top of page
Search

Popular Myths

  • Writer: Abhilasha
    Abhilasha
  • Aug 10, 2021
  • 2 min read

Updated: Aug 12, 2021

Let's start by reaching back in history to get a better picture of the origins of these false assumptions


The first 32 bit microprocessor was premiered by AT&T is 1980 and the internet research began in 1968. The history of the internet starts with Arpanet a network that joined four computers locate in four different universities.


Arpanet was originally designed for the military because Americans lost the race of the launch of the world's first satellite. So, to defend Russia military power, the US had to connect the military and that's why the research of internet was done.


The network that we use today is different from the network that was created back in 1968. The world wide web was created 20 years ago and its appearance completely changed the way global computer networks have been used.


Let's get to the Myth:


  1. The first myth is you can ensure total protection of your computer system, that would be something, wouldn't it?

This is merely a myth. If you wanted your system to be secure you would need to bar users from interacting with it. You can't be sure whether or not the goals and aims of users are in fact malicious. To have a 100% secure system, the system shouldn't accept any input, should not have a mouse or any keyboard or any port that you could use to plug in a smartphone but that will be impossible to operate.


2. Nobody wants to hack your system:


Each computer and network can be targeted with a number of different attacking techniques, ranging from the least script kid attacks to much more serious attacks.


If your system is connected to the internet then chances are it could be a zombie computer [a zombie is a computer connected to the Internet that has been compromised by a hacker via a computer virus, computer worm, or trojan horse]


Your system won't be attacked just to see your data. Instead of your neutral computer can be used to send information or launch an attack on a specific group.


3. It's possible to successfully protect users from malicious and unwanted software


You can only protect users through anti-virus. The drawback wuth anti-virus is, it can only detect a small portion of threats. To launch a virus you don't need knowledge of 16 years of coding or any assembler, rather you can just read articles and choose pre-made tools.


4. Firewalls protect computer from all remote attacks.


The majority of firewalls filter traffic based on port number and sessions which are completely ineffective. It's easy to use other than HTTP, you can send through port 80 or peer to peer connection.


It has encrypted data at port 443 which is more secured version of port 80 but it can't be fully relied upon.



 
 
 

Recent Posts

See All
PE internals

Linked Libraries and Functions Imported Functions: Definition: These are functions used by a program that are actually stored in...

 
 
 
OS internals

Privilege Separation Concept: Modern operating systems separate user applications (untrusted) from critical operating system components...

 
 
 
Memory Management in short

Address Space CPU Access: To run instructions and access data in main memory, the CPU needs unique addresses for that data. Definition:...

 
 
 

Comentários


Subscribe Form

Thanks for submitting!

©2021 by just dump 1. Proudly created with Wix.com

bottom of page