What is a DOS Attack & How can you Prevent it?

What is a DOS Attack & How can you Prevent it?

What is a Denial-of-Service (DoS) Attack & How can you Prevent it?

It’s a wonderful day at the office, all services and servers are working as they should and everything is running smoothly.  Until the moment everything starts to get increasingly slower; services become unresponsive and the server’s resources are high, so high that it could crash the services entirely. Read More »

Routing Protocols: OSPF

Routing Protocols: OSPF

As we have looked at in earlier articles there are 2 types of routers: static and dynamic. As we have mentioned, a static router is manually added by administrators; the procedure for which can often be difficult in larger networks. That’s where dynamic routing protocols come in; they are responsible for updating this information automatically in the routing table of network attached devices.  Read More »

Macro-based Malware & How to Protect Yourself Against Attacks

Macro-based Malware & How to Protect Yourself Against Attacks

There are various different types of malware and different ways that they have been built to infect systems. One of those types is called macro malware, which are essentially scripts that contain several commands for the automation of tasks for different applications through Microsoft Office documents. Characteristically, macro are provided as a mechanism for us to improve and work better with automations in Word, Excel etc.
Read More »

Online protection using a Dedicated Line and VPN

Online protection using a Dedicated Line and VPN

Is our data secure on the internet or is confidential information that we upload at risk on the internet?

The answer is YES it is at risk.

Over the years, this issue has been proven many times over. Millions of companies per year have the horrible experience of having their confidential data stolen.

Using sniffing methods, hackers can easily steal any personal data over the internet, it is not easy to do of course but by hijacking a BGP session an expert can get into your ISP and start a “man in the middle” attack.

Read More »