DDoS implication on your network?
DDoS attack can be used to infiltrate your network for attackers to try to exploit the machines in the inner network ?
Or it just attack that meant to disrupt the daily operation of a Network.
Collaborate Disseminate
DDoS attack can be used to infiltrate your network for attackers to try to exploit the machines in the inner network ?
Or it just attack that meant to disrupt the daily operation of a Network.
At the moment I use a TP-link modem/router.
I am considering to buy a firewall appliance. I have a hard time finding new modems to buy because most of the stores sell modem/routers and not modems.
I am thinking to use my T… Continue reading router/modem bridge mode security [on hold]
Are there security benefits running Linux Distro base on an older version of Linux kernel?
Security benefits = fewer vulnerabilities that can be exploited by hackers.
Linux Distro base on older version = RHEL-CENTOS that is… Continue reading The older the Linux kernel is, the more secure?
With Spectre and Meltdown, hackers can extract your password from the CPU cache. If I give someone my computer without the hard drive, can he extract my passwords through the CPU?
Continue reading Extracting passwords from recycled machine using Spectre and Meltdown
When I ask the VPN server to do the queries for me, does the VPN use its own ISP to run the queries over the internet?
Or did the VPN server use my ISP connection to search over the internet and by doing that he uses his own… Continue reading Do VPNs connect to my ISP?
If I use my TP-LINK router+modem as network layer 1 [connect the ADSL cable to it], and then connect the ISP router via LAN to WAN [connect Ethernet cable to LAN port of the TP-Link router to WAN port of ISP router] can the I… Continue reading is TR-069 connection possible?
My network setup is:
First router+modem connected to ADSL cable
Second router is connected via LAN to WAN to the first router
My computer is connected to the second router via ethernet cable.
there is no configuration on … Continue reading Can someone eavesdrop on my home network?
I installed CloudReady (Chrome OS) a few days ago and have now noticed that verified boot is not part of the deal with CloudReady, only Chromebook.
Before I installed CloudReady I was looking for a secure OS with fewer vulne… Continue reading how should I choose OS [on hold]
I kinda addicted to Little Big Snake, an online game that requires Flash. I’m trying to find a secure way to play this game on Ubuntu using Chrome.
I tried Firejail but the game is very laggy with it. The only thing I do for… Continue reading Secure way to run Flash on Chrome?