• Bait and switch
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet77/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   73   74   75   76   77   78   79   80   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    Cookie Manipulation
    ❖ 
    Did you know cookies can be manipulated? Yes, cookies are manipulated. Most users like
    saving their data using cookies, only save non-sensitive data with cookies. The reason being,
    an attacker, will definitely use your cookies to get some sensitive information.
    ❖ 
    An alternative for this is saving your data in the server-side session. The session is more of
    a database file that keeps records of your personal information. It helps the user avoid the
    danger of data being manipulated.
    ❖ 
    To help yourself from the manipulation, put cookies expiry dates. So, after a while, the
    information will be no more, thus lingers it from exploitation. Visiting non-SSL sites puts one
    in danger of exposing their data to malicious sites. SSL encrypted sites are more saver sites to
    visit since they have secured cookies that prevent you from damage.
    ❖ 
    Another way to save yourself from cookie manipulation is by using suitable algorithms.
    The algorithms help in both encryption and decryption of values. This is very significant
    because supposing the cookies are in plain text and fail to operate. Then they are never
    prompt to attacks because the algorithms in place are hard to crack.
    ❖ 
    Additionally, people decide to sign their cookies as a protection defense tool.
    Bait and switch – This seems tricky kind of hacking technique used in today’s world. What
    hackers do, is hack a website/a system and start posting articles not related to that site. The


    company itself may not beware of what is happening. The attackers then prompt you with the
    ad’s not necessarily related to the site.
    They insert links that only Google sees them while the users are unable to see. They benefit
    from this since some of those links are ads. Accessing your computer becomes easier since
    when you download the contents, virus attacks your computer. You’ve probably seen
    something like, a banking site having bitcoins articles. That should keep you thinking and
    make you realize that the contents are manipulated.

    Download 6,34 Mb.
    1   ...   73   74   75   76   77   78   79   80   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish