#CyberPedia
Explore tagged Tumblr posts
Text
Twitch.tv/activate: Learn How to Activate the Twitch TV and Connect Your Device
If you're a fan of video games, chances are you've heard of Twitch.tv. Twitch is a live streaming platform that lets people watch gamers play video games. It's a great way to connect with other gamers and chat with them while you're watching. But what if you want to watch Twitch on your TV? Here's how to make the most of your Twitch.tv experience on your TV.
Now share your experience with us in the đđźđşđşđ˛đťđ section
Read the full blog:https://bit.ly/3hU7zdr
2 notes
¡
View notes
Text
This morning when I was reading on AO3 and went to read the next chapter I realized AO3 was down. As hours passed I researched why, I found that AO3 is being attacked by anonymous Sudan with a DDOS. Anonymous Sudan is attacking AO3 because it is registered under the United States of America and it has smut, LGBTQ+ and NSFW. All in all we miss my AO3 and we know who to blame.
Here are some sites about anonymous Sudan:
https://flashpoint.io/blog/anonymous-sudan-ddos-timeline/
https://www.radware.com/cyberpedia/ddos-attacks/anonymous-sudan/
https://cybernews.com/editorial/anonymous-sudan-explained/
26 notes
¡
View notes
Text
Expert Tips to Fight Online Privacy Threats - Bitdefender Cyberpedia
I found this to be a fascinating look at our date and privacy and how little recourse we have should it end up in the wrong hands.
youtube
0 notes
Text
wait did ralsei write "but the bonds you break may make you stronger" into the cyberpedia or is this fuckery that fuels narrator theories
0 notes
Text
mermaid au cp.2
Perceptor watches his predator do apexing while the benny hill theme plays in the background
this chapter can also be read on ao3
I have no beta so this is just pure thought beamed straight from my brain to yours. I don't even know what is happening. the mermaid au spirit is possessing me for the time being.
Stripmine had meant well when he had come to Perceptorâs aid and when he started bombing him with rapidfire questions, but the way he had practically vibrated at having something actually happen under his watch was borderline tiring to deal with. Fortunately with some gentle guiding questions the minibot had refocused on what actually mattered, and they had discussed the next steps as they had walked back inside the building.
Perceptor told him that he had just intended to get a closer look because he hadnât been sure what he had even been looking at, and that he hadnât meant to put himself in danger by allowing their intruder that close to him. Not that he had felt like he had been in any danger at all, but to Stripmine an intruder was an intruder, and every person in the research center was under his protection during his shift.
But now they knew what they were dealing with, an actual live mermaid, and first things first they needed to make sure that there weren't others with him and that whichever way the mermaid had gotten in wasnât still open somewhere. Stripmine had ran off while rambling about intending to get to the root of this, and Perceptor had finally been able to pause and just let all of this sink in.
He looked at the datapad he was still carrying, thinking of how amazed the mermaid had looked at it. And he thought of the mermaid, who was now hiding somewhere in their precious project pool. What a strange turn his morning had taken.
Stripmine was probably going to make sure that the maintenance department went to investigate the pool, so that left him the responsibility of attempting to salvage their project.
Scrolling through his saved contacts Perceptor picked out Diver, the official supervisor of their project and the current head of the whole research center, and sent him a short message detailing their situation in the pools. Usually Diver was too busy to mingle a lot with the members of their project and only attended bigger meetings, but this seemed like important enough news to bother him with directly. And while Perceptor was still wondering who else he should contact he was already receiving a response from Diver telling him to keep this on the downlow for now until they figured out the full scope of things, and that he would be coming by the project wing as soon as he could.
Taking that as a sign to stand by and wait until otherwise instructed, Perceptor dropped the plans to contact others and instead walked the rest of the way to the rooms that were fully in use for their genome project. A project that had just yesterday been interesting enough to occupy his mind day and night, but which now seemed almost dull in comparison to his new thoughts of golden optics and a smoothly swimming form.
When he got into the laboratory, where he had used to be sitting for long hours over a laptop and a pile of datapads, he wasnât even sure what he was supposed to do there now. Just trying to go back to work normally was out of the question surely. He wasnât even sure if there was work to do anymore after they managed to find out how much destruction the mermaid had caused. But still he had to kill the time somehow while he waited for Diver to call the shots, which would probably lead to a meeting of some sort eventually today.
Deciding that he might as well indulge on his curiosities in the meanwhile, Perceptor picked out one of the laptops from a rack and then made himself comfortable on the corner of a table, pulling out a stool to sit on. The datapad had finally been subspaced away in favor of having both his hands to type with as he navigated his way to the Cyberpedia and searched for mermaids, intending to just quickly browse over the general information they had about these elusive creatures.
