Saturday, 14 October 2017

SDN - Software Defined Networking

Software Defined Networking (SDN) is an approach to using open protocols to execute globally aware software control at the end of the network to access network switches and routers that typically do use closed firmware.

SDN enables the network to be intelligently controlled using software applications. This helps network operators manage the entire network consistently, without bothering the underlying network technology.

Software Defined Networking: The Benefits

SDN has so many benefits to offer like automated load balancing, on-demand provisioning, streamlined physical infrastructure and the capability to scale network resources in lockstep with application and data needs. 

SDN: The Evolution of the Networks

SDN helps the programming of network behavior in a centrally controlled manner through software applications by using APIs. By implementing a common SDN control layer, the network operators can manage the entire network and its devices consistently, regardless of the complexity of the underlying network technology.

The Critical Areas where SDN technology can make a difference:

  1. Network programmability feature: SDN helps network behavior to be controlled and maintained by the software which resides beyond the networking devices.  Hence, network operators can easily tailor the behavior of their networks to accommodate new services. 
  2. Logically centralized intelligence and network control: SDN enables intelligent control and smart management of network resources. With centralized control, bandwidth management, data restoration, network security, and policies can be highly intelligent and well optimized.

Networking Courses in Kochi 

Soften Technologies offers Computer Networking training with certification in Cochin, Kerala. CCNA, CCNP, CCIE, MCSE, RHCE courses are offered at our networking training academy in Kadavanthra, Cochin. 

Please visit our Networking Training page for the detailed information, syllabus and outline.

CALL: 8129199511, 0484 4037036 for your queries.


Saturday, 16 September 2017

The Role of Routers in a Network

What is a Router?

A Network Router is defined as an electronic device that connects multiple networks by sending data packets. Normally, a data packet is forwarded from one router to another router via networks until it reaches its destination node. 
The most common types of Routers are home and small office Routers that simply forward IP packets between home/office computers and the internet.

Functions of a Router

The main function of a Router is to forward the packets based upon a routing table. They also offer traffic segmentation, multiple broadcast domains and define network layer addressing subnets and networks. IP address are assigned to those networks which are defined by Router Network Adapters or Ports. These assigned IP addresses are considered as the default gateway to PCs, computer servers, or other networking devices.

In simple words, Routers communicate with each other to share information about the available paths to send data packets. 

Difference Between A Switch and Router

Actually, Routers and Switches are computer networking devices which allow one or more PCS to connect to other PCs, networked devices, or to other networks.

A switch connects multiple computers together in a LAN. After the first data transfer, it creates a “switch table” which matches the ports to connected devices by their MAC addresses.

A Switch can connect several devices in a LAN, and it can differentiate the computers as the data passes through it. Switches can recognize which port is connected to the device.

In a Router, IP address is stored in a routing table. The Routers Connect two or more networks, but at the same time, a Switch connects two or more nodes in the same network or different networks.

Types of Routers

Wired Router

They are box-shaped devices that connect directly to computers through wired connections. 

One connection port on a wired Router equips it to connect to a modem for receiving Internet data packs, while other set of ports allow it to connect to computers 

Virtual Router

A Virtual Router acts as a default Router for computers sharing a network. This Router works using the VRRP (Virtual Router Redundancy Protocol), which becomes active when a primary physical router fails.

Core Router

A Core Router is a wired or wireless router which distributes Internet data packets within a network, but same time, doesn’t distribute data packets between multiple networks. 

Wireless Router

A Wireless Router forms a wireless local area network (WLAN). The most common standard for WLAN is Wi-Fi. To protect Wi-Fi networks, wireless routers normally employ wireless media access control (MAC) address filtering, and Wi-Fi Protected Access (WPA) security.

