Posted filed under CompTIA Security+.

Ransomware CompTIA Sec+ Objectives 1.1 Ransomware is a type of malicious software that infects a computer and restricts users’ access to it until a ransom is paid to unlock it. Ransomware variants have been observed for several years and often attempt to extort money from victims by displaying an on-screen alert. Typically, these alerts state… Read more »

Comparison of IPv4 and IPv6

Posted filed under CompTIA A+, CompTIA Network+.

Comparison of IPv4 and IPv6 Basic Comparison Description IPv4 IPv6 Address 32 bits long (4 bytes). Address is composed of a network and a host portion, which depend on address class. Various address classes are defined: A, B, C, D, or E depending on initial few bits. The total number of IPv4 addresses is 4… Read more »

Multi-factor authentication

Posted filed under CompTIA Network+, CompTIA Security+.

Two-Factor or Multi-Factor Authentication (2FA or MFA) CompTIA Security+ Objective 4.1 and CompTIA Network+ Objective 4.2 What is two-factor or multi-factor authentication (2FA or MFA)? Multifactor authentication ensures that a user is who they say they are. The more factors are used to determine the identity of a person, the greater the reliability of the authenticity…. Read more »


Posted filed under CompTIA Security+.

Phishing What is Phishing and How to Detect Phishing Attacks? Part of CompTIA Security+ Objectives 1.2 Phishing is an email scam designed that appears to be from a legitimate company and ask you to provide sensitive information. Cybercriminals use phishing to attempt to obtain sensitive information such as credit card details and login credentials, by… Read more »

Cloud Security: How Secure is Cloud Data?

Posted filed under ABOUT IT.

Cloud Security: How Secure is Cloud Data? Saving documents, photos, videos and reports on a computer’s hard drive? That’s becoming almost quaint. Today, people are more frequently saving their files in the cloud, storage space not located in their computers or devices but on servers hosted by third-party providers. The positives of storing data and… Read more »