CONCEPT OF NETWORK INTERCONNECTION
First implemented in the Defense Advanced Research Project Agency
Network (Arpanet), in 1966 in USA.
-Consists of connecting several computer networks based on different
protocols
-Requires the definition of a common interconnection protocol on top
the local protocols.
-The Internet Protocol (IP) plays this role, by defining unique addresses
for a network and a host machine.
~ @geekcode
First implemented in the Defense Advanced Research Project Agency
Network (Arpanet), in 1966 in USA.
-Consists of connecting several computer networks based on different
protocols
-Requires the definition of a common interconnection protocol on top
the local protocols.
-The Internet Protocol (IP) plays this role, by defining unique addresses
for a network and a host machine.
~ @geekcode
How To Surf Safely On Public WiFi ?
⚡A free Wi-Fi connection can seem like a lifesaver when you’re on the go. Public Wi-Fi can be found in popular public places like airports, coffee shops, malls, restaurants, and hotels — and it allows you to access the Internet for free. Of course, we all know jumping on a free Internet connection can be a convenient way to access online accounts, catch up on work, and check emails while on the go. These “hotspots” are so widespread and common that people frequently connect to them without thinking twice. However, the security risks should not be forgotten.
⚡ If you decide to use public Wi-Fi, just be aware that you could be making yourself an easy target for hackers — and putting your information and more at risk. Although it sounds harmless to log on and check your social media account or browse some news articles, reading e-mail, checking your bank account, or performing any activity that requires a login is risky business on public Wi-Fi.
⚡ The average free public Wi-Fi isn’t secure and just because you may need a password to log in, it doesn’t mean your online activities are encrypted. Various reasons make public Wi-Fi susceptible to attack. One issue has to do with the encryption protocol used by some wireless networks. Another reason has to do with the possibility of joining a rogue Wi-Fi hotspot.
⚡While the best way to protect your information is to avoid accessing sensitive information or performing sensitive transactions when connected to public Wi-Fi, there are additional measures you should be aware of. These articles can help you learn more about the risks and what else you can do to be safe when surfing on Wi-Fi anywhere.
~ @geekcode ❤️
⚡A free Wi-Fi connection can seem like a lifesaver when you’re on the go. Public Wi-Fi can be found in popular public places like airports, coffee shops, malls, restaurants, and hotels — and it allows you to access the Internet for free. Of course, we all know jumping on a free Internet connection can be a convenient way to access online accounts, catch up on work, and check emails while on the go. These “hotspots” are so widespread and common that people frequently connect to them without thinking twice. However, the security risks should not be forgotten.
⚡ If you decide to use public Wi-Fi, just be aware that you could be making yourself an easy target for hackers — and putting your information and more at risk. Although it sounds harmless to log on and check your social media account or browse some news articles, reading e-mail, checking your bank account, or performing any activity that requires a login is risky business on public Wi-Fi.
⚡ The average free public Wi-Fi isn’t secure and just because you may need a password to log in, it doesn’t mean your online activities are encrypted. Various reasons make public Wi-Fi susceptible to attack. One issue has to do with the encryption protocol used by some wireless networks. Another reason has to do with the possibility of joining a rogue Wi-Fi hotspot.
⚡While the best way to protect your information is to avoid accessing sensitive information or performing sensitive transactions when connected to public Wi-Fi, there are additional measures you should be aware of. These articles can help you learn more about the risks and what else you can do to be safe when surfing on Wi-Fi anywhere.
~ @geekcode ❤️
Why to Hide Your IP Address?
Here are the important reasons to hide your IP address:
• Prevent disclosing private information: You can hide your IP address to keep your personal or business information private. It is good that you surf the internet anonymously.
• Avoid tracked by advertisers or companies: Hiding IP address is a good option to prevent tracked by online advertisers or companies.
• Surf internet at restricted areas: IP hiding enables you to surf the internet at restricted areas where content is highly filtered. If your country has restrictions to view the content, you can simply hide your IP and guess access to online stuff.
• Connecting to public places: You need to hide your IP address when connecting to public places like libraries, restaurants, or internet cafes.
#supportus ❤️ @geekcode
Here are the important reasons to hide your IP address:
• Prevent disclosing private information: You can hide your IP address to keep your personal or business information private. It is good that you surf the internet anonymously.
• Avoid tracked by advertisers or companies: Hiding IP address is a good option to prevent tracked by online advertisers or companies.
• Surf internet at restricted areas: IP hiding enables you to surf the internet at restricted areas where content is highly filtered. If your country has restrictions to view the content, you can simply hide your IP and guess access to online stuff.
• Connecting to public places: You need to hide your IP address when connecting to public places like libraries, restaurants, or internet cafes.
#supportus ❤️ @geekcode
OWASP Top 10: Static Analysis of Android Application & Tools Used
https://blog.securelayer7.net/static-analysis-of-android-application-tools-used-securelayer7/
~ @geekcode ❤️
https://blog.securelayer7.net/static-analysis-of-android-application-tools-used-securelayer7/
~ @geekcode ❤️
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
Mitigate OWASP Top 10 Android Risks with Static Analysis
With the widespread use of mobile applications and the growing concern for mobile app security, it has become crucial for developers to ensure the integrity and security of their Android...
What is a Fake Access Point(AP)?
A fake AP is an AP that looks normal to users and doesn't have encryption on it, so people can connect without having to enter a key. It's an open network, and it should have an internet connection to attract people to it.
Why would we create a fake Access Point? Well, if we create one, we will attract a large number of people to connect to the network and access the internet. They will log in to their accounts, and we can use packet sniffing to capture anything that they log.
If you guys have any query drop your query here @geekserverbot
~ @geekcode ❤️
A fake AP is an AP that looks normal to users and doesn't have encryption on it, so people can connect without having to enter a key. It's an open network, and it should have an internet connection to attract people to it.
Why would we create a fake Access Point? Well, if we create one, we will attract a large number of people to connect to the network and access the internet. They will log in to their accounts, and we can use packet sniffing to capture anything that they log.
If you guys have any query drop your query here @geekserverbot
~ @geekcode ❤️
What is Packet Sniffing?
Packet sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network. In this way, every packet, or a defined subset of packets, may be gathered, stored and analyzed in order to better understand exactly what data is being sent across a given network.
Packet sniffing is a valuable tool for monitoring the performance of a network and diagnosing issues.
If you guys have any query drop your query here @geekserverbot
~ @geekcode
Packet sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network. In this way, every packet, or a defined subset of packets, may be gathered, stored and analyzed in order to better understand exactly what data is being sent across a given network.
Packet sniffing is a valuable tool for monitoring the performance of a network and diagnosing issues.
If you guys have any query drop your query here @geekserverbot
~ @geekcode
Forwarded from Cyber Agents
Google will make Android apps tell users about data collection
https://www.straitstimes.com/tech/tech-news/google-will-make-android-apps-tell-users-about-data-collection
@cyberagents
https://www.straitstimes.com/tech/tech-news/google-will-make-android-apps-tell-users-about-data-collection
@cyberagents