Categories
BUSINESS TECH & CYBERSECURITY

Basic Data Security

What is Data Security? is the process of keeping data secure and protected from not only unauthorized access but also corrupted access. The main focus of data security is to make sure that data is safe and away from any destructive forces. Data is stored as rows and columns in its raw form in the […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Hacker/Cybersecurity/I.T Jargon Explained

Have you ever installed an antivirus tool on your computer? Read a story about WikiLeaks or the Arab Spring? Opened a bank account? Then hacking is important to you, even if remains largely in the background of your life. It makes sense to get informed about it. Unfortunately, it is a very technical subject, with […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Most Common Hacking Techniques

What Are Top 10 Common Hacking Techniques? Phishing Denial of Service [ DoS/DDoS ] Waterhole attacks Fake WAP Eavesdropping Keylogging Virus, Trojan Click Jacking Cookie theft Bait & switch Phishing When a hacker uses phishing, he usually replicates a very popular site with the idea of making the user sign in and use his credentials in […]

Categories
Software TECH & CYBERSECURITY

Top 5 Free Windows Antivirus

To begin, i need to mention that Windows Defender is doing a pretty good job at protecting your Windows 10 computer. So all you need is a second option malware scanner. One that doesn’t take the role of your main antivirus but comes with all/some of the features to become one. One of such is […]

Categories
AJULU'S THOUGHTS TECH & CYBERSECURITY

Detect Rootkits In Kali Linux

What is a Rootkit? A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. Rootkits are generally associated with malware – such as Trojans, worms, viruses – that conceal their existence and actions from users and other system processes. You can see in this scene […]