Some of the Best Routers Available in the Market, Currently:

  • Cisco Linksys E900 Wireless N300 Router
  • Netgear WNR614 N300 Wi­Fi Router
  • TP-Link TL-WR740N 150Mbps Wireless N Router
  • Netgear WGR614 Wireless-N 150 Router
  • D-Link DSL-2750U Wireless N ADSL2+ 4-Port Wi-Fi 
  • Asus N600 RT N56U Dual-Band Wireless Gigabit Router
  • Apple AirPort Extreme Wireless Router

Advantages of Routers:

  • It can function on both LAN & WAN
  • Router can determine the best path for data 
  • It can connect different media & architectures.
  • Router can easily filter the broadcasts.

Disadvantages of Routers- 

  • Router works only with Routable Protocol.
  • Router is more costly than Hub, Bridge & Switch. 
  • Routing updates will consume bandwidth.

Networking Courses in Kochi 

Soften Technologies offers Computer Networking training with certification in Cochin, Kerala. CCNA, CCNP, CCIE, MCSE, RHCE courses are offered at our networking training academy in Kadavanthra, Cochin. 

Please visit our Networking Training page for the detailed information, syllabus and outline.

CALL: 8129199511, 0484 4037036 for your queries.

Wednesday, 13 September 2017

The Mobile Game Development and the Scope

The games that are specially designed for mobile devices like smartphones, PDA, tablet PCs are called mobile games. Today, mobile games are easily accessible for users from app stores. Since mobile devices do require less number of system resources, the ingredients of these games are not more than that of PC games. In smart phones, touch screen displays act as user input.

Augmented reality game is the recent trend in mobile gaming. Augmented games are actually not limited to mobile devices only. It is a computer mediated reality in which a real world environment is depicted with advanced computer graphics. Such kind of games require high speed CPU, GPU, and a high RAM.
Through a network, mobile games can be played with multiple players also. A network connection, Wi-Fi or Bluetooth are the things essential for playing with multiple users. It can also be played with different networks including Game Center, Google+, Mobango, Nextpeer, and Facebook.

Advantages of Mobile Games

More accessible

The games are always available and easy to pick up and play. Some games do not need internet connection too. It can be played literally anywhere without further hardware.

Free or Low cost to the costumer

Mobile phone games are almost free or can be purchased at a low cost. It can be downloaded fast and provides greater entertainment. 

Fun for hours

Mobile phone games can be played for hours and it’s a great entertainment for spending leisure time.

Multiplayer games

Mobile games will be more entertaining when playing with friends.

It helps us to learn computer and mobile operation quickly and efficiently.


  • Kids and teen agers mostly, waste their valuable time in playing video games for long hours.
  • People waste money on playing heavy games.
  • Kids continuously playing games for hours and it can damage their eyesight.
  • Playing continuously for hours will damage the battery life of the device
  • Playing games daily will make a person lazy and ignorant of the daily essential activities.


Mobile Game Development Tools

The game development software is complex, heavy and requires a skilled developer to manage the game project. The tools used for mobile development are:

App game kit

App Game Kit allows the developers to program their game once, and implement it at once across numerous mobile devices on the market available today.
This tool has its own basic script language and users can also code C++ if they want. This tool is easy to use for both experienced and unexperienced developers. 

Corona SDK

Corona SDK is a cross-platform development toolkit. It is used by more than 300,000 developers to make 2D games and apps for mobile. It uses the Lua coding language. The company has a huge library of over 500 APIs, and also include features from animation to networking.


Wwise is a popular audio tool in the game industry. It is used to mix unique sounds. It can easily be integrated into other development tools like Unity, Unreal Engine 4 and Marmalade. There are various plug-ins available For WWISE to meet the needs of sound designers.

Scope of Mobile Game Development

Initially, the mobile game development industry faced problems such as low battery life, low memory and less graphics hardware when mobile hardware development was in minority. However, the fast advancement in mobile technology has helped to create innovative and unbelievable performance games. 

Mobile games can be downloaded from Google Play Store or the Apple App store. Category of mobile game development include detective games, combat games, survival games, strategy games, simulation games, educational games, puzzle solving games, sport games, adventure games.

Future of mobile games are unpredictable. The built-in properties of hardware and peripheral accessories affect the way of mobile games are played, greatly. Gaming is an important part in entertainment industry. Firms are using games for training their employees. There is a high scope for mobile game development in healthcare industry too.

Android Training in Kochi 

Soften Technologies offers Android training with certification in Cochin, Kerala. ASP.Net, PHP, Java, Software Testing and Embedded System courses are also provided at our programming training academy in Kadavanthra, Cochin. 

Please visit our Software Training page for the detailed information, syllabus and outline.

CALL: 8129199511, 0484 4037036 for your queries.

Tuesday, 8 August 2017

Cybercrime and the Preventive Measures

Cybercrime can be explained as misusing a computer for fraud or illegal activities like theft of private information, violating privacy of individuals etc. 

Today, Cybercrime is reported everywhere and every day, since computer and internet has started playing a vital role in each and every sector of our life, such as media, marketing, commerce, and entertainment.

New technologies are being invented in Information Technology every hour and it’s really great to have innovative technologies, but the fact is that, more the technologies, more the cybercrimes emerge. 

The difference between the cybercriminal activity and a traditional criminal activity is that a computer is to be used to commit a cybercrime, but the latter doesn’t require a computer. 

The most common type of cybercrime is the data stealing of individuals or corporate firms. 

Types of Cyber Crime

There are several kind of Cybercrime. Some of them are listed below:


The term masquerading means providing wrong information to the system by sending a TCP packet that has a fake source address which makes the packet seems coming from a reliable host.

Computer Intrusion

Computer Intrusion is a breaking activity that makes a computer harmful or the computer network works in an abnormal manner. These attacks include dispersal of viruses, misuse of the operating system etc. 

Denial of Service Attack

In the Denial of Service Attack, the directed users cannot get the resources or services on time. These attacks are executed on websites to damage their company activities or normal business functioning.

Salami Attack

This attack is executed for financial needs where a very small amount like $1 is deducted from a large base of single customers, and the individual customer may not notice the small change, but same time, the attacker gets a big wealth. 

Social Engineering

It is simply cheating the user by sending wrong emails or messages and also calling him/her to provide the confidential information.

Logic Bomb

It is an event driven attack, and generates only when an event occurs.

Smurf Attack

Smurf attack creates a huge amount of traffic on a network, and as a result, the network crashes. It is a type of DOS attack.

Email Bombing

It is an attack where a large number of emails are sent to the victim, causing his/her Email account to be crashed.

Cybercrime: The Protection Guidelines

  • Update and upgrade the Operating System ALWAYS.
  • Install or update Anti-virus/Anti-malware software regularly.
  • Keep the firewall on. A firewall helps to protect your device from cyber attackers or online intruders. 
  • Be careful while downloading. It’s better not to download anything from unknown resources; it may contain viruses or worms. Otherwise, turn ON the antivirus or antimalware software.
  • Turn off your computer. It’s a good and simple idea that turn your PC off always after the completion of your work. Delete the browser history and passwords each time also.

CCNP Security Training in Kochi 

Soften Technologies offers CCNP (Cisco Certified Network Professional) Security training with certification in Cochin, Kerala. CCNA (Cisco Certified Network Associate), CCIE (Cisco Certified Internetwork Expert), MCSE (Microsoft Certified Solutions Expert), RHCE (Red Hat Certified Engineer) courses along with the certification are also offered at our center in Kadavanthra, Cochin. 

Please visit our Networking Training page for the detailed information, syllabus and outline.

CALL: 8129199511, 0484 4037036 for your queries.


Wednesday, 2 August 2017

Network Monitoring: An Overview

Network monitoring is the process of continuous monitoring of a computer network for slow or failing components.When any trouble occurs on the network, the monitoring system gives quick alert to the network administrator.

Particular software tools are used for the network monitoring task, and it can access the routers, firewalls, client and server. The efficiency and accuracy of computers are also analyzed by using network monitoring systems.

