New: computersecurityAll contenthive-129948krhive-196917zzanhive-183959hive-185836hive-180932steemhive-166405hive-144064hive-150122hive-101145uncommonlabhive-188619hive-183397bitcoinhive-184714hive-145157photographykrsuccesshive-193637hive-180301hive-103599lifehive-139150TrendingNewHotLikersmindreading (33)in targetedindividuals • 9 months agoEmailing McDonalds CanadaSubject: Inquiry Regarding McDonald's Wi-Fi Protocol Dear McDonald's Canada, I hope this message finds you well. I am reaching out today with a question regarding your Wi-Fi protocol. Recently…mikyzok (29)in hive-118825 • 9 months agoWhat is a firewall in computer security?A firewall acts as a security system that employs predefined security rules to oversee and manage all incoming and outgoing network traffic. It serves as a barrier between trusted internal networks…gemshub (26)in cybersecurity • 2 years agoThe start of my cybersecurity journeyI’m super excited guys…. Just completed my first course (Google Professional Cybersecurity Certification). I Learned about ✅ Introduction to cybersecurity, paths to cybersecurity, and…siddharthmnm (25)in identityverificatiomarke • 3 years agoIdentity Verification Market Size, Share and Global Market Forecast to 2025 – MarketsandMarketsAccording to market research report on "Identity Verification Market by Component (Solutions and Services), Type (Non-Biometric and Biometric), Organization Size, Deployment Mode, Vertical (BFSI…smarteugene (25)in breaking • 4 years agoHow an attacker can find out your IP."DANGEROUS" Today we'll talk about how Microsoft Word is infected and why you shouldn't open unverified documents, pdf, etc. Viruses, tracking, refs - these are exactly the things that integrate…estream.studios (67)in security • 6 years agoeStream Studios' Feed : 2019/02/08 14:41:09#Security #computersecurity Thousands of industrial refrigerators can be remotely defrosted, thanks to default passwords | External Link : Thousands of industrial refrigerators can be…milan98 (25)in computersecurity • 6 years agoHow To Encrypt Keyboard To Avoid KeyloggersLet's start encrypting keyboard, If we start encrypting keystrokes of a keyboard the value that keylogger will record is different from the actual value, that means they would only record random…losangle (47)in company • 6 years agosteemCreated with Sketch.Jokes that will make all Microsoft Windows users laugh, then cry. Part 2Whether you're a Mac OS or Windows user (c'mon, nobody is actually running Linux), you've probably heard at least one Windows joke. Since its initial release 32 years ago, Windows has had quite a…losangle (47)in company • 6 years agosteemCreated with Sketch.Jokes that will make all Microsoft Windows users laugh, then cry. Part 1Whether you're a Mac OS or Windows user (c'mon, nobody is actually running Linux), you've probably heard at least one Windows joke. Since its initial release 32 years ago, Windows has had quite a…cheefling (25)in blockchain • 6 years agoHow DxChain and QuarkChain can maintain all the three mainstays of the blockchainThere are three most important and necessary things which need to be dealt with care to perform transactions efficiently. The blockchain is basically generating more and more projects to make…losangle (47)in computer • 7 years agosteemCreated with Sketch.Are you smart enough to name parts of the internet?How much of a computer geek are you! Do you know how this thing we are constantly connect to is actually working? [playbuzz-item item="5f491376-1a26-48d7-81dd-2454de0837d3" wp-pb-id="409079"]Posted…onnopurbo (25)in password • 7 years agoMeningkatkan Pertahanan PasswordAncaman serangan terhadap password sangat tinggi, organisasi dan pengguna mereka harus menerapkan perilaku dan tindakan teknis yang tepat untuk mengurangi risiko ancaman tersebut. Tindakan cenderung…onnopurbo (25)in computersecurity • 7 years agoTeknik Enumerasi Kelemahan PasswordAda sedikit keraguan bahwa password adalah ketidaknyamanan. Sayangnya, penggunaan password tetap merupakan cara paling praktis bagi sebagian besar dari kita untuk menjaga identitas on-line kita agar…onnopurbo (25)in wifihack • 7 years agoCrack WiFi dengan fern-wifi-crackerFern-Wifi-Cracker adalah tool free berbasis GUI yang menggunakan suite aircrack untuk menyerang jaringan wireless. Fern dapat diluncurkan dari menu aplikasi Kali Linux di bawah Wireless Attacks |…onnopurbo (25)in wifi • 7 years agoOnno: Esensi Evaluasi Ketahanan Jaringan WiFiKeamanan jaringan adalah tugas yang tidak pernah berakhir; ini membutuhkan kewaspadaan terus menerus. Mengamankan jaringan wireless anda bisa sangat rumit karena penyusup pengguna dapat secara…sumonmrbd (25)in generation • 7 years agoGeneration Z Media#REDDIT adds 2-factor authentication for all - … #COMPUTERACCESSCONTROL #COMPUTERSECURITY #CRYPTOGRAPHY #LOGINdkabii (38)in cybersecurity • 7 years agoWireless SecurityOne of the tools used for wireless network detection is Kismet. Kismet is a tool that one can use to determine which wireless access points are accessible as well as wireless clients within range…