Of course he knew that mermaids existed, and that they were thought to be rather high on the food chain of the oceans since they seemed to be rather cunning predators. He could make educated guesses on many aspects of their existence by osmosis from his general knowledge of marine biology from the evolutionary standpoint, but he had never actually sat down and read about mermaids specifically. This seemed like the perfect time to educate himself, and he eyed through the article that confirmed what he had thought to be true. There just wasnât much they knew about mermaids at all.
An aquatic form of advanced mechanimal that hunted smaller mechanical creatures. They were known to be smart enough to make for effective hunters and to be able to avoid Cybertronians and their traps, and there had even been people that insisted they had seen them use tools. Which would make a lot of sense considering how advanced their forelimbs were; they looked practically identical to Cybertronian servos.
The few rare that had managed to get close enough to a mermaid reported limited verbal capabilities, mostly parroting back words and short sentences. They were thought to be on the upper end of intelligence when it came to Cybertronian mechanimals, but still far below the cognitive capabilities of actual Cybertronians. But what he had seen today had not been simple mimicking. The mermaid had clearly communicated with him in Neocybex and shown the capabilities to both understand what it had been shown and explained, and ask questions to further expand its understanding.
Of course there was an endless list of possibilities and questions those thoughts brought on, but it was impossible to say if the mermaid in their pool was an average member of its species, or an exceptionally smart one. Or if it had been a mermaid at all.
Deciding that the wiki article wouldnât offer him much more, Perceptor instead opened the appropriate director to search for any research publications that related somehow to mermaids. But he wasnât surprised to see that there was only a handful of them and even most of those seemed to be published by the same team. He opened a few of the interesting ones into tabs anyways, because maybe he could pick out the best ones and browse over them later. You never knew what kind of extra information would come handy when dealing with this situation and it wouldnât take him long at all to read through all of this. Well prepared was half done after all, as he liked to think.
Eventually he was interrupted by an incoming call, and for a moment Perceptor thought that maybe Diver finally had something to report. But the comm number wasnât Diverâs. And after a bit of searching his memory for the name he realized that it was the mech who had helped him with a tech problem when he had moved in.
/â Perceptor? Heard you were the one who met our new guest before and thought you might be interested in seeing this. â/
Chromedome worked in maintenance and tech support. A tall orange and yellow colored mech who didnât seem to be taking his work too seriously, by what Perceptor had seen during their one meeting at least, but he had been helpful before and certainly had his interests now.
/â I did. Did something happen? â/ Perceptor asked, surprised to realize that he was feeling concerned for the mermaid, automatically assuming that something bad had transpired while he wasnât looking.
/â Oh, no. Nothing like that. I was just woken up by Stripmine and went to check the tank integrity. I couldnât find anything wrong with the tank or the filters so we decided to check the security tapes instead, and uh⌠Well, as I said. You might want to see this. â/
The offer was rather cryptic, but Perceptor thought that he better go and check it out anyways.
/â Iâll be right there. â/
Chromedome asked him if he knew where the security office was, and after getting the directions Perceptor sent the open tabs to his datapad before he closed the laptop and headed out.
It was a ten minute walk when he wasnât dragging his pedes, and it wasnât even the first time he had been hurrying somewhere today. There were a few more people up already, and he tried to not look like he was this close to running in the hallways as he passed them with hurried nods and greetings.
Stripmine was waiting for him by the doorway of the security room, holding it open for him by clinging to the edge of it and ushering him inside when he got close enough. Perceptor stepped inside, nodding at Chromedome who was sitting in the chair in front of the monitors, and receiving a nod of acknowledgement in return.
âSorry, we donât have seats to offer but make yourself comfortable,â Chromedome apologized and then reached for the controls, motioning at the main monitor that was situated on the table itself. The three of them huddled around the monitor, Perceptor standing right behind Stripmine who had to practically stand on his toes to be able to see.
âSo what are we looking at exactly?â Perceptor asked, optics scanning the video feed that was wound back to last night, if the date and time were to be believed. Chromedome stopped the rewind and then more gently poked the feed forwards again by around twenty minutes before the time stamp said 3:45am.
âKeep your optics here,â he simply said, tapping over a brambling living metal bush that was meant more to block vision from outside the wire fence than for its pretty looks. The feed was dark, and Perceptor squinted his optics as he tried to see anything, but after a moment the bush seemed to shake and from below it poked out a white helmet with wide optics.
The three of them were watching the video in shocked silence, more so Perceptor than the other two who had already assumedly seen this once, as the mermaid squirmed and forced its frame through the bush (and probably the wired fence behind it as well). How it managed to fit through from there seemed to defy logic, but first you could see both of its arms, dragging its chassis through, and then one long fin popping into view at a time, before the rest of its frame seemed to slither through with much more ease.