Network Monitoring Advantages:

  • Optimal performance
  • Offers high level security
  • Detects and reports failure of system or network connection.
  • Checks whether the host is responding to the requests.
  • Speed and flexibility

Technologies used for Network Monitoring

  1. Simple Network Management Protocol (SNMP) 
  2. Microsoft Computer Browser Service 


Simple Network Management Protocol is used for getting information from various devices such as servers, printers, hubs, switches, and routers in a network. SNMP is mostly used in LANs. We know that, it is always disgusting to manage thousands of nodes all together. In that case, SNMP can help to control network nodes from a management host. To attain the benefits of SNMP, SNMP agent software has to be installed on the network device. SNMP is modelled in such a way that it can be utilized in many number of devices, so that the managed nodes will be less affected and the transport requirements will be minimized.

Microsoft Computer Browser Service

The Microsoft Computer Browser Service is responsible for collecting and gathering information about computers in a network. Here, the OS assigns tasks to specific PCs on the network to offer browse services. Any networked PC which can collect, maintain, and distribute a browse list can work as a browser server. Computers that are assigned as browse servers co-ordinate and work together to provide a centralized browse list that contains a detailed list of all known domains, workgroups, and the file servers in the domain to which the PC belongs. The advantage of Computer Browser Service is that it enables users to browse easily and effortlessly for available domains, work groups, servers, and resources. 

Network Monitoring Tools


It’s a PHP/MySQL/SNMP-based network monitoring tool, and focusses on servers like Linux, UNIX, Cisco, Juniper, Brocade, Foundry, HP etc.


Zabbix is a very powerfulnetwork monitoring tool, and provides agent-less monitoring, collects nearly any kind of data, and can monitor up to 10,000 devices. Commercial support is also available for this outstanding open source tool.


Nagios is considered as the king of open source network monitoring system.It is not the easiest tool to set up and configure, but unbelievably strong tool, It’s possible to set up email, SMS, and printing alerts using this tool!

Computer Networking Training in Kochi

Soften Technologies offers networking courses training in Cochin, Kerala. CCNA (Cisco Certified Network Associate), CCNP (Cisco Certified Network Professional), CCIE (Cisco Certified Internetwork Expert), MCSE (Microsoft Certified Solutions Expert), RHCE (Red Hat Certified Engineer) courses along with the certification are offered at our center in Kadavanthra, Cochin.

CALL: 8129199511, 0484 4037036 for your queries.

Monday, 10 July 2017

Spamming and the Prevention Methods

Spam mail is a kind of commercial advertising. Spamming is an easy form of advertising a product because email sending much cheaper than other advertising methods. Even if a small number of recipients buy the advertised product, the advertiser will get back more than the advertising cost. 

Even though spam mails are mostly in English, it comes in other languages also including Chinese, Korean and Asian languages.

How Spammers Get Emails?

Spammers harvest Email addresses from the following sources mainly:
Publicly accessible sources like Social Media, News Portals, Search Engines 
Using software programs to collect bulk addresses on the web
By guessing common usernames at a given domain name.


Phishing is a kind of spam where messages coming as it’s sent from some legitimate sources like financial institutions, banks as an attempt to steal recipients’ sensitive data (like bank account/credit card information) on fraud web sites.

In fact, banks or financial organizations will never ask sensitive information online. So, it’s advised to verify the origin of the message before filling any information.

How to avoid Spam?

  • NEVER open suspicious email or attachments. It may have viruses or worms which can infect your PC and later it can be used to send spam.
  • Use firewall on your PC to stop attacks from people who’re attempting to penetrate to your system and use it to send spam.
  • Always check the privacy policy on sites before registration. Please ensure that they will not give away your Email address to other third parties.
  • While posting on forums or other public places, do not add your Email ID in your signature.
  • Setting up autoreplies in Email is good, but it may ensure the existence of your email ID to spammers.
  • If the message arrives from a strange or random letters of domain, they might be spam. Stay away from such mails.
  • Also, avoid using your real email addresses in order to sign up for free downloads.
  • Do not purchase anything through spam messages you receive, so as not to support spammers economically.
  • While in chat rooms, don’t display your Email address publicly
  • Some spam mails would ask recipients to provide their bank account details. If the recipient gives away those details, their bank account balance will be nill within seconds. This kind of spam is called ‘scam’.
  • Other popular kind of spamming, is Nigerian letters which would be a request to be their business partner in the recipient’s country and later on they will ask some initial investment. So, be careful about it.

