Year: 2019

CCNA September 22, 2019

How to Troubleshoot ACL Errors

As discussed earlier, we can troubleshoot the ACL error using the show commands. The wrong-order ACEs are the most common ACL errors. This article will discuss some common errors in ACL configuration ACL Error – Example 1 In the figure, host 192.168.2.2 has no HTTP or HTTPS access with 192.168.4.2. When entering the show access-lists...
Asad Ijaz Read More
CCNA September 21, 2019

Inbound and Outbound ACL Logic

Inbound ACL Logic When a router receives a packet, it starts comparing the information in the packet header with the ACL. If the information in the packet header and an ACL entry match, the rest of the entries in ACLs are skipped, and the packet is permitted or denied as configured by the matching entry....
Asad Ijaz Read More
Network topology diagram showing routers, switches, PCs, and a server with IP addresses and access-list configurations.
CCNA September 21, 2019

How to Configure Extended ACLs – Exclusive Explanation

The number of extended ACLs starts from 100 to 199 and 2000 to 2699, providing 799 possible extended numbered ACLs. We can also create extended ACLs with the name. Extended ACLs are used more than standard ACLs because of greater control and facilities. Extended ACLs check packet source addresses, destination addresses, protocols, and port numbers....
Asad Ijaz Read More
Social Engineering
Cyber Security September 14, 2019

What is Social Engineering? – Exclusive Explanation

Social engineering is a non-technical way for a criminal to collect information on a target. It is an art of gaining entrée to buildings, systems, or data by exploiting human psychology instead of breaking in or using technical hacking techniques. For example, instead of finding software vulnerability, a social engineer might call an employee and...
Asad Ijaz Read More
Cyber Security September 14, 2019

What is Browser Plugins and Its Poisoning

Security backholes can affect web browsers. The web browser displays pop-up promotions collects identity information, or installs adware, viruses, or spyware. A cybercriminal can hack a browser’s executable file, a browser’s components, and plugins. Browser Plugins A browser plugin is a software that acts as an add-on to a browser and installs extra functions in the browser. Browser plugins...
Asad Ijaz Read More
Vishing
Cyber Security September 14, 2019

What is Vishing, Smishing, Pharming, and Whaling

Vishing Vishing is also phishing. It uses voice VoIP communication technology for fraud—the criminals spoof calls from legitimate sources using voice over IP (VoIP) technology. The victim can receive a recorded message that appears legitimate. Vishing works just like phishing, but it does not always occur over the Internet and is carried out using voice...
Asad Ijaz Read More
phishing
Cyber Security September 14, 2019

What is phishing? – Exclusive Explanation

As I said in one of my earlier articles, phishing is easy to execute, and it requires minimal effort; therefore, many cybercriminals use this method. The criminals sent fake emails and text messages and created a website that looked authentic. They use email, messages, and websites to steal personal and financial information from users. This...
Asad Ijaz Read More
Cyber Security September 13, 2019

Introduction to Spyware, Adware, and Scareware

In the previous article, I discussed malware, including its types: viruses, worms, ransomware, trojan horses, logic bombs, back doors, and rootkits. This article should discuss malware types, spyware, adware, and scareware. Spyware A computer installs this software without the end-user knowledge, enabling a criminal to get information about the user’s computer activities. The spyware activities...
Asad Ijaz Read More
Cyber Security September 13, 2019

What is Malware and Malicious Software?

Malware, or malicious software, is a program or file designed to disturb computer processes and operations or gain entrée to the computer system without the user’s knowledge or permission. Malware has become a common term for all hostile or intrusive software, computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. The...
Asad Ijaz Read More
Forum