Information Technology Broadcasting - اطلاع‌رسانی فناوری اطلاعات
408 subscribers
13.9K photos
41 videos
505 files
489 links
Information Technology, Cloud computing, Digital transformation, IoT, Edge computing, IT governance, Fog computing, IT security, IT regulation, IT trends, Programming، Big data, Monitoring, Databases, Api, Service
Download Telegram
Forwarded from Tetis Co.
کسب جایگاه اول گارتنر در Integrated System توسط شرکت سیسکو

سرورهای مدرن شرکت سیسکو این شرکت را در سال 2015 در جایگاه نخست در حوزه Integrated System قرار داد بدین ترتیب این شرکت بالاتر از شرکت های NetApp، HP و EMC قرار گرفت
👇👇👇 👇👇👇
Forwarded from Hadi
Word of the day....

social engineering

Social engineering is a security attack vector that involves tricking someone into breaking normal security procedures.

A social engineer runs what used to be called a "con game." Techniques such as appeal to vanity, appeal to authority and appeal to greed are often used in social engineering attacks. Many social engineering exploits simply rely on people's willingness to be helpful. For example, the attacker might pretend to be a co-worker who has some kind of urgent problem that requires access to additional network resources.
Forwarded from Hadi
Word of the day...

distributed denial-of-service attack (DDoS)

A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.

In a typical DDoS attack, the assailant begins by exploiting a vulnerability in one computer system and making it the DDoS master. The attack master, also known as the botmaster, identifies and identifies and infects other vulnerable systems with malware. Eventually, the assailant instructs the controlled machines to launch an attack against a specified target.