Skip to main content

Posts

Featured

Learning The Attacks

  Discovering the world of exploitation caught my eye of interest wondering how it works and how it applies to the different devices. I have experienced phishing attacks then fall for it twice this is also known as hotmail attacks that produces links to everyone with a deceiving caption and then after the click of the link you're account is now compromised. My account got hacked late night and it was coming from Hong Kong but I knew something is different because they use proxy servers or vpn that covers up their location and it would display random nations and places so I quit tracking the hacker and went on important matters. Due to my lack of blogging, The college demands attention for the major subjects and minor subjects fulfillment that means all my personal and my security projects came to halt. Prioritize your time is the key. Anyways, Cyber attacks are silent attacks because attacker steals data without your consent so thats why we have to raise an alarm and build a defens...

Latest Posts

Compromised Account Attacks

My Family's Desktop Heritage

Resting is also important

Writing is Important

How I cope with the unfair education system

My Online Web Journal