Soluții

What is DDoS Attack?

A DDoS attack is essentially the legitimate use of an online service taken too far. For example, a website may be capable of handling a certain number of requests per minute. If that number is exceeded, then the website’s performance is degraded, or it may be rendered completely inaccessible. This overload may be caused by an attack or even legitimate use, such as an e-commerce site being overwhelmed on Black Friday or a ticket sales platform going down when sales for a popular event are opened.

DDoS attacks are capable of overwhelming a target at various levels. For example, a web application may have a maximum number of requests that it can handle. Alternatively, the server that it is running on may have a limit on the amount of simultaneous connections that it can manage. A corporate network likely has bandwidth restrictions that could be overwhelmed by an attacker. Exceeding any of these thresholds will result in a Dos attack — or a DDoS attack if the attack uses multiple IP addresses — against the system.

Types of DDoS Attacks

DDoS attacks are an evolving threat, and a variety of techniques can be used to carry them out. Some examples of common DDoS threats include:

  • Amplification Attacks: Some services, such as DNS, have responses that are much larger than the corresponding request. In DDoS amplification attacks, attackers will send a request to a DNS server with their IP address spoofed to the IP address of the target, causing the target to receive a large volume of unsolicited responses that eat up resources.
  • Bandwidth Saturation: All networks have a maximum bandwidth and throughput that they can maintain. Bandwidth saturation attacks attempt to consume this bandwidth with spam traffic.
  • Cloud Resource Exploitation: Scalability is one of the hallmarks of cloud computing. By exploiting this fact, DDoS attackers can perform large-scale attacks against a target system.

Cybercriminals are increasingly performing “degradation of service” attacks in which a target is sent a lower volume of traffic that decreases the accessibility of the service without knocking it completely offline. These attacks have become popular because they are more difficult for an organization to detect than a full-scale DDoS attack.

DDoS Threats

DDoS attacks pose a serious threat to companies of all sizes and in all industries. Some of the potential impacts of a successful attack include:

  • Financial Losses: A successful DDoS attack can cause decreased productivity, downtime, and potential violation of SLAs as well as costing money to mitigate and recover.
  • Operational Disruption: A DDoS attack may render an organization unable to perform core operations, or it may degrade customers’ ability to access its services.
  • Reputational Damage: DDoS attacks may cause churn as customers choose competitors if they can’t reach an organization’s website or distrust its ability to provide products and services.

In recent years, the threat of DDoS attacks has grown significantly. One contributor is the greater availability of DDoS attack tools, making it easier for anyone to carry out an attack. Also, botnets have grown more popular and powerful, enabling them to perform record-breaking attacks to take down websites or entire networks. As DDoS attacks grow more common, larger, and more sophisticated, they are increasingly difficult and costly for an organization to mitigate.

[mai mult...]

What is MAC filtering and how to disable it

To enable MAC address filtering, you need to you know your router’s admin login, as this enables you to log in to the WiFi router console. Once logged in as an admin, you can configure your MAC address whitelists and blacklists.

To locate your router’s username and password, check the back of your router. It should be listed there. If, however, you don’t have easy access to your router or the credentials aren’t listed there, check the master list of router logins to find your system’s username and password. You can reset you’re router password if necessary.

Once you’re logged in, you will likely see connected devices in the admin console. Most modern routers display the physical address of devices there. Then, you can go into the router’s settings and enter the MAC addresses where they belong. Though each router will have a slightly different procedure for entering and finalizing MAC address filters, this is the general process that you’ll follow.

  • To configure filtering on a Linksys router once you’ve reached the router’s settings, go to Wireless > Wireless MAC Filter.
  • To configure filtering on a Netgear router once you’ve reached the router’s settings, go to Advanced > Security > Access Control.
  • If you have a D-Link router, navigate to Advanced > Network Filter.

Again, the process for disabling media access control address filtering will vary by router or system. However, the general process for disabling MAC address filtering is as follows:

  1. Sign into your router’s administrator page using your router’s username and password
  2. Check the MAC filter settings and select Allow as the default mode
  3. Select all devices from the list of exceptions, which is the whitelist
  4. Delete the list.

Once you disable MAC filtering, your router will no longer sort traffic based on permitted and denied addresses.

[mai mult...]

How to add new user account on Mac

Adding a new user account on a Mac allows multiple users to have their own customized environment:

  1. Open System Preferences:
    • Click on the Apple menu in the top left corner and select “System Preferences.”
  2. Go to Users & Groups:
    • In the System Preferences window, click on “Users & Groups.”
  3. Unlock the Settings:
    • Click the lock icon in the bottom left corner and enter your administrator password to make changes.
  4. Add a New User:
    • Click the “+” button below the list of users.
  5. Choose Account Type:
    • Select the type of account you want to create (Standard, Administrator, Managed with Parental Controls, or Sharing Only).
  6. Enter User Information:
    • Enter the new user’s full name, account name, and password.
    • Optionally, you can add a password hint.
  7. Create the Account:
    • Click “Create User” to add the new account.
  8. Set Up the Account:
    • Log out of your account and log in to the new user account to set it up.
    • Follow the setup assistant to configure the user’s preferences.
  9. Customize User Settings:
    • Customize the new user’s desktop, applications, and other settings as needed.
  10. Set Up Parental Controls (if applicable):
    • If the account is for a child, set up parental controls by selecting the user and clicking “Open Parental Controls”.
  11. Manage Accounts:
    • Return to “Users & Groups” to manage user accounts, change passwords, or delete accounts as needed.
[mai mult...]

How to reset network settings on Mac

The first way to reset a Mac’s network settings is to delete your Wi-Fi connection and then add it again.

Macs running macOS Ventura (13) and earlier will select System Preferences Network > Wi-Fi connection > – (Minus) sign > Apply.

  • Click the Wi-Fi icon in menu bar.

Wi-Fi icon in macOS menu bar.

  • Choose Wi-Fi Settings.

You can also get to this area from Apple icon > System Settings > Network Wi-Fi.

Wi-Fi Settings option from Wi-Fi menu bar in macOS.

  1. Select Details beside the network to forget.

  2. Details button beside a network connection from Wi-Fi settings in macOS.

  3. Choose Forget This Network at the bottom left.

  4. Click Remove to confirm the deletion. Make sure that you have your Wi-fi login information. You will need to re-enter it after the next step.

  5. Finally, re-add your Wi-fi connection from the Wi-Fi menu.

[mai mult...]