HOW TO
What is an SSL certificate and how does it work?
But what does that mean and how can we feel safer when you see that particular lock?
When you see that lock, you will know that the site features SSL. This is an international standard security tech that you can find on a wide range of websites.
With its help, you can protect user information, transfers, and other relevant content without having to worry about any potential challenges that come your way.
The benefit of SSL certificates is that they are used by lots of companies and website owners online. The idea here is to try and secure credit card purchases.
As we mentioned above, SSL certificates can be used for logins too, and you can also protect access control and authentication info to specific areas of the site.
The idea is that once you have an SSL certificate, you will not have any sort of issues, and in the end, the overall results will pay off quite a bit.
You are free to choose when and how to use SSL certificates, but installing this is a priority if you want your website users to feel protected.
In order to create the secure connection, SSL certificates are required as they digitally bind a cryptographic key to the organization details. The SSL certificate is installed on the web server and it’s used to authenticate the website identity.
It will also help encrypt the transmitted data fast and easy, which is extremely important in this type of situation!
How do SSL certificates work?
The idea here is that whenever the browser access an SSL secured site, both the web server and browser will establish the connection. Many professionals name this the SSL handshake and it’s a very important thing to consider.
There are 3 keys used to create the SSL connection.
You have the private, public and the session keys. Anything that is encrypted with one of the keys can be decrypted with that adjacent key, in order to make things a lot more secure.
Since the entire decryption process can take a lot of time and effort, you will note that the entire process can be extremely helpful. That being said, once the secure connection is created, you will note that the session key is the one that will encrypt all the transmitted data!
So, why do you need an SSL certificate?
The reason is simple, it offers the much-needed protection and value that you may need! It works very well, it’s easy to use and the value can be second to none. It’s all about protecting the customer identity and information, so try to adapt to the situation.
Of course, customers will see that you are trying to actively protect their info. In time, this will generate a lot more sales and it will also help your business!
HACKING NEWS
How to guide: Check if your Facebook Account has been hacked?
How to guide: Check if your Facebook Account has been hacked?
At the end of September, it was revealed that a Facebook security flaw allowed the access tokens of over 50 Million accounts to be stolen. Access tokens allow users to stay signed in on devices, rather than signing in every time they interact with a Facebook app. On Friday 12 October, after weeks of investigation, Facebook reported that the actual number of accounts affected was 30 million, not 50.
The investigation into how this was made possible, and the extent of the data stolen is still ongoing, but Facebook have said there is no need for users to log out or change their password. Facebook forced 90 million users to log out when the breach was discovered.
Users can use this page to check if they were one of the accounts affected in the incident, as well as read any recent findings from the investigation. When you visit page, if you are not one of the affected users it will tell you this in a statement towards the bottom of the page, and there is no further action required from you other than remaining security conscious when it comes to passwords and such. You will also see a message saying your account hasn’t been compromised if you are one of the one million users to who their tokens stolen but information remained safe.
If you fall into the other 29 million users camp, then you will see one of two messages, depending on the level of your information that was stolen. Fifteen million users had their name, email addresses and phone numbers compromised by hackers. While this is serious enough itself, the other 14 million have a more serious data breach problem.
The other 14 million have had the above information stolen, as well as their username, date of birth, devices you use, gender, language settings and possibly more data such as religious and political views. It’s also possible that they accessed your 10 most recent locations and 15 most recent searches, giving a detailed window into your online presence.
There is currently no evidence that hackers used the vulnerability to attack third-party apps and services to gather more information, which was technically possible. Facebook also continues to report that no passwords of credit card information has been compromised. We are yet to see the full fallout from the breach, but there is also evidence that Facebook logins are being sold on the dark web.
While that data is now out there in the hands of attackers, Facebook has used their support page to offer some advice on avoiding phishing schemes. This is a good move from Facebook, but it doesn’t make up for the grievous level of the data breach and the users it has left vulnerable to tailored phishing attacks now their data is out there.
Photo by Glen Carrie on Unsplash
HOW TO
How to Secure Your Linux Server
How to Secure Your Linux Server
It’s important for anyone running a Linux server, or any type of server for that matter, secure. Especially if it communicates with the outside world. Servers are like your houses in the digital realm. They have to be kept secure from intruders. So you have a Linux server, here’s how to secure it.
- Keep Your Server Clean and Lean
In other words, keep it simple, but secure. Install the apps and run only the services that you need. Additional apps, introduce vulnerabilities as well as unpatched services that can be exploited by external malicious actors. Keeping the server clean and lean also speeds up its performance. Also, depending on the Linux distro, a number of extra services will be run by default. Keep an eye out for those services. Check if they’re really important and if they are, make sure they’re updated.
A simple netstat –npl command in the terminal will show you all the running services and the ports they use. That’s another thing. These services might be using some ports you want to keep closed. Disable unwanted services with the following command.
Systemctl disable service_name
- Do not Log in as Root
It’s no secret that logging in as Root user gives you unrestricted access to everything in your Linux setup. And for many Linux users, it’s the easiest way to use Linux which is why most newbies log in as Root. Malicious attackers know this too. When users log in as Root, any running apps and services with vulnerabilities also give attackers unlimited access to everything else. The best practice for Linux users, is to create a user with enough sudo access to perform most tasks and only switch to Root when needed.
