Top 10 List of Week 02
-
How to format disk
Formatting disk can easily be done with vb. Be careful not to run any destructive code. -
About boot sector virus
This is the first time I have heard about this virus. It is very dangerous virus as the virus is loaded as soon as computer boots. -
Session Hijacking
You must have heard about session hijacking by now. Click this link if you are curious about how it works. -
MITM-Attack
This site explains how man-in-the-middle attack works. MITM attack is one of the security concerns that you should know about. -
Trojans
Trojan is a type of malware that is often heard everywhere. Click this link if you want to know about trojan. -
Virus vs Worm
The difference between the two of them. All we know is we don’t want either of them. -
Port scanning
This type of attack is looking for open ports in a network. Usually done to look for vulnerabilities. -
Wannacry sinkhole
Looking back to the worlwide ransomware attack. The attack was stopped by merely registering certain domain. That domain response turned out to be the kill switch for the ransomware. -
People fall for phising
Phihsing should be obvious enough for people to be wary of. Still people fall for it anyway. -
How to hijack session
This is a tutorial how to hijack session. For educational purpose only.