Posts

Showing posts from January, 2020

Featured Post

10 መሠረታዊ የኮምፒውተሮቻችንን ደህንነት መጠበቂያ መንገዶች 10 Basic Ways to Secure Your Computer

Image
  10 መሠረታዊ የኮምፒውተሮቻችንን ደህንነት መጠበቂያ መንገዶች 10 Basic Ways to Secure Your Computer 1. ሁላችንም የጥቃት ዒላማ ውስጥ መሆናችንን መረዳት መቼም ቢሆን “የሳይበር ጥቃት እኔን አያጋጥመኝም" ብሎ አለማሰብ፡፡ ሁላችንም በግል እና በምናደርጋቸው የገንዘብ ዝውውሮች እንቅስቃሴያችን ወይም በነበረን መልካም ስም ላይ ተፅዕኖ የሚፈጥር አደጋ ሊያጋጥመን ይችላል፡፡ የሳይበር ደህንነትን ማረጋገጥ የሁሉም ሰው ኃላፊነት ነው፡፡ ስለዚህ ሁልጊዜም ተገቢውን ጥንቃቄ ማድረግ ያስፈልጋል፡፡ 2. ለሶፍትዌሮች ወቅታዊ ዝመና ያድርጉ የኦፕሬቲንግ ሲስተሞቻችን /Operating System/ እና ፕሮግራሞቻችን የዘመኑ ሶፍትዌሮችን መጫን መሠረታዊ ነገር ነው፡፡ ሁልጊዜም የቅርብ ምርት የሆኑ የደህንነት ዝመናዎችን ማድረግ ጠቃሚ ነው፡፡ በተጨማሪም፡- • የመሣሪያዎትን ኦፕሬቲንግ ሲስተም ቀጥተኛ ዝመና /Automatic Update/ ላይ ያድረጉ፣ • ቀጥተኛ የደህንነት ዝመና በየጊዜው የሚያቀርቡ እንደ ክሮም ወይም ፋየር ፎክስ /Chrome or Firefox/ ያሉ የድረ-ገጽ ማፈላለጊያዎችን መጠቀም ይመከራል፣ • እንደ ፍላሽ፣ ሀርድ ዲስክ እና የመሳሰሉ ተንቀሳቃሽ መሣሪያዎችን ሲጠቀሙ ሁልጊዜም ወቅታዊ ዝመና የተደረገላቸው መሆናቸውን ማረጋገጥ ያስፈልጋል፡፡ 3. የፌሺንግ ጥቃት ሙከራዎችን ያስወግዱ የፊሺንግ ጥቃት የተለያዩ የማህበራዊ ምህንድስና መንገዶችን በመጠቀም የሚፈፀም ቋሚ ስጋት ሲሆን የሳይበር ወንጀሎች እንደ የይለፍ ቃል ባንክ መረጃዎች እና ክሬዲት ካርድ ያሉ ግላዊ መረጃዎችን የሚያጭበረብሩበት ነው፡፡ • የፊሺንግ ጥቃት ብዙውን ጊዜ በኢ-ሜይል አድራሻ፣ ከዚህ በተጨማሪም በስልክ፣ በመልዕክት መለዋወጫ ወይም በማህበራዊ ሚዲያ አማራጮች የሚፈጸ...

This 10-Minute Routine Will Increase Your Clarity And Creativity

Image

How To Use WEVIDEO Online Video Editor Premium For Free 2020

Image

ላፕቶፕ (Laptop) ከመግዛትዎ በፊት ኦርጂናል ወይስ ፋክ መሆኑን እንዴት ማረጋገጥ ይችላሉ!

Image

የመረጃዎቻችንን መጠባበቂያ "Backups" በምን መልኩ እና ምን ላይ ማስቀመጥ እንችላለን!!

Image

ማይክሮሶፍት የዊንዶውስ-7 ወሳኝ የደህንነት ማዘመኛዎችን ማቋረጡ ይታወቃል | የማቲያስ በላይነህ ማብራርያ!!

Image

6 Windows 10 Security Settings to Change Right Now In 2020 | AbuchuTechVillage

Image
Securing your new  Windows 10  machine (or one you've recently upgraded, now that  support for Windows 7 has ended ) doesn't have to be complicated. With a quick run-through, you can enable some of the basic security features of the operating system and disable some of the more annoying ones, without compromising your device.  Here's how to do it. 1. Create your savepoint (Restore Point) The first thing you should do with a new  Windows 10  machine is to enable a system restore. Think of it as a save point for your machine. If things go south while you're trying to  set up a safer machine , you get to come back to this nice fresh install and start with a clean slate. Since it's disabled by default in  Windows 10  ( $145 at Walmart ) , you'll need to manually enable it by following these steps:    Go to the Windows Cortana search box and type system restore.  Select the...

The founder of a cyber security company is awaiting $ 250,000 and 10 years in prison for a cyber attack

Image
አዲስ አበባ፤ ጥር 13/2012፡- በአሜሪካን ሀገር የሚገኝ እና ድረ-ገጾችን ከሳይበር ጥቃት መከላከልን ተልእኮው ያደረገው ተቋም ተባባሪ መስራች የሆነው ግለሰብ በአገልግሎት ማስተጓጎል/distributed denial of service /DDoS) የተሰኘውን የሳይበር ጥቃት መፈጸሙ ተነግሯል፡፡ ቱከር ፕሬስተን የተባለው ግለሰብ "ባክ ኮኔክት" BackConnect የተባለ የሳይበር ደህንነት ኩባንያ መስራች ሲሆን ኩባንያው "የዲዶስ" የሳይበር ጥቃቶችን ለመቀነስ እና ለመከላከል ታስቦ የተመሰረተ ነው፡፡ The co-founder of an organization based in the United States, whose mission is to protect websites from cyber attacks, is reported to have carried out a cyberattack known as distributed denial of service (DDoS).  Tucker Preston is the founder of BackConnect, a cybersecurity company founded to reduce and prevent cyber attacks. ሆኖም ግለሰቡ ስሙ ባልተጠቀሰ ኩባንያ ላይ ያነጣጠረ የ DDoS ጥቃቶች በማደራጀት እና ጥቃቱ እንዲፈጸም ድጋፍ በማድረግ ክስ ተመስርቶበታል፡፡ However, the person is charged with organizing DDoS attacks targeting an unnamed company and assisting in the execution. የዲዶስ ጥቃት ድረ-ገጾችን ወይም የኢንተርኔት የቀጥታ አገልግሎት /online service/ ለማስተጓጎል የጥቃት ኢላማ የተደረገን ድረ-ገጽ ከአ...

What Is Macro Virus & Everything You Need To Know About Macro Viruses

Image
What is a macro virus? A macro virus is a computer virus written in the same macro language that is used for software applications, such as word processing programs. Microsoft Word and Excel are two examples of applications that feature powerful macro languages. The languages are embedded in documents. This allows them to run automatically when the documents are open. If a macro virus has infected these files, it has the potential to damage the document or other computer software. When an infected file is opened, the macro virus releases a sequence of actions that begin automatically. These actions cause damage to the computer and its applications. How do macro viruses spread? Macro viruses are often spread through phishing emails containing attachments that have been embedded with the virus. The virus will access the files in the recipient’s address book and send an infected email to everyone on the contact list. Because the email ...

በጭራሽ ለሰው መናገር የሌለባችሁ 10 ዋና ዋና ነገሮች | 10 Things You Should Keep to Yourse...

Image

����ከፍተኛ ደሞዝ የምያስከፍሉ የቴክኖሎጂ (አይቲ) የስራ ዘርፎች | Highest-Paying IT Jobs In 202...

Image

WHO IS FULL-STACK DEVELOPER & WHY MANY PROGRAMMERS FAIL?