In Ubuntu for example, you can add a new user with sudo powers by typing in the following at the terminal:
adduser usercansudo
qpasswd –a usercansudo sudo
Afterwards, log out of the system and login as the new user then disable the Root user by editing the sshd_conf file.
Nano /etc/ssh/sshd_conf
Look for this commented item: #PermitRootLogin no
Remove the comment, save the file and restart the ssh service using the following command:
systemctl restart sshd
- Keep the Server to Yourself and others you Trust
Restrict access to your server to just you and others you implicitly trust. In the previous item, create as many users as you can with level access and disable root. The fewer the better though.
- Port Change
When logging in remotely, the default port for ssh is 22 which is what most people, including attackers would do to get into a Linux server. This port can be changed and by changing this port, eavesdroppers, attackers and bots will be left guessing how to log in to your system. It’s simple but effective. To change the ssh port, we go back to the sshd_conf file. You can issue the following commands:
sudo nano /etc/ssh/sshd_conf
Find the commented port line:
#Port 22
Uncomment it and change the port number to something else. Feel free to change 22 to something between 1024 and 32,767 but make sure that no other service uses your chosen number. Then save the file. Restart the ssh service.
systemctl restart sshd
You can check if it works by logging in through ssh with this command:
ssh -p{port_number}@server_IP
Example:
ssh –p1027 192.168.10.11
- Always Keep Your Server Patched and Updated
You’ve probably read plenty of articles regarding vulnerabilities that no basic user could probably think of but continuously explored by determined hackers out for a quick buck. No server is secure, not even Linux and the best defense for this, apart from a good firewall and anti-malware programs, is to keep your operating system and its packages updated. Always be on the lookout for core or kernel updates.
[stackCommerce layout=”2″ count=”5″ sort=”best_sellers”][/stackCommerce]
HOW TO
How To Become an Ethical Hacker – Beginners Guide
How To Become an Ethical Hacker – Beginners Guide. I’m sure you read stories about ethical hacking, but not knowing what that means?
Our article will cover few points for people with no experience in cybersecurity or have limited experience.
We receive many emails asking on how to become ethical hacker. Some of more frequent questions “where should I start?”. We will try to answer these questions and give you a more technical details on how to start a career in cybersecurity as a beginner and how to gain more expertise in the domain.
Remember if your goal is to learn hacking for the reason of hacking into your friend’s Facebook account or email, it will not work for you. But if you decided to learn hacking because of your passion for technology and willingness to be an expert in computer systems, things should workout for you!
Career in cybersecurity is more like saying career in Banking. There will be so many niches within the industry from auditing, pentesting, social engineering, digital foresnics, malware / software detecting, etc. You many choose any of the above, however in this article we will cover generic skills that you need before starting your career.
If your background doesn’t bring any experience to the table, don’t worry, we all been there. Nobody has all the necessary skill from beginning. So our advice in your case is to learn absolute fundamentals.
- What is hacking?
Hacking is determining weakness and vulnerabilities of systems and attain access to it.
Ethical hacker have an official and legitimate permission to do a security assessment of a system, but hacker is doing this unauthorized.
Here are some type of hackers for your intro:
Hacktivist – those who hack due to some ideas and to make a statement.
Script kiddie – they usually use pre-build tools and have no technical skills.
Grey hat – they reveal the weakens to the company after they get unauthorized access.
Black hat – get unauthorized access
White hat – ethical hacker, they document everything they do and reveal the weaknesses & vulnerabilities to the company.
- What skills required for ethical hacker
– Programming skills
– Fundamentals of Networking
– Operating System
– Get to know as many technology as you can put your hands on
- What to code in ?
To answer this question, one have to consider on what platform you will be working on.
– Web applications: PHP, ASP , JPS
– Mobile apps : Swift/Objective-C, Java( Android) ,
– Software [desktop] : C#, C++, Objective-C
It is necessary to learn the fundamentals of programming, like data types, the variable manipulation at the OS level to the use of functions, etc. Here are some tips to take in consideration:
- Try to understand the OS level operations on the language you are learning or alternatively learn the assembly language.
- Keep your self motivated in your learning path and remember to achieve results takes time.
- Here are resources that will help to learn from scratch
-
GAME REVIEW6 years ago
Top Hacking Simulator Games Every Aspiring Hacker Should Play: Part 1
-
DEALS6 years ago
Great Ethical Hacking Courses for Beginners
-
BREAKING NEWS6 years ago
US Online Retail Company suffered a data breach affecting 6.5 million customers
-
HACKING NEWS6 years ago
The APT attacks hitting East Asia
-
GAME REVIEW6 years ago
Hacknet Review
-
DEALS6 years ago
Music, Voice and Sound interface kits: What you need to know
-
GAME REVIEW6 years ago
Top Hacking Simulator Games Every Aspiring Hacker Should Play: Part 2
-
HOW TO6 years ago
How To Become an Ethical Hacker – Beginners Guide
Pingback: What IT Career path to choose in Cyber Security? - Hack Ware News