Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Samenvatting

Summary SOFTWEREENNGNEERING

Beoordeling
-
Verkocht
-
Pagina's
26
Geüpload op
03-09-2024
Geschreven in
2024/2025

HTML, CSS, and JavaScript: These form the fundamental building blocks of web development. HTML structures the content, CSS styles it, and JavaScript adds interactivity. Together, they create dynamic and engaging web experiences.   Python: A versatile language suitable for web development, data analysis, machine learning, and automation. Its readability and extensive libraries make it a popular choice for beginners and experienced developers alike. N: A JavaScript runtime environment that allows you to run JavaScript on the server-side. This enables you to build scalable and efficient web applications. MongoDB: A NoSQL database that stores data in flexible JSON-like documents. It's ideal for handling complex data structures and rapid development. MySQL: A relational database management system (RDBMS) that stores data in tables with rows and columns. It's well-suited for structured data and complex queries. Linux: A family of open-source operating systems known for their flexibility, security, and performance. It's widely used in servers, embedded systems, and desktops. PowerShell: A command-line shell and scripting language for automating tasks on Windows systems. It's particularly useful for system administrators and DevOps professionals. Angular: A TypeScript-based framework for building complex web applications. It provides a structured approach to development, with features like components, directives, and dependency injection.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

The
Motherboard
Guide
to
Not
Getting
Hacked

,VERSION_1.0 UPDATED_11.14.17




The Motherboard
Guide to Not
Getting Hacked


One of the questions we are asked most often at Motherboard is This guide isn’t comprehensive and it’s not personalized; there is
“how can I prevent myself from getting hacked?” no such thing as “perfect security” and there are no one-size-fits
all solutions. Instead, we hope this will be a jumping-off point for
Because living in modern society necessitates putting an uncom- people looking to batten down the hatches on their digital lives.
fortably large amount of trust in third parties, the answer is often
“not a whole lot.” Take, for example, the massive Equifax hack That’s why we’ve tried to keep this guide as accessible as
that affected roughly half of the American population: Few peo- possible, but if you run into any lingo you don’t know, there’s a
ple voluntarily signed up for the service, and yet their information glossary at the end of this guide to help out.
was stolen anyway.
This guide is the work of many people on Motherboard staff both
Hackers steal hundreds of millions of passwords in one swoop past and present, and has been vetted by several of our sources,
and occasionally cause large-scale blackouts. The future is who we owe a great debt to. Large sections of it were written by
probably not going to get better, with real-life disasters caused by Lorenzo Franceschi-Bicchierai, Joseph Cox, Sarah Jeong, and
internet-connected knick-knacks, smart home robots that could Jason Koebler, but the tips within it have grown out of years of
kill you, flying hacker laptops, and the dangers of hackers getting writing and research on digital security by dozens of reporters
your genetic data. Meanwhile, an ever-growing and increasingly and infosec professionals. Consider it a forever-ongoing work-in-
passive surveillance apparatus that has trickled down to state and progress that will receive at least one big annual refresh, as well
local police is an ever-present threat to our digital privacy. as smaller updates when major new vulnerabilities are exposed.
Special thanks to Matt Mitchell of Crypto Harlem, and Eva
That doesn’t mean it’s hopeless out there. There are lots of things Galperin, of the Electronic Frontier Foundation for reviewing
you can do to make it much more difficult for hackers or would- parts of this guide.
be surveillers to access your devices and accounts, and the aim
of this guide is to give you clear, easy-to-follow steps to improve Anyways, enough. This is the Motherboard Guide to Not
your digital security. There are, broadly speaking, two types of Getting Hacked.
hacks: Those that are unpreventable by users, and those you can
generally prevent. We want to help you mitigate the damage of
the first and prevent the second from happening.

You, as an individual user, can’t do anything to prevent your
email provider, or the company that holds your financial details,
from getting hacked. But you can avoid phishing attacks that
will let a hacker get into your individual email account, and you
can also prevent a password obtained in a larger hack from being
reused on another, separate account you have.



2

, VERSION_1.0 UPDATED_11.14.17




Table of Contents

04 Digital Security Basics
05 Threat Modeling
06 Software Updates
07 Passwords
08 Two-Factor Authentication


11 Mobile Security
12 Threat Modeling
(Mobile edition)
12 iPhone vs Android
13 Android Security
13 SIM Card & Cell Account Security


14 Privacy, Messaging, and Avoiding
State and Police Surveillance
15 Threat Modeling
(Privacy and surveillance edition)
15 Signal & Messaging
16 Social Media
16 Cameras and Microphones
16 Lock Screen
16 OTR
17 Tor Browser
17 Virtual Private Networks
17 PGP
17 Email Providers and Servers
18 Hard Drive Encryption
18 Credit Cards
18 Notes for Journalists
19 The Future
20 Log Off
21 Glossary of Hacking and Cyber Terms


21 Glossary of Hacking and Cyber Terms


3

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
3 september 2024
Aantal pagina's
26
Geschreven in
2024/2025
Type
SAMENVATTING

Onderwerpen

$8.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
yashpatel5

Maak kennis met de verkoper

Seller avatar
yashpatel5
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
1 jaar
Aantal volgers
0
Documenten
9
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen