Note: Treat this article as an up-to-date source of knowledge. I try hard to update it as often as possible, the latest update is as of 22/07/2021.

Image by KEMAL HAYIT from Pexels

Note: All the provided knowledge is to prevent cyber criminals. The more people are aware of potential threats, the fastest is to patch existing holes and protect our resources.

This article aims to provide knowledge on different kind of viruses that can infect our computers. It also describes ways on how to detect and defend against malware. A reader will also gain knowledge on the tools hackers use for writing malicious software.

This article will cover:


There is a lot of the usual stuff that we should do to protect our computers against viruses like: installing antivirus software or not clicking on every file from the web.

But, there are also some unusual things we can do as well.

Let’s check out!

1. Install Russian virtual keyboard in your computer

As discovered by cybersecurity experts, many viruses has a hard-coded DO-NOT-INSTALL list of countries. The list comes from the principal members of the Commonwealth of Independent States (CIS).

The full list of countries, in which some viruses will not install itself by default, as published by Cybereason, are:


Note: This article is being updated regularly. The latest update is as of 16/07/2021

Image by Markus Spiske from Pexels

Hacking is a very complex process. To defend against cybercriminals, you need to think as one and know how they operate. In this article I’m introducing tools and ways on how to gain and maintain access, escalate privileges and clear the traces.

This article will cover:

Introduction to Operating System Hacking concepts

System hacking is a process of identifying and exploiting vulnerabilities in OS and network systems to gain access to…


Note: This article is being updated regularly. The latest update is as of 16/07/2021

Image by Markus Spiske from Pexels

This article will cover:

This article is a part of a series of articles on Ethical Hacking. If you find it interesting and want to know more, you can also check out:


Note: This article is being updated regularly. The latest update is as of 21/07/2021

Image by Markus Spiske from Pexels

This article is a part of a series of articles on Ethical Hacking. If you find it interesting and want to know more, you can also check out:

This article will cover:

EXTRAS

Introduction to Microsoft Authentication concept

When…


Note: This article is being updated regularly. The latest update is as of 21/06/2021

We’re used to thinking of processors (CPUs) as if they run ordered instructions line by line, but it’s not completely true. To speed up computations, researchers came up with an idea to implement a capability of guessing/speculating by CPUs. It was a great idea that underpinned much of the increase of computing power last years — but, as it turned out many years later, with the price of serious vulnerability.

In this article, I will introduce a Spectre and Meltdown vulnerability that emerged as a side…


Note: This article is being updated regularly. The latest update is as of 17/06/2021

Image by Soumil Kumar from Pexels

This article covers, in depth, on how cybersecurity experts should perform vulnerability analysis. You will find here an introduction to vulnerability concept, types, tools and an example of final vulnerability assessment report.

In essence, vulnerability analysis’s main goal is to identify company security weaknesses. It plays a vital role in keeping the organization’s resources protected. Ignoring or cutting down costs on cybersecurity may result in even higher costs [1, 2, 3].

Let’s start!

This article will cover:


Note: This article is being updated regularly. The latest update is as of 13/06/2021

Hackers are very cunning creatures. They can get what they want by making use of even simple applications like time synchronization utility in an operating system. This article introduces enumeration techniques to make you be aware of concepts and tools hackers use nowadays.

This article will cover:

1. Introduction to enumeration concept

Enumeration is the third step for hackers after Footprinting\Reconnaissance and Network scanning. …


Note: This article is being updated regularly. The latest update is as of 01/06/2021

Note: The main purpose of this series of articles is to introduce how cyber criminals work from the inside. Being aware of their tools and methods may help you prevent cyber attacks on your personal or business resources.

At the end of this article, you will be able to conduct an advanced network analysis using one of the most common scanning tools.

This article will cover:

Introduction to network scanning

Network scanning is the…


Image by Soumil Kumar from Pexels

Note: The main purpose of this series of articles is to introduce how cyber criminals work from the inside. Being aware of their tools and methods may help you to prevent cyber attacks of your personal or business resources.

Note 2: This article is being updated regularly. The latest update is as of 29/05/2021.

At the end of this article, you will be able to perform footprinting and use many kinds of different footprinting tools on your own.

This article will cover:

Maciej Zalwert

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store