The Cyber Cops

Tagsafety

Facebook Is Not Your Friend

F

the Facebook Currently there are 270 million Facebook accounts in India, and if you are reading this, chances are you are one of them. At this point, it is unnecessary to explain what it is and how it works. But it is important to know what it has become.  Facebook was a small social media site built by Mark Zuckerberg in Harvard University. But that was in 2003. In these past 17 years, It...

Hash

H

We learnt in an earlier article that encryption transforms a plaintext into ciphertext by applying an algorithm. The length of the ciphertext will usually be equal to or more than the length of the plaintext. This is used to hide the plaintext altogether. On the other hand, a hash is a slightly different concept. In hashing, when a hashing algorithm or hashing function is applied to a plaintext...

How Email Works

H

As mentioned in a previous article, email is the electronic way of exchanging (digital) mail through the use of internet and it is the electronic equivalent of the regular mail that we send through a post-office. When you send an email, you send it to a user’s mailbox on a server. But to get clarity on how it actually works, we need to understand certain concepts. Mail Transfer Agent (MTA)...

Proxy Server & Proxy Website

P

Proxy Server Normally when you want to access some website over the Internet, you do so via your web browser. But in certain networks, to provide security and privacy, there exist some servers which act as intermediaries between a device in a network and the Internet. Here, when a device wants to open a website, it will place the request to the such intermediary servers (called Proxy Servers)...

P2P Networks

P

In traditional networks, there is a computer server which receives requests from various computers, processes those requests and sends data back to the computer. Generally, for every server, there are a lot more computers who are sending requests to the server. Thus, the server is the main device which is spending its resources. On the other hand, in a peer-to-peer (P2P) network, all the...

Cracked Software

C

A software generally falls into one of the following categories: Open Source Software (freely available + source code is available free of cost)Freeware (freely available)Shareware (some or all features of the software are available for a limited period of time or all features are available for a limited period of time and then the software is locked till it is purchased by making a...

Biometrics

B

Biometrics literally means measurement of a person’s physical characteristics. In cybersecurity, it means to analyze a person’s biological characteristics using statistical methods to identify and authenticate a person. In today’s world we can see biometric authentication system mostly everywhere starting from smartphones to attendance record systems. They provide better security than...

File and System Backup

F

As we know, our Hard Disk Drives (HDD) and SSDs store our precious data, but hardware can fail anytime. To prevent data loss we need to save our important data and make more than one copy of the same. This is known as keeping a backup of important data. That’s why we need to understand the proper way of keeping file and system backups. File and system backups are different things. File backup is...

Phishing

P

Though Phishing has become a very common cybercrime, but we still do not understand it fully. What is this cybercrime? It is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.Typically carried out by email spoofing or instant messaging, it often directs users to...

Cyber Bullying

C

What is this cybercrime? Cyberbullying is when someone, typically teens, harass others on the internet, particularly on social media sites.Harmful bullying behavior can include posting rumors, threats, sexual remarks, a victims’ personal information, or negative labels (i.e. hate speech).Bullying or harassment can be identified by repeated behavior and an intent to harm.Victims may...

The Cyber Cops