âHow did it get through the fence?â Perceptor muttered in question, one hand covering his mouth in thought while the other was hugging over the glass of his chest. Chromedome leaned back in the chair and shrugged his shoulders.
âI didnât yet go check, but Iâm sure thereâs one mermaid sized hole there behind the bushes.â
Well that much was clear, but how had it made that hole? Or had it already been there and the mermaid had just discovered it?
âThat fence is made out of N grade cybersteel. You would have a hard time cutting it even with hand tools,â Stripmine muttered knowledgeably, and that was another thing Perceptor wondered. It couldnât have just chewed its way through a wire fence.
On the video, once the mermaid was all through it was propping its chassis up with its arms as it looked around curiously, its long tail curling up behind its form. It was hard to see details from the security feed but the tail seemed to be a lighter color compared to the chassis, and its waist was framed by some sort of skirt platings that emphasized the curve of its hips. But it looked oddly slim.
After surveying its surroundings, the mermaid was then moving forwards with determination, its movements looking slow and clumsy when it had to practically drag its weight over the ground with nothing but its arm strength and slithering movements. And when it finally made it to the edge of the pool where Perceptor had found it, it was starting to look like the reason it had picked this pool was simply because it was closest in proximity to the mermaidâs entrance.
The mermaid was leaning over the edge, its helm bobbing up and down as it tried to see if there was anything worthy in the pool, probably spying for the fish. And it seemed to have seen something it liked because a moment later it was smoothly diving into the water below, shedding all of its awkward clumsiness the moment it was back in its element.
âItâs harder to see it in the water in the dark, but after the sun is rising you can spot it at times,â Chromedome said, straightening up again just enough to be able to reach the controls. He changed to another cameraâs feed that was positioned to film the pool itself, and started to skip over footage to reach the sunrise.
âIt obviously came in to hunt. Those fish are probably easy prey to a predator like that,â Perceptor mused aloud, his optics still fixated on the monitor even when you couldnât really see anything from the fast forwarded feed.
âUhh, yeah. Well, youâll see,â Chromedome replied rather cryptically again and Perceptor glanced at him in question. But once the pool in the video feed was illuminated by sunlight he was looking closely again, the video continuing at normal speed.
You could spot the mermaid when it was closer to the surface, but if it went too deep you could only spot the shadow or nothing at all. The tank was deep enough for the sun to not reach the bottom of it, with enough impurities in the water to hide whatever was happening in the deeps. But fortunately the mermaid decided to occasionally try and go for the fish that were trying to snack on the waterâs surface.
The mermaid was circling the school of fish from a distance, probably trying to keep them together while picking out the weakest individual. And judging from the smooth way it was able to swim in the water it shouldnât have been a challenge to capture one of the poor creatures. But when it came time to lunge for the kill the mermaid seemed to be hesitating. It was attempting to lunge forwards, but always stopped, as if it wasnât quite sure when to go in. And after going back and forth a few times the fish eventually spotted the predator and decided to smartly scatter, making the mermaid finally try and make a final lunge for the closest fish. But just when it would have sank its claws into it it was hesitating again and recoiling away.
âThatâsâŚâ Perceptor started, trying to put his thoughts into words but failing miserably. Fortunately Chromedome was ready to fill in for him, his tone something between amusement and pity.
âThe saddest attempt at catching a fish I have ever seen.â
âWell, I would not have used those words exactly butâŚâ he couldnât quite disagree either. Mermaids were supposed to be one of the most efficient killers that deep waters had seen. He had witnessed the claws and fangs and the strong coiled frame personally just few hours ago. Even the mermaid himself had been bragging about its hunting skills! It was supposed to be a predator but it almost looked to beâŚwell, afraid of the harmless fishâŚ
âThatâs not even all. Check this out,â Chromedome said, sounding almost sorry for what he was about to show, but not too sorry to not sit up straighter so he could find the spot in the video faster.
He stopped at just after 6am, not that long before Perceptor would be walking down there himself. The mermaid was swimming back to the spot where it had dived in, leaning its palms against the wall again as its helm tilted upwards, seemingly considering the high edge. Perceptor hadnât thought about it at the time, not even when he had had to lower the datapad for the mermaid to be able to see it without having to crane its neck, but there was no way for the mermaid to reach the edge and be able to pull itself out the same way it had gone in.
âItâs stuck,â Perceptor stated the obvious out loud.
âVery,â Chromedome added, and Perceptor was sure that behind his facemask was an amused smile even when he couldnât see it.
