Cyber_security

Cyber Security

Created Monday 20 November 2017

ATTENTION: ! For Cyber Security refer to the Cyber Security notebook located at /home/andrei/Notebooks/CyberSecurity

DevOps:Articles Blog:CyberSecurity:From Noob to CyberSecurity Pro - Preparing to become a Cyber Security Professional - Realistic Guide DevOps:Articles Blog:CyberSecurity:GDPR can be abused by mallicious attackers - Catch 22 DevOps:Articles Blog:CyberSecurity:What do you do when you’ve been infected with a virus, trojan, worm or another type of security menance

77 tips to secure your small business instantly @blog @cybersecurity
  1. Ditch Windows, start using Linux as your main operating system
  2. Learn to use Virtualization Software
  3. Virtualization Benefit 1 No Driver Issues - Always works
  4. Virtualization Benefit 2 Snapshots - Control Viruses and Malware
  5. Virtualization Benefit 3 Move your virtualmachine from PC to PC (easy backup)
  6. Virtualization benefit 4 - Run older software which requires a older version of an OS without having the security issues
  7. Never reuse the same password twice
  8. Use a Password Manager - Strong passwords, encrypted - Keepass
  9. Set Up an encrypted disk for sensitive data using VeraCrypt
  10. Secure Chat via Tox
  11. Secure Chatting via Telegram

Downloading cracked software / Downloading illegal software

So you’ve been thinking about downloading that brand new software. Yo could buy for $200. Downloading it form a torrent site. It’s free, it’s cracked, it works!

You’re forgetting something important. The people that cracked it have reverse engineered a way around the protection. Copyright infingement. Yet since they’re so smart they’re not about to give something to you for free. Yo uthink they put it there on good will. All they did was added to torrents so people who are greedy and don’t know any better can downloaded it. They’ve added malware to it. A virus, a botnet. Even a trojan horse What happens there is a botnet added. The botnet is extremely powerful. It gathers all the data you have in your computer. It can even intercept details. What’s worse they will use your computer for mallicious activities. Attacking other websites or people. When the police comes knocing on your door you won’t know what happened. Only download software from the official creator of the software. Always verify the checksum of the software . There are many programs. You just I’ve created a small script that can help you. Just input the website and you will see the checksum. Easy right? You can compare it automatically.

Verify and see if things check and add up. Don’t download riskingn your whole security and information. A big headache.

Download from authorized places. Or get free and open source software.

10 easy steps to implement gdpr in your small business

step 1: find someone who is good at cybersecurity and software development. A consultant who can help you analyze your business needs

Last updated 2021-06-21 08:23:17 +0300

Comments:

Subscribe to my Newsletter

Receive emails about Privacy, Security, Linux, Programming, and on projects i'm working on