Posts

SSC MTS Common Questions

Image
  i. The Administrative Tribunal is related to which article? * ans:- Article 323 ii. What is the parliament of japan known as? ans:- Diet iii. who was the chairman of the state reorganization commission? ans:- syed Fazal Ali iv. when did india become a fully democratic republic? ans:- 26 January 1950 v. who among the following holding office till president presad? ans:- Governor vi. Vice president ---  ans:- No MP vii. who held the office of vice president of india for two full term terms? ans:- S. Radhakrishnan viii. The President of India is an integral part of ----- ans:- Perliament ix. According to indian constitution, which of the following is a statutory body / institution ? ans:- Finance commission (280 Article) x. Who was the first anarchist president of india? ans:- Dr. A.P.J Abdul kalam
Image
  CYBER SECURITY Guardians of the Network: Exploring the World of Intrusion Detection and Prevention System In today’s increasingly digital world, the need for robust cybersecurity measures has never been greater. With the rise of cyber threats such as ransomware, malware, and social engineering attacks, organizations are constantly on the lookout for ways to protect their valuable assets and sensitive data. One such solution is the Intrusion Detection and Prevention System (IDPS). An IDPS is a security solution that helps organizations detect and prevent potential cyber attacks before they can do harm. By monitoring network traffic and identifying suspicious activity, an IDPS can provide organizations with the peace of mind they need to focus on their core operations. But as cyber threats continue to evolve and become more sophisticated, the capabilities of IDPS solutions will need to keep pace. In this article, we will explore the future of IDPS and how it will need to adapt to r...

A New ransomware encrypts <<"Cactus">>

Image
New Ransomware Strain 'CACTUS' Exploits VPN Flaws to Infiltrate Networks. A new ransomware operation called Cactus has been exploiting vulnerabilities in VPN appliances for initial access to networks of “large commercial entities.” The Cactus ransomware operation has been active since at least March and is looking for big payouts from its victims. While the new threat actor adopted the usual tactics seen in ransomware attacks - file encryption and data theft - it added its own touch to avoid detection. Cybersecurity researchers have shed light on a new ransomware strain called CACTUS that has been found to leverage known flaws in VPN appliances to obtain initial access to targeted networks."Once inside the network, CACTUS actors attempt to enumerate local and network user accounts in addition to reachable endpoints before creating new user accounts and leveraging custom scripts to automate the deployment and detonation of the ransomware encryptor via scheduled tasks,...

Advance Nteroking part-2

Image
 --------------------------------------Networking Device------------------------------------------------------------------- 1. NIC - It is a Network Interface Card & NIC is a hardware component used to connect a computer or other device to a network. It is also referred to as an Ethernet card Network adapter, Network interface, controller (NIC) or LAN adapter. It's set-up to your PC Motherboard. 2. REPEATER - It is a Incoming Generator (150m or more) . A Repeater is an Electronic device implement in Computer networks to expand the coverage area of the Network. 3. HUB - HUB use to transmit the signal to each port to respond from which the was recived. Hub is operated on physical layer. In this packet filtering is not available. It is of two types: Active Hub, Passive Hub. HUB called Central Device . It's use for small Network Ex: School,College,University.                         Also Hub are not inteligent in commu...

Advance Networking part-1

Image
 -------------------------------------------------NETWORKING-------------INFO------------------------------------------     (1st Gener) OSI:- Layer 7 -APPLICATION LAYER    Layer 6-PRESENTATION  Layer  5-SESSION LAYER  Layer  4-NETWORK LAYER   Layer  3- TRANSPORT LAYER    Layer 2- DATALINK LAYER Layer   1- PHYSICAL LAYER [Layer 1-3 it's Lower Layer / hardWare Base]-[Layer 4 is Heart of OSI]-[Layer 5-7 uper Layer/software base] 2nd Gener:-TCP/IPL:--1.Application Layer  [work:- HTP/FTP/SMTP/DSN/RIP]                                         2. Internet Layer                                          3. Transport Laayer  [Work:- TCP/UDP]                   ...

shortcut keys for Microsoft Word & Excel

Image

WHT IS "NMAP" ? INFORMATION FOR "NMAP".

Image
WHAT IS Nmap  ( Network Mapper ) is a  network scanner  created by  Gordon Lyon  (also known by his  pseudonym   Fyodor Vaskovich ). Nmap is used to discover  hosts  and  services  on a  computer network  by sending  packets  and analyzing the responses Nmap is a Network maping tools.  Original   author(s) Gordon Lyon  ( Fyodor ) Initial release September 1997 ; 25 years ago Stable   Release 7.92 / 7 August 2021 ; 12 months ago Repository   Written in C, C++, Python, Lua Operating System Cross-platform Available in English  Type Network   security  License NPSL or modified  GPLv2  or  proprietary Website nmap .org Nmap provides a number of features for probing computer networks, including host discovery and service and operating    system detection. These features are extensible by scripts that provid...