Posts

Information Security Overview Part 1 | CEH

Image

Access Control Concepts

Image

NetFlow

Image
NetFlow ,  cybersec ,  cyberawareness ,  cybersafety

Centralised Authentication

Image

40 shady rules

Image
  40 shady rules In this article, I want to give you a bunch of practical tips for shady activities! Do not be lazy. If you have set a goal for yourself to make money by any means - go to it no matter what. Everyone wants to rest, relax, however, so that you can afford to rest, you must first work fruitfully. Do not be greedy. You don't need to get hung up on money, you need to earn it calmly, with a cool head. Greed is a destructive thing, it limits people's horizons.  Say little. Don't give people any specific information about yourself. Do not talk about your desires, dreams, goals. They should be in your head and nowhere else. If the enemy knows what you want to achieve, he will be waiting for you in this place. Never stop. Set yourself sky-high goals so that after achieving intermediate goals you do not consider yourself a king and do not think that you have reached your maximum. There is no limit to perfection.  Self-develop. The world does not stand still, new tech...

ATM attack methods

Image
  ATM attack methods By Hackfreaks Hello my little Freaks cybercriminals. Hackfreaks is online. Remember how pleasant it is to hear the sound of ATM bills being counted out? It is even more pleasant to pick them up from the ATM. These feelings are plagued by many attackers who carry out targeted attacks on ATMs. In recent years, researchers have increasingly documented major attacks on ATMs, and criminals continue to improve their methods in pursuit of cash, which is why it is necessary to be aware of the main patterns of attacks on ATMs. Today we'll talk about it. Hackfreaks official This article was written by the administration of Hackfreaks official. this channel and does not call for any illegal actions, but is presented solely for informational and entertainment purposes. And also in order to protect readers from fraud and other illegal actions. These actions may be punishable by law. Introduction The problem of hacking ATMs has grown to such an extent that the US Secret Serv...