Forwarded from Tetis Co.
کسب جایگاه اول گارتنر در Integrated System توسط شرکت سیسکو
سرورهای مدرن شرکت سیسکو این شرکت را در سال 2015 در جایگاه نخست در حوزه Integrated System قرار داد بدین ترتیب این شرکت بالاتر از شرکت های NetApp، HP و EMC قرار گرفت
👇👇👇 👇👇👇
سرورهای مدرن شرکت سیسکو این شرکت را در سال 2015 در جایگاه نخست در حوزه Integrated System قرار داد بدین ترتیب این شرکت بالاتر از شرکت های NetApp، HP و EMC قرار گرفت
👇👇👇 👇👇👇
Forwarded from Hadi
Word of the day....
social engineering
Social engineering is a security attack vector that involves tricking someone into breaking normal security procedures.
A social engineer runs what used to be called a "con game." Techniques such as appeal to vanity, appeal to authority and appeal to greed are often used in social engineering attacks. Many social engineering exploits simply rely on people's willingness to be helpful. For example, the attacker might pretend to be a co-worker who has some kind of urgent problem that requires access to additional network resources.
social engineering
Social engineering is a security attack vector that involves tricking someone into breaking normal security procedures.
A social engineer runs what used to be called a "con game." Techniques such as appeal to vanity, appeal to authority and appeal to greed are often used in social engineering attacks. Many social engineering exploits simply rely on people's willingness to be helpful. For example, the attacker might pretend to be a co-worker who has some kind of urgent problem that requires access to additional network resources.
Forwarded from Hadi
Word of the day...
distributed denial-of-service attack (DDoS)
A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.
In a typical DDoS attack, the assailant begins by exploiting a vulnerability in one computer system and making it the DDoS master. The attack master, also known as the botmaster, identifies and identifies and infects other vulnerable systems with malware. Eventually, the assailant instructs the controlled machines to launch an attack against a specified target.
distributed denial-of-service attack (DDoS)
A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.
In a typical DDoS attack, the assailant begins by exploiting a vulnerability in one computer system and making it the DDoS master. The attack master, also known as the botmaster, identifies and identifies and infects other vulnerable systems with malware. Eventually, the assailant instructs the controlled machines to launch an attack against a specified target.
Forwarded from خط واحد+
[ Photo, پلیس فتا علاوه بر این که حواسش به همه چی هست به دنبال استخدام هکرهای کلاه سفید هم هست!
به خط واحد بپیوندید👇👇
@One_Line
به خط واحد بپیوندید👇👇
@One_Line