TechLife

Network attacks

Though less common than malware and social engineering, network-based attacks are still a threat to every computer and mobile user, and everyone should have at least a basic understanding of what they are and how to avoid them. So this month let’s look at how these attacks work, and what you can do to guard against them.

Nmap/port scanning

Port scanning, most commonly done through an app called Nmap, is not an attack per se. It’s an attempt to check your system for attack vectors by seeing which ports you have open on your router and therefore what servers you might have running on your network. Then they can tailor an attack to that kind of server.

For example, if you

You’re reading a preview, subscribe to read more.

More from TechLife

TechLife2 min read
NASA Caught A Dead Star Spewing Antimatter
A small pulsar belched out an enormous beam of matter and antimatter particles that streamed for 40 trillion miles across the Milky Way. Astronomers detected the cosmic particle trail in images captured in X-rays by NASA’s Chandra X-ray Observatory i
TechLife2 min read
Make Office better
There are several ways to double-space entire documents in Word, so that there’s extra room between lines. The most commonly used is to click the Home tab followed by the ‘Line and Paragraph Spacing’ icon in the Paragraph section, then select 2.0 (or
TechLife2 min read
Withings ScanWatch Horizon
$780, www.withings.com I have drawers full of analog watches that have sat unworn since I adopted the Apple Watch in 2015. Their classic dials, complications, ticking hands, and second hands are lost to progress. Withings ScanWatch Horizon turns bac

Related Books & Audiobooks