Information security

694 Publication

Deleting files from a computer without the possibility of recovery

Deleting files from a computer without the possibility of recovery When you delete a file, even after deleting it from the trash, it doesn't actually disappear from the hard drive. It's just that all data about it is erased from the system table, which contains information about files that are located on the hard disk. Therefore, it will not be difficult for a specialist to restore a deleted Deleting files from a computer without the possibility of recovery

DoS attack

DoS attack A hacker attack on a computer system in order to bring it to failure, that is, the creation of such conditions under which bona fide users of the system will not be able to access the system resources provided, or this access will be difficult. The failure of the "enemy" system can also be a step towards mastering the system. But more often it is a measure of economic DoS attack

Distributed Network Attacks / DDoS

Distributed Network Attacks / DDoS Distributed network attacks are often referred to as Distributed Denial of Service (DDoS) attacks. This type of attack uses certain bandwidth limitations that are characteristic of any network resources, for example, the infrastructure that provides conditions for the operation of the company's website. A DDoS attack sends a large number of requests to the Distributed Network Attacks / DDoS

What are DDoS attacks and why is it harder to defend from year to year

What are DDoS attacks and why is it harder to defend from year to year According to the NETSCOUT Threat Intelligence active threat level analysis system, the largest number of attacks that our partners have ever seen occurred during the pandemic — 4.83 million DDoS attacks in the first half of 2020 (15% more than in 2019). And the frequency of DDoS attacks increased by 25% in the period from What are DDoS attacks and why is it harder to defend from year to year

Covert Use Of The Internet: Is Online Anonymity Possible?

Anonymity on the Web is a burning topic for discussion. We use many services every day that track our IP address. In fact, this is our real physical address, which is easy to establish. Imagine that you are walking down the street with your home address printed on your shirt. The same thing happens when you browse the internet without masking your location. Not everyone likes it. Read the best Covert Use Of The Internet: Is Online Anonymity Possible?

How to maintain anonymity on the Internet

Content Levels of anonymity Rules of online behavior Methods of obtaining information about you and how to resist them In conclusion Anonymity is important for all Internet users. Neglect can lead to personal data and photos falling into the hands of intruders, to the loss of money from electronic wallets and bank cards. Therefore, everyone should know the basic rules of anonymity. How to maintain anonymity on the Internet