Skip to main content

Cyber crime & security |#NDKtechnology

 #NDKtechnology 


According to wikipedia.org Cyber crime is defined as

Cybercrime is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrime may harm someone's security and financial health. 


Virus & malware 

What are the different types of Malware?
  • Worms. Worms are spread via software vulnerabilities or phishing attacks. ...
  • Viruses. Unlike worms, viruses need an already-infected active operating system or program to work. 
  • Bots & Botnets. 
  • Trojan Horses. 
  • Ransomware. 
  • Adware & Scams. 
  • Spyware. 
  • Spam & Phishing.



Cyber security 

According to wikipedia.org,

Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risk of cyber attacks and protect against the unauthorised exploitation of systems, networks and technologies.




Top 10 most notorious cyber attacks in history
  • Teen hacks NASA and US Defense Department: ...
  • Phone lines blocked to win Porsche (1995) ...
  • Hacker targets Scientology (2008): ...
  • Solar Sunrise (1998): ...
  • The Melissa virus (1999) ...
  • Internet attacked (2002): ...
  • Hacker steals tens of million of credit card details (2009):



Top asked question



How we get hacked?

From opening different links, images, videos, emails etc. that contains ransomware (viruses and malware) 


Why Virus creators and hackers hack our systems?

Mostly for money. If the attacked systems are federal systems or important or confidential systems then the hack is for obtaining information. 


What do hackers or viruses do to our computer if we are hacked?

They will mostly encrypt all files and lock the computer. 


How to get my computer back?

If computer is only encrypted and not locked then install anti virus programs. 

Can I pay to the hacker and get my encrypted files back?

No you cant. Legally it is illegal. 



Crypto currency and dark web

what is dark web?

The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access.




Crypto currency 

A cryptocurrency (or “crypto”) is a digital currency that can be used to buy goods and services, but uses an online ledger with strong cryptography to secure online transactions. Much of the interest in these unregulated currencies is to trade for profit, with speculators at times driving prices skyward. 

Main cryptocurrencies 

  • Ethereum (ETH) ...
  • Litecoin (LTC) ...
  • Cardano (ADA) ...
  • Polkadot (DOT) ...
  • Bitcoin Cash (BCH) ...
  • Stellar (XLM) ...
  • Chainlink. ...
  • Binance Coin (BNB)



Cryptocurrency to normal money calculator 


1 Bitcoin equals
45,288.80 United States Dollar
Sep 12, 06:19 UTC · Disclaimer

Powered by Google.com 






Major references 










Comments

Popular posts from this blog

Apple silicon chips | The M family.

Computers are made just like the human body. In the human body, the brain controls everything, handles every type of pressure occurring, and process the inputs and output it. Exactly like that the processor in computer plays or played a huge roll from the beginning of computers. Without a processor, the computer is like a human without a brain.  Nowadays there are various types of processors, as well as various large scale companies manufacture those. Simply the process of the processor is to handle the input - process them - Output it. So some examples for such companies are Intel, Nvidia, Apple and AMD.  When we take the most popular chip set Intel, For instance Intel has been founded in 1968 and been serving Windows and Apple devices since. Intel has 3 technologies named Intel single core, duo core and Quad-core.  But today's topic is not Intel, it is Apple M chips.  So when we take the history of Apple, from the beginning they manufactured Laptops and Computers n...

Auxins | The first major plant hormone.

  Basically auxin is a growth promoting hormone present in plants which produce in the tops of the shoots and roots. Auxins stimulate cell elongation in stem and root. Due to this, the stem apex of plants turn towards light due to dissimilar cell elongation of stem.  -Thats why plants always bend and grow towards light.                Caption- A plant growing towards light.  Question - what is the relationship between plant growth and Auxin hormone? Auxins produced in the apex diffuse downwards. Therefore it speed up the growth of new cells and the shoot of the plant grow upwards.  Question - What are the other functions rather than growth and stem  elongation? Promotes formation of lateral and adeventitious roots.  Regulates development of fruit. Enhances apical dominance. Note- Auxins concentrate in the parts of the plant where the light intensity is low. This is due to the the process of diffusion. Auxins move to ...

Abraham Lincoln

                                                  Abraham Lincoln Abraham Lincoln was an American statesman and lawyer who was the 16th president of the United States from 1861 until his assassination in 1865. Lincoln led the nation through the American Civil War, the country's greatest moral, constitutional, and political crisis. Mr. Lincoln was born in 1809, Kentucky, USA.    Abraham Lincoln  is  famous for  the Gettysburg Address, abolishing slavery and being one of the four presidents who have been assassinated.  Abraham's  father remarried and, as the frontier expanded and became more populated, so the quality of life increased.  Lincoln  always defined the Civil War as a struggle to save the Union, but in January 1863 he nonetheless issued the Emancipation Proclamation, which freed all slaves in areas still under...