âCouldnât it decide to get stuck somewhere else?â Stripmine asked, apparently not happy to have a troublemaker in his hands after all.
Perceptor was still staring at the monitor, watching the mermaid consider the edge, scratching the vertical metal surface with its claws before it seemed to give up and just continue swimming along the wall. As if it could find a spot that would be easier to scale.
âSo itâs alone and struggling. I think we might need someone with more knowledge to take a look to see if itâs because it's hurt,â Perceptor said, more to himself than to the other two. He considered their options for a moment while Chromedome was pausing the video and turning it off. There was no mermaid to be seen in the live footage of the pool, and maybe it was still hiding from being scared by Stripmine.
âThereâs no way to track it under water?â Perceptor then asked, looking at Chromedome who tilted his helmet as he gave it thought.
âNot with the security cameras, no,â he hummed, and while Perceptor hadnât thought that to be possible in the first place he still felt a bit disappointed. âBut we have those heat vision cameras in the B-wing. They were using them on that dive a few weeks ago. I helped them prepare them. We could try to borrow one and see if we can find your fish?â
Perceptor felt slightly flustered at the comment, but thought that it was just an unfortunate choice of words. It made it almost sound like they were doing this for him and not the poor mermaid. He considered the other idea for a beat before he nodded in confirmation. The mermaidâs body heat might be just enough to show up on the camera, at least surely the machinery around its spark casing should be warm enough to be tracked.
âThank you, if you could ask them for it that would be a great help. I informed Diver about the mermaid before but that was before we knew that it was having trouble hunting. Is there any way that we could get a record of that footage to show him?â
Chromedomeâs EM field rippled with clear amusement despite his facade being so permanently passive, and it was clear how funny he thought that video would be. But Stripmine reached to his tiptoes once more to pipe up before the other could say anything and before Perceptor could feel truly annoyed.
âI can do that! Leave it to me, Iâll get the videos mailed to you in no time.â
âI can have those cameras set up today. The team shouldnât have any use for them on land anyways,â Chromedome said and whirled around in his chair and got up so he could let Stripmine have his chair back.
âAlright, Iâll leave you two to it then.â
Perceptor exited the security room with Chromedome, but they split ways as they headed to opposite ends of the building. This day was only getting weirder and weirder, and he felt like he shouldnât have even been shown this footage. He was just one scientist that had been called to help with a gene project. Sure that was the precise project that the mermaid had gotten tangled in, but he wasnât even in charge of caring for the tank. He literally just spent his time in the lab looking through samples.
But now as he thought of that curious creature possibly being hurt, he could feel worry simmer in his spark.
#maccadam#simpatico#perceptor#brainstorm#tag for my writings#sft tag#mermaid au#do you know that feel when you think you're much better at writing brainstorm#and still end up writing everything from percy's pov?#clown wig is on
15 notes
¡
View notes
Text
When Ralsei made that new addition to the Cyberpedia at Cyberworld, I remember thinking that, what he meant by âthe bonds that you break may make you strongerâ (or something like that, I donât remember exactly) was that there are people you are going to have to let go of, or that you can do that if you want and that would be like a sign of strength?Â
Like, by example, I thought that maybe there will be a character thatâs a genuinely bad person and itâs bad for you, to Kris and for the party... and that itâs going to be ok to leave that kind of person behind... ? at least, thatâs the impression I got by reading that.
I mean sure, in reality (at least by Chapter 2) it means that characters can get stronger by fighting in this game as well (as in the Weird Route is evident), but applied to a more pacifistic sense, I wonder if it will ever take that side.. like will there be a character that we can leave behind without it being a bitter ending or sad? and instead could be seeing as a positive thing as well? just wondering. Â
89 notes
¡
View notes
Text
Personal Deltarune thought: Ralsei isn't sus, he is just very awkward.
I don't think he holds back on information or hides secrets because of any malicious intent, at least. (Not the stuff about the classroom objects, nor the stuff about the prophecy, nope)
.
- He's just one of those people that know too much and just automatically assume that everyone else knows most of the things they do. (Such as stuff about the Roaring) (And to be fair, us players usually know how most games work)
- He's probably also very passionate about the things he knows (Such as his "nice prophecy", his tutorial, and that one time when Ralsei updates the Cyberpedia)
- and cannot stop talking about it once he starts, (Even after he diverts the Player's attention for a few good minutes, when we come back Ralsei has to catch himself from talking any more to Kris instead of trying not to act sus. Twice.)
- which is why he often holds back on information- out of fear that his oversharing might annoy people. (Such as Susie, or even some of us players who despise Navi)
- He does make efforts to cope with finding a middle ground(between oversharing and not sharing) though, which is why he gives us a tutorial choice and prepares the manual instead of actually speaking much about tutorial stuff- so that us players could choose what we need to learn from him.
