Tuesday, 8 August 2017

Cybercrime and the Preventive Measures

Cybercrime can be explained as misusing a computer for fraud or illegal activities like theft of private information, violating privacy of individuals etc. 

Today, Cybercrime is reported everywhere and every day, since computer and internet has started playing a vital role in each and every sector of our life, such as media, marketing, commerce, and entertainment.

New technologies are being invented in Information Technology every hour and it’s really great to have innovative technologies, but the fact is that, more the technologies, more the cybercrimes emerge. 

The difference between the cybercriminal activity and a traditional criminal activity is that a computer is to be used to commit a cybercrime, but the latter doesn’t require a computer. 

The most common type of cybercrime is the data stealing of individuals or corporate firms. 

Types of Cyber Crime

There are several kind of Cybercrime. Some of them are listed below:


The term masquerading means providing wrong information to the system by sending a TCP packet that has a fake source address which makes the packet seems coming from a reliable host.

Computer Intrusion

Computer Intrusion is a breaking activity that makes a computer harmful or the computer network works in an abnormal manner. These attacks include dispersal of viruses, misuse of the operating system etc. 

Denial of Service Attack

In the Denial of Service Attack, the directed users cannot get the resources or services on time. These attacks are executed on websites to damage their company activities or normal business functioning.

Salami Attack

This attack is executed for financial needs where a very small amount like $1 is deducted from a large base of single customers, and the individual customer may not notice the small change, but same time, the attacker gets a big wealth. 

Social Engineering

It is simply cheating the user by sending wrong emails or messages and also calling him/her to provide the confidential information.

Logic Bomb

It is an event driven attack, and generates only when an event occurs.

Smurf Attack

Smurf attack creates a huge amount of traffic on a network, and as a result, the network crashes. It is a type of DOS attack.

Email Bombing

It is an attack where a large number of emails are sent to the victim, causing his/her Email account to be crashed.

Cybercrime: The Protection Guidelines

  • Update and upgrade the Operating System ALWAYS.
  • Install or update Anti-virus/Anti-malware software regularly.
  • Keep the firewall on. A firewall helps to protect your device from cyber attackers or online intruders. 
  • Be careful while downloading. It’s better not to download anything from unknown resources; it may contain viruses or worms. Otherwise, turn ON the antivirus or antimalware software.
  • Turn off your computer. It’s a good and simple idea that turn your PC off always after the completion of your work. Delete the browser history and passwords each time also.

CCNP Security Training in Kochi 

Soften Technologies offers CCNP (Cisco Certified Network Professional) Security training with certification in Cochin, Kerala. CCNA (Cisco Certified Network Associate), CCIE (Cisco Certified Internetwork Expert), MCSE (Microsoft Certified Solutions Expert), RHCE (Red Hat Certified Engineer) courses along with the certification are also offered at our center in Kadavanthra, Cochin. 

Please visit our Networking Training page for the detailed information, syllabus and outline.

CALL: 8129199511, 0484 4037036 for your queries.
Email: softentechnologiescochin@gmail.com


Wednesday, 2 August 2017

Network Monitoring: An Overview

Network monitoring is the process of continuous monitoring of a computer network for slow or failing components.When any trouble occurs on the network, the monitoring system gives quick alert to the network administrator.

Particular software tools are used for the network monitoring task, and it can access the routers, firewalls, client and server. The efficiency and accuracy of computers are also analyzed by using network monitoring systems.

Network Monitoring Advantages:

  • Optimal performance
  • Offers high level security
  • Detects and reports failure of system or network connection.
  • Checks whether the host is responding to the requests.
  • Speed and flexibility

Technologies used for Network Monitoring

  1. Simple Network Management Protocol (SNMP) 
  2. Microsoft Computer Browser Service 


Simple Network Management Protocol is used for getting information from various devices such as servers, printers, hubs, switches, and routers in a network. SNMP is mostly used in LANs. We know that, it is always disgusting to manage thousands of nodes all together. In that case, SNMP can help to control network nodes from a management host. To attain the benefits of SNMP, SNMP agent software has to be installed on the network device. SNMP is modelled in such a way that it can be utilized in many number of devices, so that the managed nodes will be less affected and the transport requirements will be minimized.

Microsoft Computer Browser Service

The Microsoft Computer Browser Service is responsible for collecting and gathering information about computers in a network. Here, the OS assigns tasks to specific PCs on the network to offer browse services. Any networked PC which can collect, maintain, and distribute a browse list can work as a browser server. Computers that are assigned as browse servers co-ordinate and work together to provide a centralized browse list that contains a detailed list of all known domains, workgroups, and the file servers in the domain to which the PC belongs. The advantage of Computer Browser Service is that it enables users to browse easily and effortlessly for available domains, work groups, servers, and resources. 

Network Monitoring Tools


It’s a PHP/MySQL/SNMP-based network monitoring tool, and focusses on servers like Linux, UNIX, Cisco, Juniper, Brocade, Foundry, HP etc.


Zabbix is a very powerfulnetwork monitoring tool, and provides agent-less monitoring, collects nearly any kind of data, and can monitor up to 10,000 devices. Commercial support is also available for this outstanding open source tool.


Nagios is considered as the king of open source network monitoring system.It is not the easiest tool to set up and configure, but unbelievably strong tool, It’s possible to set up email, SMS, and printing alerts using this tool!

Computer Networking Training in Kochi

Soften Technologies offers networking courses training in Cochin, Kerala. CCNA (Cisco Certified Network Associate), CCNP (Cisco Certified Network Professional), CCIE (Cisco Certified Internetwork Expert), MCSE (Microsoft Certified Solutions Expert), RHCE (Red Hat Certified Engineer) courses along with the certification are offered at our center in Kadavanthra, Cochin.

CALL: 8129199511, 0484 4037036 for your queries.
Email: softentechnologiescochin@gmail.com