//
archives

Internet Safety

This category contains 69 posts

DNS Hijacking

Domain Name System (DNS) hijacking or DNS redirection is “the practice of subverting the resolution of DNS queries. This can be achieved by malware that overrides a computer’s TCP/IP configuration to point at a rogue DNS server under the control of an attacker, or through modifying the behavior of a trusted DNS server so that … Continue reading

Website Defacement

Website defacement is “an attack on a website that changes the visual appearance of the site or a webpage. These are typically the work of hackers and system crackers, who break into a web server and replace the hosted website with one of their own. Defacement is generally meant as a kind of electronic graffiti, … Continue reading

Password Cracking

Password cracking is “the process of recovering passwords from data that have been stored in or transmitted by a computer system. The purpose of password cracking might be to help a user recover a forgotten password, to gain unauthorized access to a system, or as a preventive measure by System Administrators to check for easily … Continue reading

CryptoLocker Ransomware

An advanced version of scareware is ransomware, as it not only scares but also asks ransom after corrupting the computer. The FBI issued a recent warning that a file encrypting ransomware called as “CryptoLocker” is attacking businesses. “Businesses are receiving e-mails with alleged customer complaints containing an attachment that when opened, appears as a window … Continue reading

Backdoor

In computer security, a backdoor is “a method of bypassing normal authentication, of securing illegal remote access to a computer, of obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program or may subvert the system through a rootkit. Many computer worms, install … Continue reading

Forum Spamming

Forum spamming consists of “posting unrelated advertisements, links to malicious websites, and abusive or other unwanted information on Internet forums. Forum spam is usually posted onto message boards by automated spambots or manually with unscrupulous intentions with one idea in mind: to get the spam in front of readers who would not otherwise have anything … Continue reading

CAPTCHA

A CAPTCHA is “an acronym for “Completely Automated Public Turing test to tell Computers and Humans Apart”. This is a type of challenge-response test used in computing to determine whether or not the user is human. “The term was coined in 2000 by Luis von Ahn, Manuel Blum, Nicholas J. Hopper of Carnegie Mellon University … Continue reading

Bots & Botnets

In internet terminology, a bot is a software application that runs automated tasks over the Internet. A group or net of bots is known as a botnet. Several botnets may also be interconnected over the internet to form a large botnet. Uses Typically, bots perform tasks that are both simple and structurally repetitive, at a … Continue reading

Trojan Horse

In computer security, a trojan horse is “a non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target’s computer. The term is derived from the Trojan Horse story in Greek … Continue reading

Blue Screen of Death (BSoD)

The Blue Screen of Death is “an error screen displayed by operating systems after a crash. BSoD is also known as bluescreen, bug check screen, Stop screen, Blue Screen of Doom, or stop error. BSoDs can be caused by poorly written device drivers or malfunctioning hardware, such as faulty memory, power supply issues, overheating of … Continue reading

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 8,492 other subscribers

Blog Stats

  • 104,278 hits
Text is available under the Creative Commons Attribution-ShareAlike License http://creativecommons.org/licenses/by-sa/3.0/; additional terms may apply.