Tuesday, June 26, 2018
Monday, June 25, 2018
how to Protecting your home computer network
Scott Jones is the Director General of Cyber Defence at the
Communications Security Establishment (CSE). CSE provides advice,
guidance and services to help protect government networks and electronic
information. The Cyber Defence branch at CSE works to stop malicious
cyber threats on government systems and helps departments understand the
cyber threat environment.
what is DDoS attack???
DDoS is short for Distributed Denial of Service. DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.
GLO Gives up to 6GB Free Data on Recharge
Globacom is here with an amazing offer! Nigeria's first indigenous telecom operator, Globacom has launched the Glo Yakata tariff plan
in Nigeria that gives both new and existing Glo customers up to 22
times values on all their recharges. These benefits include free data,
unlimited Glo to Glo calls and free minutes to call other networks.
Sunday, June 24, 2018
Friday, June 22, 2018
Tuesday, June 19, 2018
how to earn airtime for any network with opera news
how to get free airtime for all network
to start earning free airtime simply download
and install the opera news app by the following
link here
after installation then launch it and claim you airtime
then start referring people to get more money
but you have use the referalls code that giving to you
on the application to get more friend and more money
the more you referring the more you earn
to start earning free airtime simply download
and install the opera news app by the following
link here
after installation then launch it and claim you airtime
then start referring people to get more money
but you have use the referalls code that giving to you
on the application to get more friend and more money
the more you referring the more you earn
Monday, June 18, 2018
Saturday, June 9, 2018
latest vivo-y65-launched-featuring-eye
Vivo Y65 sports 5.5 inches TFT LCD display at 1280 x 720 pixels
resolution. The screen has a measurement of 153.56 x 75.79 x 7.49 mm,
and weighs at 157g on a plastic build. The phone which is tagged your
life, your shots" features 13 megapixels rear camera with LED flash, and 5MP front-facing sensor for selfies.
Thursday, June 7, 2018
What is Bitcoin mining?
As mentioned in an earlier section, one can think of Bitcoin as one big
global ledger system that records transactions (or ‘moving money’)
between one person to another. Whenever Bitcoin transactions are
processed on the Bitcoin network – that means Bitcoin is moved from one
person to another – someone has to make sure all the transactions are
recorded properly and that the ledgers on all the systems are
synchronized all over the world.
Wednesday, June 6, 2018
How Bitcoin Mining Works
When you hear about bitcoin "mining," you envisage coins being dug out of the ground.
But bitcoin isn't physical, so why do we call it mining?
Because it's similar to gold mining in that the bitcoins exist in the protocol's design (just as the gold exists underground), but they haven't been brought out into the light yet (just as the gold hasn't yet been dug up). The bitcoin protocol stipulates that 21 million bitcoins will exist at some point. What "miners" do is bring them out into the light, a few at a time.
They get to do this as a reward for creating blocks of validated transactions and including them in the blockchain.
But bitcoin isn't physical, so why do we call it mining?
Because it's similar to gold mining in that the bitcoins exist in the protocol's design (just as the gold exists underground), but they haven't been brought out into the light yet (just as the gold hasn't yet been dug up). The bitcoin protocol stipulates that 21 million bitcoins will exist at some point. What "miners" do is bring them out into the light, a few at a time.
They get to do this as a reward for creating blocks of validated transactions and including them in the blockchain.
Is Bitcoin used by criminals?
There is often public misconception that Bitcoin is mostly used by
criminals, but nothing could be further from the truth. This is mainly
because many people think Bitcoin is anonymous, when in fact it’s the
opposite - all Bitcoin transactions are transparent for the whole world
to see. People might not be able to link the identity to Bitcoin right
away (that is also why it is sometimes called ‘pseudo anonymous’), but
once they do, they can track everything you’ve ever done on the Bitcoin
network. This makes it a particularly bad tool for illicit use.
While Bitcoin might actually turn out to be one of the safest and least ‘bad’ ways to use money, it doesn’t mean that criminals don’t use it. Just like normal money, they do. But there are two important things to note - firstly, that as more data becomes available in the industry, the more it is becoming clear the number of bad uses is very, very minute - if the entire Bitcoin ecosystem is represented by a big mountain, the size of the bad parts is a couple of rocks. Second, that in any financial system, this is a risk that can never be eliminated, merely mitigated, and Bitcoin has some of the best tools in the world for that.
While Bitcoin might actually turn out to be one of the safest and least ‘bad’ ways to use money, it doesn’t mean that criminals don’t use it. Just like normal money, they do. But there are two important things to note - firstly, that as more data becomes available in the industry, the more it is becoming clear the number of bad uses is very, very minute - if the entire Bitcoin ecosystem is represented by a big mountain, the size of the bad parts is a couple of rocks. Second, that in any financial system, this is a risk that can never be eliminated, merely mitigated, and Bitcoin has some of the best tools in the world for that.
best ways to make money while you sleep
You snooze, you lose, right? Well, not necessarily. Making money wile you sleep is possible with these smart ways listed below.
Tuesday, June 5, 2018
Monday, June 4, 2018
How to detect malware on your android phone?
Android is the most widely used mobile operating system in the world. It
currently holds more than 65 percent of market shares globally with
over a billion users. As evidenced by the recent spate of trojan viruses
hackers are constantly changing their tactics to trick Android users
into installing malware. In this world of mobile attacks, the security
of your device is as critical as ever.
Sunday, June 3, 2018
How to Hide Your Online Status in WhatsApp
By default, WhatsApp shows your friends whether you’re online now or
when you were last online. If you prefer, you can hide your status..
What Is A SIM Card (And What Comes Next)?
A Subscriber Identity Module (SIM) card is a chip inside most modern
cellular phones that stores information your phone needs to communicate
with your carrier’s cell towers. SIM cards come in different sizes and
if you were to remove the SIM card from your phone you wouldn’t be able
to text, call, or access anything on the internet.
Has ESET discovered anything big in botnets this year?
Yes, our investigation into Operation Windigo
resulted in one of ESET’s biggest botnet research projects ever. Our
research team uncovered a network of infected servers employed to
redirect users to malicious web content, steal credentials, and send
spam. We discovered that over the last few years more than 25,000
servers had been infected. At the time of writing our report, more than
10,000 servers were still infected. (Editor: You can download the award
winning research paper on Windigo here.)
What are the biggest risks for home users and businesses with regards to botnets?
The risks associated with botnets are exactly the same as the risks
associated with malicious software in general. The risks are varied; one
can have sensitive information stolen from the electronic device, such
as intellectual property, blueprints, or passwords giving access to
sensitive resources (for example online games). Infected computers can
also be used to overload servers or send spam.
What is a botnet, how does it work and how does it spread?
The word botnet is made up of two words: bot and net. Bot is short for
robot, a name we sometimes give to a computer that is infected by
malicious software. Net comes from network, a group of systems that are
linked together. People who write and operate malware cannot manually
log onto every computer they have infected, instead they use botnets to
manage a large number of infected systems, and do it automatically. A
botnet is a network of infected computers, where the network is used by
the malware to spread.
Subscribe to:
Posts (Atom)