- He is indeed self-aware on how awkward he is. Like he said, he doesn't even know what being "Ralsei-like" even is.
...
In short: Ralsei is so frickin awkward that a large part of the fandom mistakes him to be a villain.
Whatever his "secret plan" is, it probably won't be as bad as it looks.
88 notes
¡
View notes
Text
took me too long to realize that the significance of the last line of ralsei's cyberpedia entry about losing recruits, "but the bonds you break may make you stronger," is that that is literally what happens in snowgrave. the route starts with you and noelle backtracking and going and killing all the enemies you could previously have recruited, thereby "losing" them, and getting stronger as a result.
30 notes
¡
View notes
Text
I like that I now know exactly, or should I say most likely, what was going through Susieâs head at the end of Deltarune Ch1 when Ralsei removed his hat. At first I thought that she was shocked at how much he looks like Asriel and thought nothing more about it until Ch2. Because like! Asriel is made out to be the â¨Golden Boy⨠of the town! Who doesnât Know Asriel?
Susie Apparently! In Ch2 we find out through looking at Asrielâs door in Queenâs Mansion that Susie didnât even know Asriel existed! She later comments about how much Ralsei looks like Toriel. This means she wasnât shocked at how much Ralsei looks like Asriel.
So Basically it was this
Also given how she has only heard Ralseiâs name spoken aloud and spells it as âRalsayâ in the Cyberpedia Entry means that even if she knew about Asriel she wouldnât be able to put the anagram together between the two names. So it makes a lot of sense to me as to why Susie never brought up Ralseiâs similarities to Asriel. There was no way sheâd be able to compare the two with the limited information she had! Almost as if she was being kept blind to it.
9 notes
¡
View notes
Text
Thinking about what Ralsei writes in the Cyberpedia talking about how defeating enemies will make them LOST (in all caps) but breaking those bonds may make you "stronger"... and how Noelle's teaser theme was called "Lost Girl"... and how a theme of the Snowgrave route is about making Noelle "stronger" by defeating enemies...
#I feel like theres more that I'm missing and it may connect back to some Gaster stuff in Undertale#deltarune#deltarune spoilers#noelle holiday#Ralsei
11 notes
¡
View notes
Photo
[I.D.s 1, 2, 3: The Lancer Fun Squad checking the free editable Cyberpedia in Cyber World, which is a book on a podium against the dark sky.
Ralsei sweetly says, "Oh, Kris! It's a free editable Cyberpedia! I'll add an entry...!"
Check text reads, "Ralsei wrote an article about All Dogs Go To Heaven 2. Read it?"
Check text continues, "From now on, Gordon Freeman is dead."
End I.D.s 1, 2, 3]
Thatâs so fucked up why would he say that.
4K notes
¡
View notes
Text
Cyber Security
What is Cyber Security?
Cyber security refers to the security of any device with a digital element to it. Such as a companyâs computer system, or a phone. The term security covers protection from theft or damage to the systems hardware, software or electronic data, as well as protection from disruption or misdirection from the services that those systems within the company provide.
How has it evolved?
Cyber security has evolved greatly since its creation, when computers were first created the technology to protect the information was not sophisticated, 1 level of protection was used such as a password. However, now there are multiple layers of authentication to protect sensitive data, such as unique logins to a computer, bio-metric authentication (retinal scanning & finger prints), as well as using a code send to a 2nd device of yours to validate your identity (this is used on various email and social media platforms).
Attacks are becoming for sophisticated, one of the first major cyber security attacks was âthe Morris wormâ which happened in 1988, this was the first time a worm had been used, the self-replicating worm abused a weakness in the UNIX 1 system which slowed down computers to the point of being unusable. Since this attack, the attackers have evolved, they are able to hide the host machines identity, they can do this by connecting to a different network session, or connecting through the TOR network, hiding the machines actual location.
What challenges face Cyber Security?
Human challenges
One of the challenges facing Cyber Security, is human threats. Human threats can come in the form of launching a denial of service attack on the system. This type of attack would block the system from accepting anyone on it. It is done by flooding the system with too many requests for it to handle, thus crippling the system and not allowing anyone on.
Another big threat is Trojans, Malware, Ransomware, Worms, Virusâs & Spyware. All of these are big threats to a system and can be launched on the computer just from someone who has access to the system, opening an attachment on an email, or plugging in a USB drive that they found. These are all challenges to a system as they can stop the system from working entirely by holding all data in an encrypted state until money is paid (ransomware), log all data and discreetly pull it off the systems (Spyware),
IOT devices vs Cyber Security
The main concern with IOT devices such as Alexa & the Google Home devices, is when are they listening, and who has access to that data. The Amazon Echo & Echo dot answer to the name of Alexa and will play music and answer simple questions on voice command. It also records what you say and sends that recording to a server. However, while it is meant to online respond to âAlexaâŚ.â They do have a habit of turning on and speaking (thus recording speech) from radio or TV if it deems something to sound similar to âAlexaâ.