Spam Category:

  • Personal finance
  • Adult content
  • Health
  • IT
  • Automotive
  • Education and training

New Spam: Ant-Spam Campaign

There has been arrived a new kind of Spam which advertises Anti-Spam campaigns. People who’re eager to know about the anti-spam facts, will be taken to a Trojan site where it uses the infected system to send spam emails to the contact list stored in the PC.

CCNP Security Training in Cochin

Soften Technologies offers CCNP Security Training courses along with software programming courses in Cochin, Kerala. CCNA (Cisco Certified Network Associate), CCNP (Cisco Certified Network Professional), CCIE (Cisco Certified Internetwork Expert), MCSE (Microsoft Certified Solutions Expert) certifications, RHCE (Red Hat Certified Engineer), and Linux are offered along with software courses like ASP.NET, PHP, Java, Android, Embedded Systems.

CALL: 8129199511, 0484 4037036 for your queries.



Saturday, 8 July 2017

Big Data Overview

Big data is defined as the data which is too large or complex in nature. It’s also described as the collection, processing and availability of huge volumes of streaming live data in real-time. The traditional data processing techniques are inadequate to process it.

By using Big Data, companies can understand and analyze the business concepts and thereby able to take better decisions and strategies for development of the firm.

Big Data Categories

Big data comes from various devices and their applications. Explained below are some of the methods through which big data can be extracted:
Search Engine: Search engines grab a large volume of data from different sources of database.

Social Media: 
Data gathered through Social networking sites like Face book, Twitter, Google Plus. It contains the information and comments posted by millions of people around the globe.

Stock Exchange: 
It has information about the ‘buying’ and ‘selling’ decisions regarding share between different companies and the customers.

It includes the data on vehicle model & type, capacity, distance and availability of a vehicle.

Black Box: 
It is incorporated by flights, which stores a large amount of information like the conversation between flight crew members and other communication centers such as ground duty staff.

Power Grid: 
The power grid data stores the information consumed by a particular node in a base station.

The Importance of Big Data

There are several significances for Big Data which can solve and rectify many issues in businesses, like below:
  • To take smart and wise decision
  • For the development of a new product
  • To announce the best and optimized offers
  • To reduce cost
  • To reduce time and duration

Big Data Advantages:

  • It’s relevant
  • It’s accessible
  • Big Data is authoritative
  • It’s up-to-date and actionable

Big Data Analytics

While checking big data with high-powered analytics tools, great results can be obtained which can re-draw the business strategy like:
  • Identifying the root cause of failures and defects.
  • Understanding the customer’s habit of buying more clearly
  • Improving consumer engagement and loyalty
  • Calculating the total risk portfolios quickly.
  • Detecting and finding out any suspicious behavior at the earlier stage.

Who uses the Big Data Technology?

  • Banking sectors
  • Government organizations
  • Education centers
  • Health Care sectors
  • Manufacturing units
  • Retail sectors

How businesses are utilizing Big Data?

Big Data is converted into small piece of information. Then business enterprises can analyze and identify what their customers’ need, which products are fast moving in the market, methods to reduce cost etc., Likewise, the Big Data offers big benefits for business enterprises and hence there is a great demand for it in the business world.

Software Testing Training in Cochin

Soften Technologies offers Software Testing courses along with networking training and certification in Cochin, Kerala. ASP.NET, PHP, Java, Android, Embedded Systems are offered along with networking training like CCNA (Cisco Certified Network Associate), CCNP (Cisco Certified Network Professional), CCIE (Cisco Certified Internetwork Expert), MCSE (Microsoft Certified Solutions Expert) certifications, RHCE (Red Hat Certified Engineer), and Linux.

CALL: 8129199511, 0484 4037036 for your queries.



Monday, 5 June 2017

The BitcoinDigital Currency

It’s a form of digital currency created electronically in which encryption technique is used to regulate the generation of units of currency and to verify the fund transfer. It’s operating independently of a central bank.Nobody is there to control it.

The Bitcoins aren’t printedlike dollars. Bitcoin currency is fully unregulated and totally decentralized. There is no guarantee or insurance coverage for your deposit with Bitcoin.

You can use your Bitcoins to purchase goods and services online, or you can gather them hoping that their value might increase over the years.Bitcoins are transferred from one personal 'wallet' to another.

Transactions takes place directly with no middle men – meaning, no Banks! Thetransaction fees are too low and no need to give your real name. Bitcoin has been recorded as the first decentralized digital currency in the world.
Bitcoins can be earned by two ways – as a reward for mining, or it can be exchanged for other currencies,products, or services.

Miners are the collective network of people who contribute their PCs to the Bitcoin network.They are paid for their accounting work by earning new Bitcoins each week.

How is it Different from Normal Currencies?

Bitcoin is used to buy things electronically only. It’s not a printed or physical currency.

Who Developed Bitcoins?

Mr. Satoshi Nakamoto - a software developer - proposed the digital currency - Bitcoinin 2009. The concept was to create a currency independent of any Bank authority, which is able to transferelectronicallywith very low transaction fee.
Currently, it’s estimated that over $1B of investment has been made into Bitcoin sector. Several companies and thousands of individuals are involved in Bitcoin currency trade from around the globe.

The Working Principle of Bitcoin

Our traditional currency like dollar or pound has been based on gold or silver. That means, if you deposit a dollar at the bank, you could get some gold back, but in the case of Bitcoin, it’s not based on gold; the currency itself is self-contained. It’s based purely on mathematics.
People are using software that follows a mathematical formula to createBitcoins.
The final point is, Bitcoins trade can’t be monitored or controlled by Govt. agencies, banks or tax men. So, it might not be supporting any Govt. or nation’s interests.

The Features of Bitcoins

Bitcoin has numerous important features

  • Bitcoin Account Set up is easy
    It’s too easy to set up a Bitcoin account; it can take only seconds, no fees is required or no needed much formalities like for setting up a Bank account.
  • Bitcoin is decentralized
    It’s not controlled by a single authority. Every system which uses Bitcoin and does transactions are becominga part of the Bitcoin network. Not any central agency can issue any monetary policy or control the transactions.
  • Totally  transparent
    The Bitcoin keeps all the details of transactionswhich ever happened in a large general ledger, called the Blockchain.
  • It's anonymous
    Users in a Bitcoin network can have multiple addresses, or they aren’t linked to names, addresses or any identification numbers.
  • Transaction fee is less
    Bitcoin charges for transaction are too low compared to traditional Bank charges. They will charge a small fee for the service of their servers, the online exchanges which convertsBitcoins into dollars, and for the mining pools you join. 
  • It’s non-refundable
    When you transfer Bitcoins to other persons, they’re gone forever, no chance to get them back, unless the recipient is willing to return them back to you.

Bitcoin Security 

Bitcoin is not 100% secured like other currencies. The person who has Bitcoins with him should find his own precaution in order to not be stolen by hackers.

Programming Languages used in Bitcoin

Bitcoin is primarily written in C++. Java and Python languages are also used.

Programming Language Training in Cochin

Soften Technologies offers programming language courses along with networking training and certification in Cochin, Kerala. ASP.NET, PHP, Java, Android, Embedded Systems, Software Testing are offered along with networking training like CCNA (Cisco Certified Network Associate), CCNP (Cisco Certified Network Professional), CCIE (Cisco Certified Internetwork Expert), MCSE (Microsoft Certified Solutions Expert) certifications, RHCE (Red Hat Certified Engineer), and Linux.

CALL: 8129199511, 0484 4037036 for your queries.


