Skip to main content

Posts

Showing posts from April, 2021

Security updates for critical Microsoft Exchange Server vulnerabilities

 Cyberint National Center specialists recently sent a notification about a ransomware campaign (called " Black Kingdom ") used to exploit MS Exchange's ProxyLogon vulnerabilities for encryption of servers. How does the attack work and what can you do to protect yourself? The attacker uses these vulnerabilities to run a PowerShell script that downloads the ransomware executable from the " yuuuuu44 [.] Com " domain , then distributes it to other stations on the network. As an operating mode, the ransomware product encrypts files on the infected station using random extensions and creates a ransom text file (called decrypt_file.TxT or ReadMe.txt ) . To prevent infection with this ransomware, we recommend that you urgently apply the latest updates available  to vulnerable servers, if you haven't already! Also, as additional protection measures, it is recommended: use of an antivirus solution for servers performing a regular backup (daily, weekly) for critical da

What does the information security professional do?

 Information security is the area of ​​information technology that has the mission of protecting all information and data circulating on the network. Security is essential so that bank account data for individuals and even sensitive information from governments and companies, for example, are not the target of hackers. According to the technical norm of ABNT (Brazilian Association of Technical Norms) that establishes the general guidelines and principles of information security management, information security constitutes the? Protection of information from various types of threats to ensure continuity of business, minimize business risk, maximize return on investment and business opportunities ?. Know more: WAN vs LAN The professional responsible for this area is the information security specialist. It must guarantee the availability of information resources, preserve the integrity of the information and preserve the confidentiality of the data.  Based on the pillars of confidentialit

A career in Computer Engineering

 The professional trained in Computer Engineering is capable of designing and building hardware and software. The hardware consists of the physical part of the computer, its structures and components and its peripherals (such as keyboard, mouse and monitor). In this area, the computer engineer integrates the machine's electronic circuits and develops connection plates between the equipment and its accessories. Know more: Network Engineer In the area of software development, the computer engineer creates computer programs and applications for the most diverse purposes. Another area in which a computer engineer can work is the field of industrial and robotics automation . He develops robots and digital systems for factories and industries. It is also common for this professional to work in the support and management of computer networks in large companies. The academic career is another option for a computer engineer, who can teach classes for technical and professional courses. For

How to start planning your infrastructure?

 You can make a good planning of the infrastructure for your company, following, basically, four steps that are subdivided in several stages. Ideally, the project should consider your company's strategic executive planning objectives and guidelines . If this document does not exist, however, the minimum to do is to align IT planning with the general objectives of the business. Mapping of existing structure and demand The first step is to map the entire existing infrastructure , evaluating each piece of equipment in relation to its life cycle and utility. This analysis allows us to inventory everything that can be used, what should be replaced and what are the demands for expanding the technology park. The systems engineer will often work together with a project manager and the engineering crew and becomes the primary point of communication to interlink between the two to simplify the accomplishment of a successful system.  From the assessment of the company's needs, we project

How is the Telecommunications Engineering course?

 The Telecommunications Engineering course lasts an average of five years, has a bachelor's degree and is offered only in person. In some universities it can be found as a qualification of the Electrical Engineering course. Like all courses in the Engineering area, the Telecommunications degree also has a basic cycle of training in Exact Sciences in the first years. In these semesters, students have subjects related to the areas of Mathematics, Physics and Chemistry. It might seem rather obvious to say it out loud but the reality is that a virtual assistant is simply an assistant who works remotely.  From the second year onwards, contact with the more specific content in the Telecommunications area increases - students get to know closely how digital, analog, satellite, optical fiber and telephony transmissions work. It is also common to find programs that involve disciplines related to Electrical Engineering, such as Electronics and Electromagnetism. The internship is mandatory,

What are the English proficiency levels?

 The classification used by language courses - basic, intermediate and advanced - is not exactly related to the levels of English proficiency that are based on the categorization of the European Common Framework or Framework. This guide considers the international standard ranking, which divides the degree of knowledge of the language into: See more:  Amazon Saheli Quiz Answers A1 (beginner) A2 (basic) B1 (intermediate) B2 (post-intermediate) C1 (advanced) C2 (proficient) Before you make any assessment, no matter how much you have prepared for it, pre-tests are recommended to find out where you would be classified if you took the test at that time. If your rating is below B2, in little or nothing a proficiency certificate will help you. Although many foreign universities consider the B1 level sufficient, the classes are already so complex even for those who have a perfect level of understanding of English, imagine for those who do not speak the language. Professionally speaking, below

How to become a computer engineer?

 To start acting as a computer engineer, there are two prerequisites: having a college degree in Computer Engineering; be registered with the Regional Council of Engineering, Architecture and Agronomy (Crea), which is only possible after the completion of the training. The undergraduate course lasts five years. In order to cover such a wide range of activities, the curriculum is very complete, including subjects in Mathematics, Programming, Web Design and Management. See some of the components of the curriculum: A computer network is a set of computers that are connected together so that they can share information. The earliest examples of computer networks are from the 1960s, but they have come a long way in the half-century since then. computer architecture and organization; computational logic; data structure; programming languages ; computational security; electrical and electronic circuits; CG; Artificial intelligence; electronic games; telecommunications; entrepreneurship; peopl

About privacy on the Internet

 If you are already a parent of children or teenagers, you are probably wondering about the best way to talk about privacy, security and the use of social networks. It can be challenging, but an important aspect of cybersecurity is related to the family's awareness of the risks associated with the use of social networks. Before anything, find out what pages your children and friends normally use. It is necessary to know the basic functions of these sites to understand their limitations, security features and risks. Familiarize yourself with the platforms your children are using or intend to use. Computer engineering is also a term that can be used to describe a person who has a background in electrical engineering. People who pride themselves on being computer engineers are proficient in computer science, and they can also be involved in hardware or software development. There are many resources available to help you, even in our social media section . For example, this article is

Internet connection problems

 If you saw a message that says "Disconnected from the server" , calm down, here we show you a series of steps to avoid this type of future problems. It's pretty easy: The first thing you should do is verify that you have an internet connection, either Wi-Fi or on your smartphone. If this is the case, then you must enter the video game and go to the option that allows you to change region. Choose between Asia, Europe or North America and voila, try again to join one of the games. You will see that you can now enter the game and view the number of open games in Among Us. It should be noted that it is not necessary to have to delete or clear the Among Us cache . You will simply have to change region since, in some cases, due to high demand, servers tend to crash, so don't worry. A DHCP server allots a dynamic IP number. The DHCP server has a group of IP addresses which can serve the purpose.  Tricks to win in Among Us if you are the impostor Did you get to be the impos