Image
The full-stack developer has become one of the most sought-after positions in the technology domain. The boom in this area has led to the mushrooming of both web-based and in-class training centers, which help individuals become full-stack developers (and this has nothing to do with piling up a stack of pancakes at IHOP!). Some of these centers also support trainees to get plum coding jobs at the end of the course. Who is a full stack developer? A  programmer skilled in coding  both the frontend and the backend parts of a web application is called a full stack web developer. The frontend:  This is the part of the web application that the user sees and uses. The backend:  These are parts of the application that function behind the scenes and execute the commands issued by the user. This usually includes: Logical processes Database-related processes Validation of users Server configuration A full-stack developer is not expected to be an expert in al...

TEXAS SCHOOL DISTRICT ATTACKED BY PHISHING ATTACKS & NETS $2.3 MILLION DOLLAR

The biggest issue with phishing attacks is that it only takes one uninformed individual to bring an organization to its knees. It is this reality that a school district in Texas is dealing with after discovering a phishing attack left them short of roughly $2.3 million. As local ABC affiliate KVUE states in their  report , the phishing scam affects the Manor Independent School District, which serves 8,000 students from kindergarten to 12th grade. The phishing attack began in November and continued well into December before the school district noticed anything wrong. This is just the latest in a flood of phishing attacks hitting schools,  cities , and agencies. Once it was obvious that they were dealing with a massive incident; the school district involved local law enforcement and the FBI. Speaking to KVUE Anne Lopez, a detective for the Manor Police Department, stated that the investigation has strong leads on the culprits. Lopez also stated the following on the specific ...

How I Explain & Configure DNS Forwarding | Windows Server 2012!

Image

DHCP Server Installation Windows Server 2012 R2 | AbuchuTech

Image

Ethiopia �� ማህበራዊ ሚዲያን ለበጎ ተግባር መጠቀም ለምን አቃተን | Use Social Media For Good

Image

How To Reduce Crazy Big Video File To Small One | AbuchuTech

Image

Top 5 Technology Trends In 2020 You Need To See | AbuchuTech

Image

በቀላሉ የማንንም የጅሜይል(Gmail) ፓስወርድ ለመስበርና ለመግባት | How To Hack Gmail 2019 | Ab...

Image

How To Manage Replication & Redundancy | By Installing Additional Domain...

Image

Top 10 Best Free Antivirus Protection For Windows PC in 2020

Image

Gary Vaynerchuk Motivational Speech "Money Can't Buy You Happiness"

Image

What's New in Exchange 2019? You Need To Know!

Image
You might think that  the newer version of good old Exchange 2016  can’t bring anything new to the world, while everyone seems to be moving to the cloud. Surprisingly, Microsoft’s new on-premises email server features a lot of significant improvements. Valuable for large enterprises , exchange server 2019 fits the needs of the largest organizations, as most of the value security over innovation.  For security purposes, it is recommended to install the newest version of exchange on windows server core.  NO UNIFIED MESSAGING, UMI role is removed alternatives to UM include Skype for business server, voice mail in office 365 (hybrid model) and third-party tools.  SECURITY: installing exchange 2019 on window server core strengthens security because it offers: Small footprint Reduced attack surface Only essential features installed No legacy security protocols PERFORMANCE: Improved performance and scalability of exchang...

How to Secure Active Directory (AD) Best Practice To Follow!

Image
To ensure that an organization's Active Directory (AD) environment is as secure as possible, we recommend all organizations have, at a minimum, the following seven defenses in place: Use LAPS:   Microsoft's local administrator password solution enables local administrator account passwords to be randomized. Block default admin:   "Deny access from a built-in local administrator account," we advise, noting that these will be present by default on all Windows systems. Use strong passwords:   All service accounts should have at least 25-character passwords to make them more resilient to kerberoasting attacks. Plus, these accounts should be part of an AD group that remains actively managed, including passwords being regularly changed, we say. Deny communications:   Deny workstation-to-workstation communications "because it gives an attacker a very easy way to perform lateral movement." Avoid built-in groups:   "Try to avoid built-in AD groups, beca...