  • Zeus
  • Wirenet
  • Mobile banking trojan

KEYLOGGER

Secure your online privacy through some knowledge

WHAT IS KEYLOGGER ATTACK??

Keylogger is a spyware where hacker theft their all online information through a button(known keylogger) which is situated in keyboard layout.

HOW TO PROTECT YOURSELF FROM KEYLOGGER ATTACK??

  • Use Anti key-logger software
  • Keep antivirus protection
  • Strong password policy
  • Disable file access running and external resource

HOW DOES IT WORK??

Keylogger is a type of surveillance tool used to monitor and record each victim activity what they typed , If a user keyboard has a keylogging then what activity he/she done all information gather and go to hand in third party..


Useful for :

Parental control:

If a parent know want all online activity what their children do then used keylogger.

Better-half :

If you have doubt on your better half then used keylogger on their lapi or pc


TYPES OF KEYLOGGER??

Two types of keylogger:

1 . Hardware keylogger (computer keyboard)

2 . Software keylogger (which is activated by phishing email)

If u don’t yet plz remove your keylogger on window 10

DOS ATTACK

DENIAL OF SERVICE ATTACK

DOS attack used for crash victim system , when the hacker perform DOS attack he/she can used flooding I mean hacker create more traffic on victim website which is not handled by network system, and then crash the victim system ,


The dos attack used against high profile like banking, commercial site etc.

HOW TO PROTECT YOURSELF FROM DOS ATTACK–

  1. hardware and software firewall
  2. Use web firewall
  3. Anti dos hardware or software used
  4. Use cloud based dns
  5. Upgrade home firewall

Firewall is the closed door on site which makes your system protective.

DOS ATTACK

PHISHING ATTACK

Firstly I clear that this type of theft is not done by hackers it will done only by crackers I mean black hat hacker who are a black spot for hackers …

Phishing is a type of social engineering attack often used to steal user data , including login credential and credit card numbers..

How do you know you have been trapped in phishing attack????

  • Locked accounts
  • Unfamiliar transactions
  • Spam email coming from your account

How to protect yourself from phishing attacks???

  • Don’t clock any doubting link which is look like a fraud
  • Install firewall
  • Don’t give your information to an unsecured website.
  • Get free anti-phishing adds on

How it is worked???

If u open an attachment clicks on phishing link in these emails or messages that appear to be from someone you know and trust, then malicious software like spyware, ransomware will be installed on your device , it usually happened behind the scene so the average person can’t detect it..

Phishing attack through email, messages

What should if you have been phished??

  • Change your credential information
  • Change your username and password
  • Disconnect the device
  • Deal with the phishing email
  • Backup files
  • Scan your system for malware
  • Report it(ICO)

Hackers and Crackers are different

Mostly crackers used these activities..

RANSOMEWARE

PAY FOR UNLOCK YOUR ENCRYPTED FILE

Ransomeware is a type of attack in which the attacker locks and encrypt the victim data, important files and then demands a payment to unlock and decrypt the file..


2017 RANSOMEWARE PAGE

The most famous ransomeware attack is wannacry which is done in 2017 , affected 150 countries and 20,000 computers and demanding 4$ bitcoin payment .


How this ransomeware affected our system??

When the user on their system click on a link, visits web pages or installs files or program that includes malicious code designed to covertly download and install the ransomeware .

Ransomeware attack process —

  • PHISHING EMAILS
  • SOCIAL MEDIA
  • MALVERTISING
  • POP-UP ON YOUR SCREEN
  • EMAIL ATTACHMENT
MOSTLY USED PROCESS

Ransomeware process :

  1. INFECTION
  2. EXECUTION
  3. ENCRYPTION
  4. USER NOTIFICATION
  5. CLEAN UP
  6. PAYMENT
  7. DECRYPTION
RANSOMEWARE ATTACK PROCESS

PROTECTION BY RANSOMEWARE:

  • Antivirus
  • Data backup (use 3-2-1)
  • Email protector
  • Ransomeware defense

How to remove an active ransomeware infection::-

Isolate:

Identify infected machine disconnected from networks and locks drives to prevent encryption.

Investigate:

Check what strain on ransomeware , you were hit on it ,and check there are any decryption available

Ransomeware attack..

Email::

hackersw32@gmail.com

CYBER ATTACK

A cyber attack is an exploitation of computer system or networks.

CYBER ATTACKS IS MORE TYPES TODAY WE TALK ABOUT MALWARE ATTACKS..

1 . MALWARE

Malware breaches a network through a vulnerability, typically when a user clicks on a dangerous link or email attachment files that then installed their system risky software which is steal your data and information..

It will comes a in second way through pop-up ads on your computer screen when you click on these ads then harmful software comes in your system.

If your computer or laptop is slow and lacks multiple time then your system is infected by malware..

How do you know your system is infected by malware attack??

THE MOST POPULARE MALWARE ATTACK IN 2017 WANNACRY RANSOMEWARE ATTACK WHICH IS INFECTED 200,000 COMPUTERS AND TARGETED ALL COUNTRIES… CREATE BY KOREAN PROGRAMMER.

How we protected from these types of attack??

We buy a antivirus software package and be safe from fraud emails and pop-up link clicks…


http://wix.to/yEDCCCw?ref=cl

Introduce Yourself (Example Post)

This is an example post, originally published as part of Blogging University. Enroll in one of our ten programs, and start your blog right.

You’re going to publish a post today. Don’t worry about how your blog looks. Don’t worry if you haven’t given it a name yet, or you’re feeling overwhelmed. Just click the “New Post” button, and tell us why you’re here.

Why do this?

  • Because it gives new readers context. What are you about? Why should they read your blog?
  • Because it will help you focus your own ideas about your blog and what you’d like to do with it.

The post can be short or long, a personal intro to your life or a bloggy mission statement, a manifesto for the future or a simple outline of your the types of things you hope to publish.

To help you get started, here are a few questions:

  • Why are you blogging publicly, rather than keeping a personal journal?
  • What topics do you think you’ll write about?
  • Who would you love to connect with via your blog?
  • If you blog successfully throughout the next year, what would you hope to have accomplished?

You’re not locked into any of this; one of the wonderful things about blogs is how they constantly evolve as we learn, grow, and interact with one another — but it’s good to know where and why you started, and articulating your goals may just give you a few other post ideas.

Can’t think how to get started? Just write the first thing that pops into your head. Anne Lamott, author of a book on writing we love, says that you need to give yourself permission to write a “crappy first draft”. Anne makes a great point — just start writing, and worry about editing it later.

When you’re ready to publish, give your post three to five tags that describe your blog’s focus — writing, photography, fiction, parenting, food, cars, movies, sports, whatever. These tags will help others who care about your topics find you in the Reader. Make sure one of the tags is “zerotohero,” so other new bloggers can find you, too.

Design a site like this with WordPress.com
Get started