Red Hat Linux Fedora For Dummies [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Red Hat Linux Fedora For Dummies [Electronic resources] - نسخه متنی

Jon Hall

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید






Social Engineering 1010101010

Hackers don’t have to discover supertechnical tricks to break into your computer. Many smart hackers aren’t deterred when they encounter a well-protected computer or network. What does a poor hacker in these security-aware times have to do to break into your system?

Some hacker techniques don’t rely on technological means. One such technique is social engineering, which is a fancy way of saying “I plan to trick you or your associates into giving me information to use against you.”

Social engineering can be as simple as a hacker calling you to see whether you’re at home or in the office. If you’re not physically present, the hacker or burglar can drop by, break in and steal the computer or its disks. After someone gains physical possession of your computer, most security precautions you take can be easily defeated.

Another social engineering technique hackers employ is to call a corporation’s help desk and pretend to be a VIP. The poor minimum-wage employee can often be bullied or cajoled into giving out a password or other important information.

RememberThe moral of the story is to exercise good security hygiene and be careful of strangers. Don’t give out information unless it’s essential and you can verify the authenticity of the request.





Social Engineering 1010101010

Hackers don’t have to discover supertechnical tricks to break into your computer. Many smart hackers aren’t deterred when they encounter a well-protected computer or network. What does a poor hacker in these security-aware times have to do to break into your system?

Some hacker techniques don’t rely on technological means. One such technique is social engineering, which is a fancy way of saying “I plan to trick you or your associates into giving me information to use against you.”

Social engineering can be as simple as a hacker calling you to see whether you’re at home or in the office. If you’re not physically present, the hacker or burglar can drop by, break in and steal the computer or its disks. After someone gains physical possession of your computer, most security precautions you take can be easily defeated.

Another social engineering technique hackers employ is to call a corporation’s help desk and pretend to be a VIP. The poor minimum-wage employee can often be bullied or cajoled into giving out a password or other important information.

RememberThe moral of the story is to exercise good security hygiene and be careful of strangers. Don’t give out information unless it’s essential and you can verify the authenticity of the request.

/ 194