Category

Network & Security

Category

Your current Public IP : Your current Location : What is IP Address ? An IP (Internet Protocol) address is a unique number assigned to each device wishing to communicate with the Internet: computer, telephone, connected object … The IP address has two main functions: to identify a network or a host or to know a localization .First coded on 32bits (Protocol IPV4), the IP address a number assigned by the IANA which is the…

A report published by the Cyber Threat Alliance shows a 459% increase in so-called “cryptojacking” attacks, and a recent study by Redlock Cloud Security Intelligence showed that 25% of companies were unknowingly suffering from crypto-hacking activity in their cloud. How to deal with this new threat, still badly identified by companies? What is Cryptojacking? Cryptojacking refers to the unauthorized use of a third party’s computer resources to mine cryptocurrency. Hackers access these resources through phishing…

WordPress is used by 24% of the sites in the world. Which represents millions of web pages! Given its success, this CMS is often the target of hackers. But fortunately, there are quick steps to make your site as secure as possible in WordPress. 1. REGULARLY BACK UP THE DATABASE All sites have a database in which the contents are kept. It is essential to archive this data regularly, in case of concern on the…

Avast, Avira, BitDefender, Eset, F-Secure, Data G, Kaspersky, McAfee, Norton, Trend Micro. Ten suites claim this year defend better than any other, not only the security of your PC, but also that of your smartphones, tablets and Mac. What is it really ? 2017 announces no lull on the front of the dangers on line and the threats conveyed by Internet. All experts agree that attacks by Ransomware, Phishing and Trojans will give no respite…