Thursday, 1 June 2017

The WannaCry Ransomware Attack

A global cyber-attack has been reported recently which affected more than 230,000 computers in over 150 countries. In the United Kingdom, the cyber assault hit 47 Hospitals and the operations have been cancelled leaving patients helpless or without getting proper treatment. This cyber-attack has been reported due to a Ransomware called WannaCry.

The WannaCry Ransomware is a crypto worm which targeted the Microsoft Windows OS computers, by encrypting data, blocking access to the files and demanding payments in the Bitcoin cryptocurrency.

Microsoft had already announced the vulnerability issue on March 14 and advised users to patch their software.

The WCry is a specific hacking program which locks all the data on a computer system and leaves with only two files: directions on what to do next and the Wanna Decryptor program itself.

When the user opens the software, it informs the users that their files have been encrypted (locked), and gives them a few days to pay the ransom amount, with a warning that their files will be deleted if not paid within the date. WannaCry demands the payment in Bitcoin, it will show the instructions on how to purchase it, with their Bitcoin address to send it to.

Protection Measures against WannaCryAttacks

  • The best protection method against Ransomware attacks is to have all files backed up regularly in a separate system. This can protect your files from an attack because you have already a backup.
  • Never open any suspicious Email or website link. The most common method of installing the virus is through phishing emails or websites.
  • Downloading an app, or visiting a website which displays malicious adverts can also make you a victim of the WannaCry attack.
  • Updating the Antivirus programs is a MUST because it can scan files before they are going to be downloaded, and can block secret malware installations.
  • It is strongly recommended that all Windows users must fully update their system with the latest available patches.
  • It is also suggested to disable the SMB1 file protocol, through which the worm was believed to spread across various networks.

Recently, some cyber security companies have developed sophisticated tools against cyber-attack, including machines which fight back when they identify hackers in a system.

What to do if WannaCryAffected - Should you PAYor NOT?

It’s advised to never pay the ransom amount as it encourages the hackers to continue with their hacking process. Even if the amount is paid, there is no guarantee that all files would be returned safe.
The best thing to do in such a situation is to restore all files from the back up source. If it’snot possible, there are some tools available now which can decrypt and recover the encrypted files.

How Much Do AttackersDemand?

The Ransomware hackers often demand between 0.3 and 1 Bitcoins (£400 - 1,375).
The Bitcoin digital currency has been popular among cyber attackers,because it is practically impossible to find out or track who’s playing behind while using Bitcoin unlike traditional currencies.

How Did the WannaCry Spread to Other PCs?

Detailed analysis from Anti-virus/Anti-malware developers like Proofpoint, Symantec and Kaspersky got evidence that WannaCry Ransomware began to spread via Microsoft's SMB flaw. This system is meant to share files between PCs on closed networks but can easily be exploited if one PC is connected to a public network.

Which Programming Lanuguage used to Code WannaCry?

Like most other malwares, it is also written in C, C++ Programming Language.

Software Programming Training in Cochin

Soften Technologies offers software programming courses like ASP.NET, PHP, Java, Android, Embedded Systems, Software Testingalong with networking training and certification like CCNA Security, CCNP Security, CCIE Security, MCSE, RHCE and Linuxin Cochin, Kerala.

CALL: 8129199511, 0484 4037036 for your queries.


Tuesday, 2 May 2017

The Cyber Warfare

Cyber warfare can be defined as the use of information technology to disrupt and destroy the activities of a state or organization, by attacking the total information systems for strategic or military purposes.

The impact of Cyber-attack can be very large; it can affect different sectors of a nation like:
1. Government sector
2. Business sector
3. Social Media
4. Individual level

Cyber-attacks Recorded in the History:

(As per Wikipedia information).

