The Cyber Cops

Tagsecurity

Cryptocurrency

C

The word “Cryptocurrency” consists of the two words – “Cryptography” and “Currency”. “Currency” here refers to a money as medium of exchange. Bank notes and coins are a type of currency. “Cryptography” refers to secure communication in such a way that any person for whom the communication is not intended is not able to read the...

Facebook Is Not Your Friend

F

the Facebook Currently there are 270 million Facebook accounts in India, and if you are reading this, chances are you are one of them. At this point, it is unnecessary to explain what it is and how it works. But it is important to know what it has become.  Facebook was a small social media site built by Mark Zuckerberg in Harvard University. But that was in 2003. In these past 17 years, It...

Hash

H

We learnt in an earlier article that encryption transforms a plaintext into ciphertext by applying an algorithm. The length of the ciphertext will usually be equal to or more than the length of the plaintext. This is used to hide the plaintext altogether. On the other hand, a hash is a slightly different concept. In hashing, when a hashing algorithm or hashing function is applied to a plaintext...

How Email Works

H

As mentioned in a previous article, email is the electronic way of exchanging (digital) mail through the use of internet and it is the electronic equivalent of the regular mail that we send through a post-office. When you send an email, you send it to a user’s mailbox on a server. But to get clarity on how it actually works, we need to understand certain concepts. Mail Transfer Agent (MTA)...

P2P Networks

P

In traditional networks, there is a computer server which receives requests from various computers, processes those requests and sends data back to the computer. Generally, for every server, there are a lot more computers who are sending requests to the server. Thus, the server is the main device which is spending its resources. On the other hand, in a peer-to-peer (P2P) network, all the...

Cracked Software

C

A software generally falls into one of the following categories: Open Source Software (freely available + source code is available free of cost)Freeware (freely available)Shareware (some or all features of the software are available for a limited period of time or all features are available for a limited period of time and then the software is locked till it is purchased by making a...

Biometrics

B

Biometrics literally means measurement of a person’s physical characteristics. In cybersecurity, it means to analyze a person’s biological characteristics using statistical methods to identify and authenticate a person. In today’s world we can see biometric authentication system mostly everywhere starting from smartphones to attendance record systems. They provide better security than...

File and System Backup

F

As we know, our Hard Disk Drives (HDD) and SSDs store our precious data, but hardware can fail anytime. To prevent data loss we need to save our important data and make more than one copy of the same. This is known as keeping a backup of important data. That’s why we need to understand the proper way of keeping file and system backups. File and system backups are different things. File backup is...

Phishing

P

Though Phishing has become a very common cybercrime, but we still do not understand it fully. What is this cybercrime? It is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.Typically carried out by email spoofing or instant messaging, it often directs users to...

Hitman Scam

H

What is this cybercrime? Scammer collects information about person from social media or other sources.Scammer calls victim for ransom giving the details of the person collected from online sources or else he will kidnap/kill the victim or someone from his/her family. Prevention Report any such emails as spam and report it to nearest Police Station immediately including any phone numbers from...

The Cyber Cops