How would a potential hacker get hold of password anyway?

There are four main techniques hackers can use to get hold of your password: 1. Steal it. That means looking over your should when you type it, or finding the paper where you wrote it down. This is probably the most common way passwords are compromised, thus it’s very important that if you do write … Read more

AUTHENTICATION(CYBER SECURITY TECHNIQUE)

It is a process of identifying an individual and ensuring that the individual is the same who he/she claims to be. A typical method for authentication over internet is via username and password. With the increase in the reported cases of cyber crime by identity theft over internet, the organizations have made some additional arrangements … Read more

Classification of Cyber Crimes

he cyber criminal could be internal or external to the organization facing the cyber attack. Based on this fact, the cyber crime could be categorized into two types: Insider Attack:An attack to the network or the computer system by some person with authorized system access is known as insider attack. It is generally performed by … Read more

INTRODUCTION TO CYBER CRIME

The internet was born around 1960‟s where its access was limited to few scientist, researchers and the defence only.Internet user base have evolved expontinanlty. Initially the computer crime was only confined to making a physical damage to the computer and related infrastructure. Around 1980‟s the trend changed from causing the physical damaging to computers to … Read more

INTRODUCTION TO CYBER SPACE

Internet is among the most important inventions of the 21stcentury which have affected our life. Today internet have crosses every barrier and have changed the way we use to talk, play games, work, shop, make friends, listen music, see movies, order food, pay bill, greet your friend on his birthday/ anniversary, etc. You name it, … Read more

Patching Linux

Ongoing    patching    is    perhaps    the    best    thing    you    can    do    to    enhance    and    maintain    the security    of    your    Linux    systems.    Regardless    of    the    Linux    distribution    you    use,    using    a tool    to    assist    in    your    patching    efforts    makes    your    job    a    lot    easier. Distribution    updates The    distribution    process    is    different    on    every    distribution    of    Linux.    You   … Read more

Performing General Security Tests

You    can    assess    critical,    and    often    overlooked,    security    issues    on    your    Linux    systems, such    as    the    following: Misconfigurations    or    unauthorized    entries    in    the    shadow    password    files,    which could    provide    covert    system    access Password    complexity    requirements Users    equivalent    to    root Suspicious    automated    tasks    configured    in    cron,    the    script    scheduler    program Signature    checks    on    system    binary    files … Read more

Finding Buffer Overflow Vulnerabilities

RPC    and    other    vulnerable    daemons    are    common    targets    for    buffer-overflow    attacks. Buffer    overflow    attacks    are    often    how    the    hacker    can    get    in    to    modify    system    files, read    database    files,    and    more. Attacks In    a    buffer    overflow    attack,    the    attacker    either    manually    sends    strings    of    information    to the    victim    Linux    machine    or    writes    a    script    to   … Read more

Securing the .rhosts and hosts.equiv Files

Linux    —    and    all    the    flavors    of    UNIX    —    are    file-based    operating    systems.    Practically everything    that’s    done    on    the    system    involves    the    manipulation    of    files.    This    is    why    so many    attacks    against    Linux    are    at    the    file    level. Hacks    using    the    hosts.equiv    and    .rhosts    files If    hackers    can    capture    a    user    ID    and    password    by   … Read more

Cyber Security

Cyber security measures are associated with managing risks, patching vulnerabilities and improving system resilience. Key research subjects include techniques associated with detecting different network behavior anomalies and malware, and IT questions related to IT security. Since these research subjects mainly concentrate on the physical, syntactic and semantic layers, present research infrastructures are focused on studying … Read more