  • 2007 Cyber-attacks on Estonia, wide ranging attack targeting government and commercial institutions
  • July 2009 Cyber-attacks against South Korea and United States
  • 2010 Cyber-attacks on Burma, related to the 2010 Burmese General Election
  • 2010 Japan–South Korea Cyber Warfare
  • 2013 Singapore Cyber-attacks
  • #OpIsrael, a broad "anti-Israel" attack
  • Cyber-attacks during the Russo-Georgian War
  • Operation Olympic Games, against Iranian nuclear facilities, allegedly conducted by the United States

Types of Cyber Attacks:

Many security vulnerabilities occur due to increased internet connectivity. Cyber attackers exploit those vulnerabilities. Different types of Cyber-attacks are explained below:

1. Phishing
Phishing attacks are coming in the form of Emails to inbox. While clicking the link on the mail, it will steal user data.

2. Denial-of-Service (DoS) Attacks
A DoS attack causes damaging the service to a network. Attackers send bulk volumes of traffic through the network and then the network becomes overloaded and can’t work anymore.
In a DoS, the attacker uses multiple computers to send the data that will overload the system. In this case, a PC user may not even realize that his computer has been hijacked and became a part of the DoS attack.
Due to DoS attacks, online access would be blocked to a site, and the business or organization can’t function properly.

3. Password Attacks
Password attack is that some unknown source trying to gain access your system by cracking your password. There are programs which are used to guess passwords, and also to compare various possible word combinations against a dictionary file.

4. Malware
Malware is defined as the code with malicious purpose which can steal data or destroys something on the PC.
Malware includes Trojans, viruses and worms.
Malware is commonly penetrated to a system while opening email attachments, downloading a software or through Operating System vulnerabilities.

5. Rogue Software
A Rogue software is a malware that pop ups as a necessary security software which can keep your system safe and protected from hacking.
Rogue security software gives alerts that the user system security is in trouble and has to download the software to protect the system. While clicking “Yes”, the Rogue software will be  downloaded to the system.

6. “Man in the Middle” (MITM)
The MITM can grab information from the end users and the entity (like banks) which user is communicating with.
To explain, if you are banking online, the man in the middle will communicate with you as an executive from Bank, and communicate with the Bank as it’s you. The man in the middle can then receive all of the information exchanged between both parties, like bank accounts and personal data.

7. Password Re-use
Users have a tendency to use the same password for many sites. Once attackers hack some sites, they collect a list of passwords and try to use it for accessing your sensitive information like Bank account or other crucial information.

8. Malvertising
Malvertising is downloading a malware through clicking an ad. Attackers would upload infected ads to different sites through an ad network. When a user clicks on any of these ads, some kind of malware will be downloaded to the system.

Hacking: Preventive Measures

  • Banking or shopping should be done on your own device only. NEVER do it on a public computer, in a cafĂ©, or a free WiFi — there might be chances of your data to be stolen.
  • Use a strong password with numbers, characters and special characters, and don’t use the same password for multiple sites. Don’t share your password with others also.
  • Be careful always while clicking on suspicious attachments or email links. Confirm the URL of website the link directs you to.
  • Don’t share sensitive information on social networks. Hackers can grab all those valuable data. Tighten your Social-Media security settings also.
  • Give password and lock all devices and never leave them unattended. Lock flash drives and external hard drives also with password if there is sensitive information.
  • Activate Firewall. It monitors all the incoming and outgoing network traffic towards your computer.
  • Update operating system, browser, and other important software with the latest security patches to minimize threats from viruses and malware.
  • Do not install ‘cracked’ software which can attract spyware to your system.
  • Update anti-virus/anti-malware software regularly, and do a regular backup of data.
  • Be careful while plugging flash drives, external hard drives, and smart phone to the PC. Malware can be transferred through it.
  • Don’t share any sensitive information like Bank account PIN through Emails or phone calls if some unknown person emails or calls you and telling that they’re from the Bank.
  • While uploading your personal data to any online file sharing services, do it as encrypted mode only.

Networking Security Training in Cochin 

Soften Technologies offers networking security training and certification like CCNA Security, CCNP Security, CCIE Security along with MCSE, RHCE and Linux. We offer Software Programming courses also, like ASP.NET, PHP, Java, Android, Embedded Systems, Software Testing in Cochin, Kerala. 

CALL: 8129199511, 0484 4037036 for your queries.