Posts

Showing posts from September, 2022

HTTP V/S HTTPS

                                            HTTP (HTTP://) - Hyper Text Transfer Protocol is a Protocol designed for communication between client (Web browser) and server(Web server). It was projected in 1989 by the world wide web. It operates on Port 80 and transfers data in plain text. There were a few revisions in HTTP until http1.1 released in 1996.Then after finding so many loopholes, There was a mega release of HTTP/2 in 2015. Later, HTTP/3 as the proposed successor to HTTP/2 came out, which is already in use on the web, using UDP instead of TCP for the underlying transport protocol.  Advantages of HTTP:- HTTP can be implemented with other networks as well as protocols. HTTP pages are stored on computers as internet caches. The platform of HTTP is independent, thus allowing cross-platform porting. It can be used over Firewalls. Issues with HTTP:- HTTP is a stateless protocol, which means it does not require the HTTP server to retain information or status about each user for

IT’S NOT FISHING IT’S PHISHING!

  There was a time when fishing was in trend but it’s the new digital world of new India and here the trending hashtag nowadays is not fishing it is phishing. Yes, you see it written, the homophones type these words are too way different. The only similarity between these two is the process of capturing the fish in the former and the customer for fraud in the latter one. WHAT IS PHISHING? Phishing is a new type of cyber-attack often called a social engineering attack, commonly used to steal  users’  data, like login credentials and credit  card  numbers. It occurs when an attacker, pretends to be a trusted entity to the customer and dupes a victim by making the individual open things like  email , instant message, or text message which looks like valid ones but in reality, it would be consists of fraud data. Once the recipient gets tricked into clicking a malicious link, then the installation of malware starts, or the freezing of the system as  part  of a ransomware attack or the