Technology by Design

Technology news, reviews, and how to keep your technology running fast and smooth!

  • Home
  • About TbyD
    • Who is TbyD
    • Why Choose TbyD?
    • 16 Things
    • Your Computer Guy
  • Products and Services
    • Business Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
      • Performance Analysis
      • Optimization
      • Core Security Solution
      • Managed Backups
      • Computer and Network Systems
      • Computer Setup
      • Domain Names
      • Email Services
      • Extended Warranties
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
      • Websites
    • Services
      • Monthly Service Plans
        • Enterprise Service Plan
        • Business Service Plan
        • Personal Service Plan
        • Computer Setup
      • Core Security Solution
      • Managed Backups
      • Extended Warranties
      • Performance Analysis
      • Optimization
      • Network Cabling Services
      • Security Camera Systems
      • Managed Spam Filters
      • VoIp Phone Systems
    • Products
      • Computers
      • Servers
  • Testimonials
    • What Our Clients Say About Us
  • Blogs
    • ALERTS
    • FAQ
    • How To Videos
  • Newsletters
    • TechTips Newsletters
  • Reviews
  • Media
    • Email Red Flags
    • E-Books
    • Disaster Prevention Planning Kit
    • Free Reports
  • Contact Us
    • Contact Us
    • Quick Support

LAN

March 2, 2015 by The T By D Team 1 Comment

LAN:  Local Area Network

Supplies networking capability to a group of computers in close proximity to one another, such as within an office building, school, or home.  A LAN is useful for sharing resources like files, printers, games, or other applications.

A LAN often connects to other LANs, and to the internet or WAN.

Filed Under: Definitions

WAN

March 2, 2015 by The T By D Team 1 Comment

WAN:  Wide Area Network

Spans a large geographical area, such as a state/province, or country.  WANS often connect multiple smaller networks (LANs) or metro area networks (MANs).

The world’s largest WAN is the Internet.

Filed Under: Definitions

Definition: Denial Of Service Attack

February 17, 2015 by The T By D Team Leave a Comment

 

Denial Of Service Attack:

 

“DoS Attack”

 

 

 

An assault on a network that floods it with so many requests that regular traffic is either slowed or completely interrupted.  Unlike a virus or worm, which can cause severe damage to databases, a denial of service attack interrupts network service for a long period of time.

 

Distributed Attack:

 

“DDoS Attack”

A distributed Denial of Service attack can employ hundreds or even thousands of computers that have previously been infected.  The computers act as “zombies” and work together to send out bogus messages, thereby creating huge volumes of phony traffic.

Filed Under: Definitions

Botnet

February 17, 2015 by The T By D Team Leave a Comment

Botnet:

 

Also called “Zombie Army”.

 

 

 

A network of a large number of private computers infected with malicious software.  They are then controlled as a group, without the owners’ knowledge.  They are usually used to generate spam, relay viruses, or flood a network or Web server with excessive requests to cause it to fail (see “Denial of Service Attack“).

The individual computers are compromised via a Trojan that often works by opening an Internet Relay Chat (IRC) channel that waits for commands from the person/organization in control of the botnet.

There is a thriving botnet business selling lists of compromised computers to hackers and spammers.

Filed Under: Definitions

Definition: Spear-Phishing

February 17, 2015 by The T By D Team 4 Comments

Spear-Phishing:

 

A targeted email scam with the sole purpose of obtaining unauthorized access to sensitive data.

 

 

 

Unlike phishing scams, which case broad, scatter-shot attacks, spear phishing hones in on a specific group or organization.  The intent is to steal intellectual property, financial data, trade or military secrets and other confidential data.

 

Victims are 4.5 times more likely to fall for spear-phishing email scams than normal phishing scams.  

 

This Is How It Works:

An email arrives, apparently from a trustworthy source, but instead it leads the unknowing recipient to a bogus website full of malware.  The malware infects that person’s computer.  If that person is connected to a network, or server, the CyberCriminals that sent the email now have access to the server and/or network, and all it’s information and data it/they contain.