Many IOT devices are built with no security at all, If the device is discoverable on the internet, and itâs connected to the rest of the network, itâs an easy to use gateway for attackers. From here attackers could gain access to sensitive information, such as turning on the home assistantâs speech recording functions and listening in on conversations you are having. If an attacker could use your home assistant as a weak spot to gain access to your home network, then they could use that to add spyware to other devices connected to it, such as your computer, and gain highly sensitive data such as your bank details and log in usernameâs and passwords.
References
https://limn.it/articles/the-morris-worm/
https://www.paloaltonetworks.com/cyberpedia/what-is-cyber-security
https://blog.malwarebytes.com/101/2017/12/internet-things-iot-security-never/
0 notes
Text
Something Awesome #1
What is a DOS attack, and why do people do it?
A denial-of-service attack (or better known as a DOS attack) is an attack that is designed to shut down a machine or a network. This prevents people from accessing the network or the machines, and will lead to people being unable to use the service they expect to have access to. These types of attacks are not usually designed to get private information, but can still cost time and money in order to fix up issues.
There are several methods or types of DOS attacks:
Buffer overflow attacks:
Send more traffic then what the programmers have built the system to handle.
This is usually caused by what the programmers have assumed, in which attackers will exploit the system based on any flaws theyâve found in the system.
The classic attack would be sending data over to an undersized stack, which will eventually fill and push out the function pointer. This will cause the program to crash.Â
As such, some programming languages that donât have inbuilt memory management are the most susceptible to these types of attacks, as a poorly made program will be easily attacked.Â
ICMP flood:
Targets every computer on the network by sending packets of data to each one.
The network is then triggered to increase the traffic on the network.
Also known as a smurf attack or ping of death.
SYN flood:
Sends a request to connect to a server, but never completes the handshakes (the three-way exchange of messages between servers).
This is continued until all the open ports that are available in the network is filled and no legitimate users can connect to the network.
There are also another form of DOS, a distributed denial-of-service attack (DDOS). This is achieved by having multiple systems performing a synchronised DOS attack to a single target. The main difference is that instead of being attacked by only one location, the victim is attacked by multiple different locations, and as such, holds several advantages over the victim:
Can leverage a greater volume of machine to execute a disruptive attack
Hard to detect due to the random distribution of the attacks
Hard to shut down a specific target, and even harder to shut down the multiple attackers.
Sources:
https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos
https://www.cloudflare.com/learning/ddos/glossary/denial-of-service/
https://www.owasp.org/index.php/Buffer_Overflow
https://www.imperva.com/learn/application-security/syn-flood/
0 notes
Text
Services for IT and Help Desk
Task 1(P1) - Tools and Techniques
This Blog is for all services related to IT and that Help Desk blog will help you with fixing any problem. Also in here you can ask us about any hardware and software miss understanding or not knowing. We will help you with any of the problems. Also here are some techniques that we are using so you got 100% reliability in us.Â
We are using those techniques:
-Call log [Here we are recording all the call phones that are being given or received and we are taking down major information].
-Hardware and Software inventory log [Here we are recording all the problems we had to deal with regarding to hardware and software].
-Fault log [Here are we recording all the faults and problems that we have dealt with in the past so we got easier fix access in the future].
-Surveys [Here we are creating a questionnaires so we can get feedback from our clients about our company].
-Ask questions over the phone [Here you can call our company by phone and our employee will do his best to help you with the problem over the phone].
-Online steps [Here you can go onto our website to get help on online chat or you can check FAQ maybe your issue is there and you got quicker fix guide].
Also our team will be using those tools to be prepared to check for the problem :
-Software diagnostic tools and Monitoring tools [Here we are recording all the programs that we have used to repair the software].
-Remote Diagnostic Connections[Here we are using the programs to check the connections to the networks or the internet].
-Control Panel[Here we are using all the utilities to check the PC if it has all the updates required and we are looking at all utilities if they are working properly].
Task 2(M1) - Fault log
What is a fault log?
Fault log is a collection of faults that have been reported and fixed within a company. It usually is written in a table format and it contains the necessary information for the technicians to analyse and to respond appropriately, such as:who is reporting, date, time, the issue, who answered the call, who dealt with the problem and other additional information when necessary. Â
Furthermore, there are boxes in which the user identify the urgency of the problem from 1 to 10.
What information is used for?
Information from the fault log is used for the future repairs of the hardware and software. If the issue happens again in the future it will allow the IT technicians for the quick fixes, because there is step by step guide to resolve the given issue.
How is it used for hardware stock and future trend?
The fault log is used for hardware stock in a way that they can check what are recent and hardware related problems in the company so they can have some hardware parts/ components in stock so the person that has an issue then they dont need to stop working for long period of time.Also the fault log is used for future trend in a way that the following issues if they happen again they will be easier to resolve again because they will be on the system and they can be resolved without any struggle as they have step by step guide to fix the issue.
Task 3(D1)- Recent advance in support systems technology
Review of the product
                      iKeypÂŽ: The Worldâs Smartest Personal Safe
             http://www.bbc.co.uk/programmes/p05td0kqÂ
Advantages:
- Its portable and small.
- Its sends and alert if someone is trying to break in the safe.
- You can control it with an app on your phone.
Disadvantages:
- Easy to break in.
- Easy to remove from its place.
- Its light to carry it away and it doesn't have a GPS built in so no one can find it.
Review:
I visited the BBC website (http://www.bbc.co.uk/programmes/p05td0kq), to find out about this product. What I found on the information given was shocking and unpleasantly surprising.
iKeypÂŽ is a smart safe that allows the customers to store their small items such as; medicines, passport and valuables like jewelry, etc.Â
Features of iKeypÂŽ - it is a small and portable safe that is easy to use and to setup. This device can be operated from the application that you download on your smartphone and can be accessed via the internet.Â
The safe can be opened by using the smartphone application, after going through the layers of the security such as; login and password.Â
If the safe is moved or someone tries to force into it, then a message will be sent to the owner informing that someone is trying to break in to the product.Â
One of the disadvantages is that the iKeypÂŽ is easy to remove from its own place as the structure of the product is made out of plastic so itâs not very stable and it is not well fixed, so it can be removed by hands without use of tools and without any struggle.Â
The product is very light and it can be carried away fairly easily because it doesnât weight much. Also that safe doesn't have GPS built in so once itâs stolen it can never be found.
Finally and most importantly, this safe can be easily opened with just a simple punch on the top of the lock. This is a very big issue with this product and it makes this product untrustworthy and pointless to obtain it.
Task 4(P3)- Types of fault that can occur
The most common problem in the Fault log from the Figure 1.1 is an issue with Login into the system and that problem is repeating on 2 days. From the faults given we can categorize them into given sections :
- Loss of Service:
      - Cannot log into system,
      - Cannot get Excel to load        the spreadsheet        developed at home over        the weekend. Urgent as        need to prepare report for        company auditors.
      - Need access to        documents stored on        Fredyaâs        machine but her machine        wonât get past boot up        stage
-Poor performance:
      - Cannot make orders print off
      - Cannot access orders list        from new machine        installed        last week, cannot even        find database package
      - Got new piece of design        software that needs        installing        on machine and making        compatible with printer
      - Went to check orders list        and screen went âpopâ        with a nasty smell.
-Virus:
      - Mouse keeps jumping        then screen locks out,        trying to        print out college        assignment finished at        home last        night, screen displays         message âGotchyaâ
       -Error Messages:
      - Keep getting message        âNormal.dot cannot be        savedâ        when using the templates        on the word processor
       - Mouse keeps jumping       then screen locks out,       trying to       print out college       assignment finished at       home last       night, screen displays        message âGotchyaâ
Task 5(P2) - Impact of organisational policies and procedures on the provision of technical support
Policies and Procedures
Policies and Procedures are created to standardize to provide a n excellent customer service as they can follow methods that have been tested and improved by a technical team for a very long time.Â
Do you think it speeds up the service? Yes, P&P helps to speed up the service as it follows a logical method that the technician can use step by step user manual with the customer online or face to face or even via email. Giving clear instructions to be followed by the customer for the best service.
P&P are used for reporting faults, internet use, security, etc.             For reporting a faults, the P&P is designed to collect all the necessary information such as: Day, Time, Issue, From Whom.
By doing this the technical department is able to deal with the issue in a Practical and efficient way.
Regarding Internet Use, P & P is designed to ensure that everyone in the company is using the internet for its given purpose such as: researching, receiving and sending emails, and for many other blablabla⌠Furthermore, the P & P ensures that people are not allowed to download materials from unknown/unsafe sites.  P & P regulates what people can see on the net by blocking some sites selected by the IT department.
Also, the Network Administrator will be the only one that can actually download software from the net to ensure that the system is not corrupted or invaded by viruses. Moreover ony Network Administrator will be the only one that can give permission to a user, generally to another manager, to download software from the net to ensure that the system is not going to be corrupted or invaded by any type of virus
Service Level Agreements (SLA) â In P & P it identifies and determines the service that will be provided, how it will be provided and by whom. Â For example: it will let the customers know from what time to what time the service is available, which days of the week and time that they can call for assistance. Â Also, it informs how the customers will be contacted and by whom. Â Furthermore, the SLA specifies levels of urgency, detailed information about duties and responsibilities that all users have to comply to.
On my researches I came across this site (https://www.paloaltonetworks.com/cyberpedia/what-is-a-service-level-agreement-sla), that fully explains what a SLA is.
âA service level agreement (SLA) is a contract between a service provider (either internal or external) and the end user that defines the level of service expected from the service provider. SLAs are output-based in that their purpose is specifically to define what the customer will receive. SLAs do not define how the service itself is provided or delivered. The SLA an Internet Service Provider (ISP) will provide its customers is a basic example of an SLA from an external service provider. The metrics that define levels of service for an ISP should aim to guarantee:
A description of the service being providedâ maintenance of areas such as network connectivity, domain name servers, dynamic host configuration protocol servers
Reliability â when the service is available (percentage uptime) and the limits outages can be expected to stay within
Responsiveness â the punctuality of services to be performed in response to requests and scheduled service dates
Procedure for reporting problems â who can be contacted, how problems will be reported, procedure for escalation, and what other steps are taken to resolve the problem efficiently
Monitoring and reporting service level â who will monitor performance, what data will be collected and how often as well as how much access the customer is given to performance statistics
Consequences for not meeting service obligations â may include credit or reimbursement to customers, or enabling the customer to terminate the relationship.
Escape clauses or constraints â circumstances under which the level of service promised does not apply. An example could be an exemption from meeting uptime requirements in circumstance that floods, fires or otherâ
Confidentiality â How do you think that P & P deals with this matter?
P & P covers this ⌠by for example, making an official agreement with all members of the company that explains and determines what is acceptable use of the internet and not.  It also determines how the company will deal with those that have broken the rules by visiting prohibited websites such as (porno sites) and/or sharing companyâs private information with others outside the company in which can cause damage such as financial, structural or damage its reputation in any shape or form.
Sensitivity of Information â P & P creates and explain some guidelines regarding peopleâs personal information. Â The personal information within the company refers to personal data such as: passwords, personal identification, wages, etc.
P & P specifies that people should not share their password with other members of the team as each person has a different type of authority when accessing the system, therefore, able to access some files and download documents whereas others are not allowed to do so.
Task 6(M2) - Advantages and disadvantages of outsourcing technical support
Advantages :
-Â By outsourcing (using a third party to provide specialized service), you can ensure that your customers will be receiving the very best customer service as this companies are experts in the subject and have people available 24/7.
- Reduced Operational and recruitment costs. That means that It will be cheaper to hire individuals that will work together so all the operational results will end up cheaper in groups.
-Risk-sharing is one of the most crucial factors determining the outsourcing technical support. Also it shows that you donât know on what specialist you will get caught some can help you and some can make it even worse.
Disadvantages:
-Â You need to ensure that this is actually cost effective. Â Also, it is difficult to monitor quality and confidentiality of your products. That means that not every thing will be cost effective so you need to be paying attention to it. Also it will be very hard to monitor and quality and confidentiality of the products.
- lack of customer focus someone may be catering to the expertise-needs of multiple organizations at a time. In such situations someone may not have full focus on completing focus on your organizationâs tasksÂ
Example from the real life:
-Â I have experienced the outsourcing technical support when I called my ISP(Internet Service Provider), in this case it was BT.Â
I called BT because I had a problem with my router as it was not sending the signal properly to different devices. As I was speaking with the customer service, it was clear to me that I was talking to someone in the UK as the accent was a proper British accent. After I explained the problem, I was transferred to the specialist that was surely not a native English speaker.Â
That shows that BT is using a third party to provide a good customer services and sharing the workload with a third party.
0 notes
Photo
Cyberpedia: Let's Get to the Bottom of Cloud Security http://www.zdnet.com/article/cyberpedia-lets-get-to-the-bottom-of-cloud-security/#ftag=RSSbaffb68
0 notes
Text
Apple is accused of secretly recording users' private activities through iPhone cameras
Corephotonics, an Israeli company that develops camera technology, has filed a significant lawsuit against Apple, alleging that the company intentionally utilized patented dual-camera technology in the iPhone while also trying to hide its actions through files for substantially similar intellectual property.
Now share your Thoughts with us in the đđźđşđşđ˛đťđ section
Read the full blog: https://bit.ly/3WLp9iP
0 notes