Page 32 - revista2019-final_Neat
P. 32

Most  of  people  lost  their  privacy  due  to  passwords.  Hackers  try  to  steal  passwords  through  two
                   methods either by phishing method or bruteforce attack. Bruteforce attack will to try to find password
                   based upon a wordlist.

                   Hackers mainly stealing passwords through “keystrokes” by sending malwares to you mobile phones.
                   This malwares automatically sends every keystroke done by victim to hackers mail. In order to protect
                   your password from bruteforce attack  follows

                    Prevention:revention:
                   P
                   Prevention:Prevention:

                   Don’t use username as our password.
                   Don’t use password as your name.
                   Don’t use password as your mobile number.
                   Always password must contain alphabets, numbers, and characters. This combination of passwords is
                   so difficult to crack passwords in brute force attack.
                   Never share your OTP to anyone or never share your password reset link to anyone.

                    “Without strong encryption, you will be spied on systematically by lots of people.” Without strong encryption, you will be spied on systematically by lots of people.” --  Whitfield  DiffieWhitfield  Diffie
                   “
                   “Without strong encryption, you will be spied on systematically by lots of people.” “Without strong encryption, you will be spied on systematically by lots of people.” --  Whitfield  DiffieWhitfield  Diffie

                    WIFI  IFI
                   W
                   WIFI  WIFI

                   Wifi also cause a data leakage from you. If you are use public wifi means hackers try to steal your
                   information like passwords, bank transactions etc through “Man in Middle Attack”.If you are providing
                   hotspot means encrypt your hotspot connection.

                   In another way hackers try to steal your information by using “Handshake” method by creating fake
                   Acces point. For example, you are browsing to internet, suddenly your wifi gets disconnected. If you
                   try to reconnect means you will not be able to connect it.its time to trick by creating fake Acces points.
                   Now if you connect through fake acces points means it will ask password to connect. Now in this case
                   you must enter your password to connect. As soon as you entered a password. Hacker can get that
                   password with in a second.

                   P
                    Prevention of wifi:revention of wifi:
                   Prevention of wifi:Prevention of wifi:

                   Use strong passwords for your wifi hotspot.
                   If you are using router means, default password is “admin”.  One must change this password in admin
                   panel.
                   Don’t use sensitive or personal information in public wifi.
                   Incase if your are using public wifi means try to use proxychains (eg: VPN).

                   “
                   “Information is not knowledge” “Information is not knowledge” --  Albert EinsteinAlbert Einstein
                    “Information is not knowledge” Information is not knowledge” --  Albert EinsteinAlbert Einstein


                   P.Vignesh P.Vignesh
                   P
                    P.Vignesh .Vignesh
                   S Second Year / Electronics and Communication Engineering econd Year / Electronics and Communication Engineering
                   Second Year / Electronics and Communication Engineering Second Year / Electronics and Communication Engineering

                                        FUTURE WORLD OF COMMUTINGUTURE WORLD OF COMMUTING--AN OVERVIEWAN OVERVIEW
                                        F FUTURE WORLD OF COMMUTINGFUTURE WORLD OF COMMUTING--AN OVERVIEWAN OVERVIEW

                   IntroductionIntroduction
                   I
                    Introductionntroduction
                   The readers would be much aware,by now that it is purely going to be a technical article.But it is not
                   so.It  is  the  article,which  came  as  a  result  of  distant  analysis  of  the  future  mobility  of  vehicles.This
                   article would possibly take the readers on a time travel to the near future.I will be your driver to take
                   you all in this fascinating journey to the future of commuting.



                                                             19
   27   28   29   30   31   32   33   34   35   36   37