These emails often use clever tactics to get victims’ attention.  For example, the FBI has warned of spear phishing scams where the emails appeared to be from the National Center for Missing and Exploited Children.

Many times, government-sponsored hackers and hacktivists are behind these attacks.  CyberCriminals do the same with the intention to resell confidential data to governments and private companies.  These CyberCriminals employ individually designed approaches and social engineering techniques to effectively personalize messages and websites.  As a result, even high-ranking targets within organizations, can find themselves opening emails they thought were safe.

 

One of the main entry points for Advanced Persistent Threats.

How To Stop It:

Traditional security often does not stop these attacks.  They are so cleverly customized, and are becoming more and more difficult to detect.

To fight spear-phishing scams, employees need to be aware of the threats.
Employees need to be aware of the possibility of bogus emails landing in their inbox, and what to look for.  

One employee mistake can have serious consequenses for businesses, financial institutions, governments, and even non-profit organizations.  With stolen data, CyberCriminals can reveal commercially sensitive information, manipulate stock prices, or commit various acts of espionage.

Spear-phishing attacks can deploy malware to hijack computers, organizing them into enormous networks called botnets that can be used for denial of service attacks.
Technology that focuses on email security is an absolute necessity.

 

 

Filed Under: Definitions

Definition: Phishing

January 20, 2015 by The T By D Team 5 Comments

Phishing:  The attempt to acquire sensitive information (eg. usernames, passwords, credit card information, financial information), and sometimes (indirectly) money, via email, by scamming the user by masquerading as a legitimate company or a trustworthy entity.  An email fraud scam method in which the perpetrator sends out legitimate-looking email in an attempt of information or identity theft.

Filed Under: Definitions

Motherboard

January 13, 2015 by The T By D Team Leave a Comment

Motherboard:  Sometimes called the “main circuit board”, “system board”.  A printed circuit board that is the foundation of a computer, located in the computer tower.  It allocates power to the CPU, RAM, and all other computer hardware components, and allows them to communicate with each other.

Filed Under: Definitions

CPU

January 13, 2015 by The T By D Team Leave a Comment

CPU or Central Processing Unit:  Sometimes called the “processor” or “central processor”.  The CPU is responsible for handling all instructions it receives from the computer hardware and software running on the computer.  The CPU is found secured into a CPU socket on the motherboard.

Filed Under: Definitions

NTFS

January 13, 2015 by The T By D Team Leave a Comment

NTFS or New Technology File System:  A file organizational system that stores and accesses information located on Windows XP and later operating systems.  NTFS offers better methods of data protection and file recovery than the previous file system FAT.

Filed Under: Definitions

FAT

January 13, 2015 by The T By D Team Leave a Comment

FAT or File Allocation Table:  FAT is a method of keeping track of the contents of a hard drive used by early Microsoft operating systems.

Filed Under: Definitions

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • Next Page »

Sign Up For The Monthly TechTips Newsletter!

* = required field
unsubscribe from list

powered by MailChimp!

Recent Posts

  • ALERT: Celebrity Death Scams
  • ALERT: Uber Hacked
  • ALERT: Netflix Email Scam
  • ALERT: Bad Rabbit
  • Scam – Reset Password Alert

Recent Comments

  • ALERT: New Ransomware Targets MS Office 365 Users - Technology by Design on Managed Backups
  • ALERT: FBI Warns Email Extortion Heating Up for Summer! - Technology by Design on ALERT: AshleyMadison Hack Blows Up
  • ALERT: Evil Android Trojan Empties Your Bank Account - Technology by Design on Definition: Phishing
  • ALERT: HTML Attachments - Technology by Design on Definition: Phishing
  • ALERT: New Ransomware Also Steals Your Bitcoins - Technology by Design on Managed Backups

Copyright © 2025 · Dynamik Website Builder on Genesis Framework · WordPress · Log in