On a regular user side , I use a open-source firewall on the kernel level. The firewall notifies me of every connection that's being made by my system to the internet, I block those that I don't know and allow those that's important for my work.
Hello Dear IBM. May I ask few questions. a). What mean Internet of Things (IoT)? b). How is connect to the IP for electronic IPV6 and IPV4? c). What's difference between IPV4 and IPV6? d). Hard Disk and Router Wireless USB is different things right? I'm curious
No. 1 on TH-cam Super Vote, Research efforts confirmed that the most influential media to reach the core target were blogs, social networking, and viral video sites. But, it also revealed that traditional media and local print, radio, and TV news still needed to be a vital part of communications campaign to this audience. Given the media's focus on the economic downturn and presidential election, a cash prize in the contest and themes of hope, optimism and the power of people to make change were deemed the most newsworthy angles. No. 1 on TH-cam Super Vote, No. 1 on MSNBC Ad Poll; most tweeted Super Bowl ad. Drive consumer engagement in contest via submissions and video views Strategy 1: Award ONE million for top ad meter spot.
How do get rid of discarded packets that has either no destination ip address or that has exceeded its TTL? Again can it be a threat on security or impact the network efficiencies.
Pen testers will always have a source of income based upon complacency towards securing your network. 90% of scams are achieved using social engineering and phishing over brute force. Essentially you are not a target unless you fall for spam emails or sms.
Man I love these IBM explanation videos , I have already learned so much !! Thanks IBM!!
I'm so glad you are enjoying them! Thanks for the great feedback!
This is quality learning experience- e-learning should be delivered with this kind of video, audio and style. any novice can understand
I’m very glad you like it! We’ve started a 10-part series on cybersecurity architecture based on exactly what you are saying
Straight to the point. Very informative. Love it. Thanks.
On a regular user side , I use a open-source firewall on the kernel level. The firewall notifies me of every connection that's being made by my system to the internet, I block those that I don't know and allow those that's important for my work.
Really well explained. Keep up the good work
the best DOS video ever. thank you
Thanks for saying so!
Beautiful explanation
i always get hit offline by people using nightmare stresser :(
Hello Dear IBM. May I ask few questions.
a). What mean Internet of Things (IoT)?
b). How is connect to the IP for electronic IPV6 and IPV4?
c). What's difference between IPV4 and IPV6?
d). Hard Disk and Router Wireless USB is different things right?
I'm curious
Very good information and accurate. Thank you for sharing IBM
Thank you for watching!
No. 1 on TH-cam Super Vote,
Research efforts confirmed that the most influential media to reach the core target were blogs, social networking, and viral video sites. But, it also revealed that traditional media and local print, radio, and TV news still needed to be a vital part of communications campaign to this audience. Given the media's focus on the economic downturn and presidential election, a cash prize in the contest and themes of hope, optimism and the power of people to make change were deemed the most newsworthy angles.
No. 1 on TH-cam Super Vote, No. 1 on MSNBC Ad Poll; most tweeted Super Bowl ad.
Drive consumer engagement in contest via submissions and video views
Strategy 1: Award ONE million for top ad meter spot.
Super easy to understand. Thank you!
Very nice info and explanation. 👍
Thank you!
How do get rid of discarded packets that has either no destination ip address or that has exceeded its TTL? Again can it be a threat on security or impact the network efficiencies.
This is a great explanation.... 🙏🤙
that's amazing. Thanks for explaining.❤
Thanks for watching!
Thanks for saying so!
Knowledge for free thanks 🙏
hahaha, for free. Ah, I needed that. Thanks for the chuckle.
which company watch you are wearing?
That’s an Apple Watch Ultra
v. helpful and v. clear. 👍
does using cloudfare ddos protection block fake connections? does fake bots click the box?
no one can explain dos better than this
Very kind of you to say!
How to forbid?
u are great !!!
And you are very kind!
Me: my phone has no service …. DOS!!
🤯
sorry i have no interest in cyber but being forced to face it by criminals on my home pc, they need to go to jail
They do, indeed
Learn to defend yourself.
Pen testers will always have a source of income based upon complacency towards securing your network. 90% of scams are achieved using social engineering and phishing over brute force. Essentially you are not a target unless you fall for spam emails or sms.
What if the hacker is female? Instructions unclear