Malware, ransomware, phishing... how can you protect yourself?
97 reads
Level: intermediate
Hello 🙂, We use the internet every day, gigantic amounts of data transit on the internet, all of this is possible thanks to the network, as you read these lines, the content of this article has transited the network to reach you. Sometimes, however, it's possible to abuse this network, and carry out what are known as DDoS attacks (denial of service attacks). Here, for example, is feedback on a very large attack. In this article, we'll try to explain as clearly as possible how thi...
68 reads
Level: Beginner
Hello ?, This week, we're going to talk about business servers... (more of a web server, actually). Did you know that since January 2023, 10-year security updates are no longer reserved for RedHat and Microsoft Widows Server? And yes... there's a newcomer, so shall we talk about it? Enterprise and servers As technology enthusiasts/developers, we want to play with the latest toys, download the latest Debian for testing, or install a web server on a Raspberry Pi. But once we ge...
77 reads
Level: Beginner
Ah, updates! You must see dozens of them every day. It's time-consuming, it's inconvenient, if they're launched when you're busy (hello Windows?). But then... Yes. But it's important. An update is never done by chance, and its main purpose is to correct bugs and, above all, security flaws. "What do you mean? You're developers and you don't code properly? " It's a little more complicated than that. Indeed, even if the error remains human, flaws generally occur AFTER a product has bee...
79 reads
Level: Beginner
Hi there, how are your vacations going? Today we're talking about a subject that's all too trendy: the health pass (yes, I'm still in vogue!). What do you mean? Another thorny subject? But no, no ... it'll pass. This article is in the same vein as "the HTTPS padlock" and "ransomware", because the health pass uses cryptography, but not for encryption. Ready to go? Let's get started! How do I get a free health pass? Ah! that's why you're here (you little rascal?), OK, I'm going to give y...
78 reads
Level: Beginner
New week, new article! How are you? The wife? The kids? The goldfish? (is the goldfish important?) This week we're going to try and figure out what the padlock in your browser's address bar means, so yes on this site there is one (there, I've just saved you the trouble of looking up to check). Naaaaaa but don't go away, it's an interesting subject! promise?. Before you start I'm redirecting you to the "asymmetric encryption" paragraph of my article on ransomware, because there's no p...
107 reads
Level: Confirmed beginner
Following the fire in a datacenter in France, I saw reactions on social networks such as "I've got my company in your servers", which gave me the idea of writing this article.Of course, it's not the owner of the data center who's to blame here, but accidents like this do happen, so you need to be prepared. By having a data backup strategy. Can you imagine? Losing your accounting data? I've already touched on this subject in my article "How to protect yourself from ransomware". The disaster r...
84 reads
Level: Confirmed beginner
It's a widespread practice, and understandably so: dozens or even hundreds of different passwords to remember, it's complicated. Nevertheless, you should be aware that it's a very bad practice that can one day turn against you, and as I say, prevention is better than cure. How are passwords entered on sites and applications? Before we understand why it's a bad idea to use the same password everywhere, we need to understand how and/or where your passwords are stored. What happens whe...
63 reads
Level: intermediate
The idea for this article came to me when I was looking at the Zataz home page. Indeed, in these times of crisis, ransomware attacks don't seem to stop. The aim of this article is to explain what ransomware is, how it works and how to protect yourself against it. And how to protect yourself? I'm not going to cover everything, because ransomware comes in all shapes and sizes. For example, the "Ryuk" ransomware is of the very violent kind... Asymmetric encryption Before talking about ran...