Posts

Showing posts from 2018

Featured Post

10 መሠረታዊ የኮምፒውተሮቻችንን ደህንነት መጠበቂያ መንገዶች 10 Basic Ways to Secure Your Computer

Image
  10 መሠረታዊ የኮምፒውተሮቻችንን ደህንነት መጠበቂያ መንገዶች 10 Basic Ways to Secure Your Computer 1. ሁላችንም የጥቃት ዒላማ ውስጥ መሆናችንን መረዳት መቼም ቢሆን “የሳይበር ጥቃት እኔን አያጋጥመኝም" ብሎ አለማሰብ፡፡ ሁላችንም በግል እና በምናደርጋቸው የገንዘብ ዝውውሮች እንቅስቃሴያችን ወይም በነበረን መልካም ስም ላይ ተፅዕኖ የሚፈጥር አደጋ ሊያጋጥመን ይችላል፡፡ የሳይበር ደህንነትን ማረጋገጥ የሁሉም ሰው ኃላፊነት ነው፡፡ ስለዚህ ሁልጊዜም ተገቢውን ጥንቃቄ ማድረግ ያስፈልጋል፡፡ 2. ለሶፍትዌሮች ወቅታዊ ዝመና ያድርጉ የኦፕሬቲንግ ሲስተሞቻችን /Operating System/ እና ፕሮግራሞቻችን የዘመኑ ሶፍትዌሮችን መጫን መሠረታዊ ነገር ነው፡፡ ሁልጊዜም የቅርብ ምርት የሆኑ የደህንነት ዝመናዎችን ማድረግ ጠቃሚ ነው፡፡ በተጨማሪም፡- • የመሣሪያዎትን ኦፕሬቲንግ ሲስተም ቀጥተኛ ዝመና /Automatic Update/ ላይ ያድረጉ፣ • ቀጥተኛ የደህንነት ዝመና በየጊዜው የሚያቀርቡ እንደ ክሮም ወይም ፋየር ፎክስ /Chrome or Firefox/ ያሉ የድረ-ገጽ ማፈላለጊያዎችን መጠቀም ይመከራል፣ • እንደ ፍላሽ፣ ሀርድ ዲስክ እና የመሳሰሉ ተንቀሳቃሽ መሣሪያዎችን ሲጠቀሙ ሁልጊዜም ወቅታዊ ዝመና የተደረገላቸው መሆናቸውን ማረጋገጥ ያስፈልጋል፡፡ 3. የፌሺንግ ጥቃት ሙከራዎችን ያስወግዱ የፊሺንግ ጥቃት የተለያዩ የማህበራዊ ምህንድስና መንገዶችን በመጠቀም የሚፈፀም ቋሚ ስጋት ሲሆን የሳይበር ወንጀሎች እንደ የይለፍ ቃል ባንክ መረጃዎች እና ክሬዲት ካርድ ያሉ ግላዊ መረጃዎችን የሚያጭበረብሩበት ነው፡፡ • የፊሺንግ ጥቃት ብዙውን ጊዜ በኢ-ሜይል አድራሻ፣ ከዚህ በተጨማሪም በስልክ፣ በመልዕክት መለዋወጫ ወይም በማህበራዊ ሚዲያ አማራጮች የሚፈጸ...

What Is PoE (Power Over Ethernet) Switch? Why Use It? How to Use It?

Image
The large amount of devices used by industrial applications such as transportation, public facility and manufacturing automation will give rise to the cables in a condition of disorder. With industrial devices becoming more power-hungry, the PoE technology wins a good reputation among users with the capability to provide higher power and reduce the number of cables required. In this article we will discuss what is PoE switch, why use PoE switch and how to use PoE switch. What Is PoE Switch? PoE switch  or power over ethernet switch is a  network switch  which applies Power over Ethernet technology. When connected with multiple network devices, PoE switch can support power and data transmission over one Ethernet cable at the same time which dramatically simplify the cabling process and cut network cost. PoE network switch can be classified into many types, such as 8/12/24/48 port PoE switch, or unmanaged and managed PoE switch. W...

Home Network/Lab Setup For Virtualization, Hyper-V, and MCSE

Image
Virtualization Home Lab Guide When it comes to home labs each of us is constrained by size, power, heat, noise, performance, and budget factors.  On top of that the IT field encompasses a host of various technologies and many of us are striving to master different concepts.  This makes labs varied and unique.  If you’ve spent time researching for your own lab you may have noticed there are a dizzying array of component choices and setup configurations. I’ve spent a lot of time browsing the web and  /r/homelab/  to create a lab that works for me.  Today my lab is primarily geared towards Microsoft technologies, specifically Hyper-V (+ VMM / Azure Pack) and Azure Stack.   While I focus on these technologies day-to-day this setup is capable of performing a wide variety of home lab functions. I hope you are able to find a few ideas & inspirations for your own setup in the sections below: Video walk-through Rack diagram Network diagram...

