Useful tips for everyday
How do I block a website on a Cisco switch? Cisco Blocking Websites 1ST STEP – CREATE CLASS MAP (SOCIAL-SITES) MATCHING THE WEBSITE NAME STRING…
Does Firefox have better security than Chrome? Firefox’s default privacy settings are more protective than those of Chrome and Edge, and the browser has more…
How does Azure Active Directory differ from Active Directory? Azure AD is not simply a cloud version of AD as the name might suggest. Although…
What attacks does asymmetric encryption prevent? Asymmetric encryption solves the problem of having to share without secure communication by enabling communicating parties to share their…
Are SQL injection attacks illegal? In general, any attempt by hackers and profiteers in order to gain access to the information and systems of different…
Is DoS same as DDoS? DDoS. A denial-of-service (DoS) attack floods a server with traffic, making a website or resource unavailable. A distributed denial-of-service (DDoS)…
How do I see if a port is scanning on my network? Normally, port scans trigger huge amounts of requests to different ports or IP…
What is a hardware audit? A hardware audit is an assessment of all the hardware devices that are used to organise the computer network of…
How can SMS be intercepted? SMS messages can be intercepted by hackers due to weaknesses in the rickety old protocol that powers them. This puts…
How to symmetric encrypt a file in GPG? For example to encrypt a file called file.txt using this cipher, use: gpg –symmetric –cipher-algo AES256 file.txt…