Skip to main content

Big lies makes you pay

It's about web security , but this article contains many lies that we are saying or thinking about 
and never try to make sure that we are not going to fall in it.
These lies about web security .


1- The Lock icon is lighting on , it's ok


it's amazing that everyone looks for the lock int he browser bar to believe that this site so secure, it's a big lie . you are not safe . 
the lock in the browser bar doesn't mean that you are fully secure , it's only the SSL , means that the data are transferred in secure way . 
but the agent(Hacker) who get the info can use it easily.
Note : some Hackers are very good at faking SSL certificate or buying one .

2- Website Reputation 
It's not true that if you don't visit websites of ill repute , you are in all clear ,No No! Wrong answer. 
more than 83% of malware hosting sites are trusted.

3- Don't underestimate the information in your computer .
This is the most dangerous point , that a lot of people think of their information as useless or "it doesn't matter if any one sees or knows them".
everyone has his own privacy , try not to let others to get them easily. 

4- Antiviruses 
Antiviruses can only protect your computer from viruses , if you keep yourself updated.
But it doesn't protect your credit card or any web information from being stolen. "but it’s not going to save you from a hacker’s super-smart coding hat trick"

5- My password can't be predicted at all 
If you have password "mah@i*2^33jff%sad(0adm)" , and you think that this password can't be detected , 
it's true , that it can't be detected easily , but there are many other ways to know it. 
Keyloggers are saving every char you type and put it in text file which is sent to the hacker.

6- don't download files 
It seems the first time that "don't download files" can protect you from being hacked. 
it's not true , now there are many ways to hack you computer other than files downloaded to your pc. 
,malware infections may occur through "drive-by" downloads



Comments

Popular posts from this blog

The Difference between DB and DB_EXTENDED

When doing Audit on any table on the the database , the default auditing is DB. SQL > show parameters audit_trail NAME                                 TYPE        VALUE ------------------------------------ ----------- ------------------------------ audit_trail                          string      DB in this case , when you do audit on some table. SQL> audit all on scott.emp by access; Audit succeeded SQL> update emp set sal=sal*0.95 where job='MANAGER'; 3 rows updated. if you want to know the statement made these changes, you will receive nothing on the sql_text field while you are selecting the audit_trial table.

Web Application Security Scanner : Sandcat

Sandcat is multi-process remote web application security scanner. It maps the entire web site structure ( all links , forms , XHR requests and other entry points) and tries to find custom,unique vulnerabilities by simulating a wide range of attacks/sending thousands of requests (mostly GET and POST).  It also tests for SQL Inection, XSS, File inclusion and many other web application vulnerability classes.  Sandcat's code scanning functionality automates the process of reviewing the web application's code .  Source : CEH Lectures ...