[ጠቃም መረጃ] ዶ/ር አብይ አምቦ ለምን ሄዱ? || ደብረጽዮን ስለአማራ || የዶ/ር አብይ የሪፐብሊኩ ጠባቂ ኃይል...

Image

የእርጅና ጊዜ እያለፈ ሲሄድ ሊቆረጥ ወይም ሊቆም፣ አልፎ ተርፎም መቀልበስ ይችል ይሆን ? || የቢቢሲ ዜና

Image

የህዝብ ተወካዮች ም/ር ቤት የስራ ውል ተፈራርመው በማይፈፅሙ ተቋማት ላይ እርምጃ ሊወሰድ ነው

Image

ፖሊስ (Police) ሰልፉን የመከልከልም ሆነ እውቅና የመስጠት የህግ ስልጣን የለውም

Image

ETHIOPIA: “ግፍ ሰርቶ መደበቅ፤ ዘርፎ መንደላቀቅ አይቻልም” Dr. Abiy Ahmeds Message

Image

Top 12 Best Cyber Security Practices For Your Company

Image
Think about your business. Is your most sensitive data totally secure? If it’s not, it’s time to step it up. Take a look at the headlines to see why you should be so concerned about it. Even if you have a small business (opposed to a large enterprise), you could still be targeted by hackers. So, the question you have to ask yourself is this: How can I protect my company’s sensitive data? Below, you will find 12 things that you can do to make your company safer now and in the future: 1. Create a Risk-Based Approach to Safety **************************************************** The best approach is the right approach, and reverse engineering based on risk might be it. Too many companies put a lot of focus on compliance (checking off boxes), and they don’t realize that they are keeping their data unprotected. Instead, it’s best to do a risk assessment. You can identify your assets, look at your current security, and then figure out your threats. ...

Some Interesting Facts About Computer Networking

Image
Some interesting facts about computer networking are: Internet was invented by  Tim Berners-Lee  in 1989. Internet is controlled by  75 million  servers. Backbone of internet is made by  550, 000 miles  of underwater cable. About  one billion  computer systems are connected to internet. About  3.2 billion  people use the internet from which  1.7 billion  internet users are Asians. Internet consists of  five billion computing devices such as computers, phones, modems, switches, routers etc. According to Google, Internet consists of  5 million Terabytes  of data. If the internet goes down for a day, approximately  200 billion emails and 3 billion Google search  would have to wait. Approximately  204 million emails per minute  are send over Internet. 70% of them are spam. 269 billion  emails are sent per day. 30, 000 websites  are hacked every day. 50 million horsepowe...

What is WannaCry ransomware, how does it infect, and who was responsible?

Image
Stolen government hacking tools, unpatched Windows systems, and shadowy North Korean operatives made WannaCry a perfect ransomware storm. WannaCry is a ransomware worm that spread rapidly through across a number of computer networks in May of 2017. After infecting a Windows computers, it encrypts files on the PC's hard drive, making them impossible for users to access, then demands a ransom payment in bitcoin in order to decrypt them. A number of factors made the initial spread of WannaCry particularly noteworthy: it struck a number of important and high-profile systems, including many in Britain's National Health Service; it exploited a Windows vulnerability that was suspected to have been first discovered by the United States National Security Agency; and it was tentatively linked by Symantec and other security researchers to the Lazarus Group, a cybercrime organization that may be connected to the North Korean government. What is WannaCry ransomware? An appli...

What is a cyber attack? Recent examples show disturbing trends

Image
From virtual bank heists to semi-open attacks from nation-states, the last couple of years has been rough on IT security. Here are some of the major recent cyber attacks and what we can learn from them. Cyber attack definition Simply put, a cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Cyber attacks can be broken down into two broad types: attacks where the goal is to disable the target computer or knock it offline, or attacks where the goal is to get access to the target computer's data and perhaps gain admin privileges on it. Types of Cyber attack But to achieve those goals, a number of different technical methods are deployed by cybercriminals. There are always new methods proliferating, and some of these categories overlap, but these are the terms that you're most likely to hear discussed. Malware :  short for  malicious software,  malware can refer to any kind of software, ...