tag:blogger.com,1999:blog-4887933453028286322023-10-30T09:00:41.441-05:00Hak4KidzHealhttp://www.blogger.com/profile/16998845674641892888noreply@blogger.comBlogger13125tag:blogger.com,1999:blog-488793345302828632.post-74010751808185761822023-10-30T08:59:00.002-05:002023-10-30T08:59:43.644-05:00Home Security - Cybersecurity Awareness Month<p><span style="font-family: helvetica;"> </span></p><div class="separator" style="clear: both; text-align: center;"><span style="font-family: helvetica;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFy1FI-PY6XPbYgaZDSQEsRKAmmq-YoTMxCUHQuqfpJISevJDDcI_lzSHMhvJ-oWyPXkvokjUe3x301a1Ck0W3JYgR5VaJIIpQRlAmBSTgj799n_R19RuPWuCspql_CbXTTCykvobvcP_zbuec_PNgEfgqO3heL1WoVFq-hTWwwXHGiceffrrBOWUdVyha/s5163/HomeCyberSecurity.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="2905" data-original-width="5163" height="298" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFy1FI-PY6XPbYgaZDSQEsRKAmmq-YoTMxCUHQuqfpJISevJDDcI_lzSHMhvJ-oWyPXkvokjUe3x301a1Ck0W3JYgR5VaJIIpQRlAmBSTgj799n_R19RuPWuCspql_CbXTTCykvobvcP_zbuec_PNgEfgqO3heL1WoVFq-hTWwwXHGiceffrrBOWUdVyha/w529-h298/HomeCyberSecurity.jpeg" width="529" /></a></span></div><span style="font-family: helvetica;"><br /></span><p></p><h1 style="text-align: left;"><b><span style="background: white; color: #0070c0; font-size: 27.0pt; line-height: 107%; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-hansi-font-family: Calibri;"><span style="font-family: helvetica;">Securing Your Home</span></span></b></h1>
<h4 style="margin: 0in; text-align: justify; vertical-align: baseline;"><span style="font-family: helvetica; font-size: medium;"><span class="normaltextrun"><b><span style="color: #00b0f0;">What is Home Network Security?</span></b></span><span class="eop"><span style="color: #00b0f0;"> </span></span></span></h4>
<p class="paragraph" style="margin: 0in; text-align: justify; vertical-align: baseline;"><span class="normaltextrun"><span style="color: black; font-size: 11pt;"><span style="font-family: helvetica;">Home network security is the defense of a home network, which
links devices like routers, PCs, smartphones, and Wi-Fi-enabled baby monitors
and webcams to one another and to the Internet.<o:p></o:p></span></span></span></p>
<p class="paragraph" style="margin: 0in; text-align: justify; vertical-align: baseline;"><span class="normaltextrun"><span style="color: black; font-size: 11pt;"><o:p><span style="font-family: helvetica;"> </span></o:p></span></span></p>
<p class="paragraph" style="margin: 0in; text-align: justify; vertical-align: baseline;"><span style="font-family: helvetica;"><span class="normaltextrun"><span style="color: black; font-size: 11pt;">There are two widespread misconceptions among residential users
regarding the security of their networks.</span></span></span></p><p class="paragraph" style="margin: 0in; text-align: justify; vertical-align: baseline;"></p><ul><li><span style="font-family: helvetica;"><span class="normaltextrun"><span style="color: black; font-size: 11pt;">T</span></span></span><span class="eop" style="font-family: helvetica; text-indent: -0.25in;"><span style="font-size: 11pt;">heir household network is
not big enough to be vulnerable to a cyberattack.</span></span></li><li><span class="eop" style="font-family: helvetica; text-indent: -0.25in;"><span style="font-size: 11pt;">Out of the box, their
products are "secure enough."</span></span></li></ul><p></p>
<p class="paragraph" style="margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; text-align: justify; vertical-align: baseline;"><span class="eop"><span style="color: black; font-size: 11pt;"><o:p><span style="font-family: helvetica;"> </span></o:p></span></span></p>
<p class="paragraph" style="margin: 0in; text-align: justify; vertical-align: baseline;"><span class="eop"><span style="color: black; font-size: 11pt;"><span style="font-family: helvetica;">The majority of attacks are not of a personal nature and can
happen on any kind of network—large or small, residential or commercial. A
network is naturally more open to outside threats if it is connected to the
internet.<o:p></o:p></span></span></span></p>
<p class="paragraph" style="margin: 0in; text-align: justify; vertical-align: baseline;"><span style="font-size: 9pt;"><o:p><span style="font-family: helvetica;"> </span></o:p></span></p>
<h3 style="margin: 0in; text-align: left; vertical-align: baseline;"><span style="font-family: helvetica;"><span class="normaltextrun"><b><span style="color: #00b0f0;">What are the risks?</span></b></span><span class="eop"><span style="color: #00b0f0;"> </span></span></span></h3>
<p class="paragraph" style="margin: 0in; vertical-align: baseline;"><span style="font-family: helvetica;"><span class="normaltextrun"><span style="color: black; font-size: 11pt;">DNS hijacking is one of the biggest threats to any wireless
network. This occurs when malware infiltrates your unsecured router and
craftily redirects you away from a well-known site, such the website of your
bank, and toward a phony site that closely resembles the genuine thing.
Cybercriminals steal your login information when you log in to the fake website
and use it to access the legitimate website. </span></span><span class="eop"><span style="color: black; font-size: 11pt;"> </span></span><span style="font-size: 9pt;"><o:p></o:p></span></span></p>
<p class="paragraph" style="margin-bottom: 0in; margin-left: .75in; margin-right: 0in; margin-top: 0in; vertical-align: baseline;"><span style="font-size: 11pt;"><o:p><span style="font-family: helvetica;"> </span></o:p></span></p>
<h3 style="margin: 0in; text-align: justify; vertical-align: baseline;"><span style="font-family: helvetica;"><span class="normaltextrun"><b><span style="color: #00b0f0;">How to improve the security of Home Network?</span></b></span><span class="eop"><span style="color: #00b0f0;"> </span></span></span></h3>
<p class="paragraph" style="margin: 0in; vertical-align: baseline;"><span style="font-family: helvetica;"><span class="normaltextrun"><span style="color: black; font-size: 11pt;">You can drastically lower the attack surface of your home network
and make it more complex for a malicious cyber actor to launch a
successful attack by using some of the basic but effective mitigation
strategies listed below in no particular order:</span></span></span></p><p class="paragraph" style="margin: 0in; vertical-align: baseline;"></p><ul style="text-align: left;"><li><span class="normaltextrun" style="font-family: helvetica; text-indent: 0in;"><span style="font-size: 11pt;">Update
your router, home computer and handheld device software regularly.</span></span></li><li><span style="font-family: helvetica;"><span style="font-size: 14.6667px;">Read current security events to learn how to protect your home from the latest vulnerabilities.</span></span></li><li><span class="normaltextrun" style="font-family: helvetica; text-indent: 0in;"><span style="font-size: 11pt;">Remove unnecessary services and software from home computers.</span></span></li><li><span class="normaltextrun" style="font-family: helvetica; text-indent: 0in;"><span style="font-size: 11pt;">Change default log-in passwords and usernames.</span></span></li><li><span class="normaltextrun" style="font-family: helvetica; text-indent: 0in;"><span style="font-size: 11pt;">Use strong and unique passwords with important services such as spending, and email.</span></span></li><li><span class="normaltextrun" style="font-family: helvetica; text-indent: 0in;"><span style="font-size: 11pt;">Install network firewall on network devices.</span></span></li><li><span class="normaltextrun" style="font-family: helvetica; text-indent: 0in;"><span style="font-size: 11pt;">Regularly back up your data to network attached storage (NAS) or external hard drive.</span></span></li><li><span class="normaltextrun" style="font-family: helvetica; text-indent: 0in;"><span style="font-size: 11pt;">Turn off “remote management”, WPS and Universal Plug and
Play (UPnP) features.</span></span></li><li><span class="normaltextrun" style="font-family: helvetica; text-indent: 0in;"><span style="font-size: 11pt;">After your router has been set up, change default administrator password and logout.</span></span></li></ul><p></p>
<p class="paragraph" style="margin-bottom: 0in; margin-left: .75in; margin-right: 0in; margin-top: 0in; vertical-align: baseline;"><span style="font-size: 11pt;"><o:p><span style="font-family: helvetica;"> </span></o:p></span></p>Healhttp://www.blogger.com/profile/16998845674641892888noreply@blogger.com0tag:blogger.com,1999:blog-488793345302828632.post-37024078167004444252023-10-23T22:38:00.001-05:002023-10-25T16:49:03.887-05:00Email, Password, Phone Security - Cybersecurity Awareness Month<p><span class="normaltextrun" style="text-align: justify;"></span></p><h1 style="text-align: left;"><span class="normaltextrun"><b><span style="background: white; font-size: 27pt; line-height: 107%;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI5oargk40VcmYHjjstegm6KTxmqgBz_KXLHuH2aWVu5QSjgn0jcPUi-E3ShqS-r47463VcLY83oGJe4_mAAcftuqZtELqS_0n4kYwhSY3veKLxtqI3MCWtrx6TjYabK6rywLCJ3ynPFMevKydVDVROw-2pKO7fgskTYw2X2hx_0derp4UL7HXTBqraWCS/s7296/Stealing%20passwords.jpeg" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="3456" data-original-width="7296" height="243" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI5oargk40VcmYHjjstegm6KTxmqgBz_KXLHuH2aWVu5QSjgn0jcPUi-E3ShqS-r47463VcLY83oGJe4_mAAcftuqZtELqS_0n4kYwhSY3veKLxtqI3MCWtrx6TjYabK6rywLCJ3ynPFMevKydVDVROw-2pKO7fgskTYw2X2hx_0derp4UL7HXTBqraWCS/w514-h243/Stealing%20passwords.jpeg" width="514" /></a></div></span></b><b><span style="background: white; line-height: 107%;"><span style="font-family: verdana;"><span style="font-size: small;"> </span><br /><span style="font-size: 27pt;">Email, Password
and Phone Security</span></span></span></b></span></h1><p><span class="normaltextrun" style="text-align: justify;"><b><span face="Calibri, sans-serif" style="color: #00b0f0;"><span style="font-size: medium;">What is Email Security?</span></span></b></span><span class="eop" style="font-size: x-large; text-align: justify;"><span face=""Calibri",sans-serif" style="color: #00b0f0;"> </span></span></p>
<p class="paragraph" style="margin: 0in; text-align: justify; vertical-align: baseline;"><span class="normaltextrun"><span face=""Calibri",sans-serif" style="color: black; font-size: 11pt;">The methods and tools used to safeguard email accounts as well as
communications fall under the category of email security. Phishing attacks'
main target is email, which is also a way of distributing malware and is the
largest attack surface for an organization.</span></span><span class="eop"><span face=""Calibri",sans-serif" style="color: black; font-size: 11pt;"> <o:p></o:p></span></span></p>
<p class="paragraph" style="margin: 0in; text-align: justify; vertical-align: baseline;"><span class="eop"><span face=""Calibri",sans-serif" style="color: black; font-size: 11pt;"><o:p> </o:p></span></span></p>
<p class="paragraph" style="margin: 0in; text-align: justify; vertical-align: baseline;"><span style="font-size: medium;"><span class="normaltextrun"><b><span face=""Calibri",sans-serif" style="color: #00b0f0;">What is Password Security?</span></b></span><span class="eop"><span face=""Calibri",sans-serif" style="color: #00b0f0;"> </span></span></span><span face=""Segoe UI",sans-serif" style="font-size: 9pt;"><o:p></o:p></span></p>
<p class="paragraph" style="margin: 0in; text-align: justify; vertical-align: baseline;"><span class="normaltextrun"><span face=""Calibri",sans-serif" style="color: black; font-size: 11pt;">Password security is the integration of policies, procedures, and
technologies that improve the security of passwords and authentication mechanisms.
It all comes down to knowing how to protect passwords. A password is indeed a
type of secret authenticator that must be memorized.</span></span><span class="eop"><span face=""Calibri",sans-serif" style="color: black; font-size: 11pt;"> <o:p></o:p></span></span></p>
<p class="paragraph" style="margin: 0in; text-align: justify; vertical-align: baseline;"><span class="eop"><span face=""Calibri",sans-serif" style="color: black; font-size: 11pt;"><o:p> </o:p></span></span></p>
<p class="paragraph" style="margin: 0in; text-align: justify; vertical-align: baseline;"><span style="font-size: medium;"><span class="normaltextrun"><b><span face=""Calibri",sans-serif" style="color: #00b0f0;">What is Phone Security?</span></b></span><span class="eop"><span face=""Calibri",sans-serif" style="color: #00b0f0;"> </span></span></span><span face=""Segoe UI",sans-serif" style="font-size: 9pt;"><o:p></o:p></span></p>
<p class="paragraph" style="margin: 0in; text-align: justify; vertical-align: baseline;"><span class="normaltextrun"><span face=""Calibri",sans-serif" style="color: black; font-size: 11pt;">Phone Security refers to the defenses put in place to protect
sensitive data stored on and transmitted by laptops, smartphones, tablets,
wearables, and other portable devices. At the root of mobile device security is
the goal of keeping unauthorized users from accessing the enterprise network.</span></span><span class="eop"><span face=""Calibri",sans-serif" style="color: black; font-size: 11pt;"> <o:p></o:p></span></span></p>
<p class="paragraph" style="margin: 0in; text-align: justify; vertical-align: baseline;"><span face=""Segoe UI",sans-serif" style="font-size: 9pt;"><o:p> </o:p></span></p>
<h2 style="margin: 0in; text-align: left; vertical-align: baseline;"><span class="normaltextrun"><b><span face=""Calibri",sans-serif" style="color: #00b0f0;"><span style="font-size: medium;">What are the risks?</span></span></b></span><span class="eop"><span face=""Calibri",sans-serif" style="color: #00b0f0;"><span style="font-size: medium;"> </span><o:p></o:p></span></span></h2>
<p class="paragraph" style="margin: 0in; vertical-align: baseline;"><span face=""Calibri",sans-serif" style="color: #00b0f0;"><o:p> </o:p></span></p>
<p class="paragraph" style="margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; margin: 0in 0in 0in 0.5in; mso-list: l0 level1 lfo2; text-indent: -0.25in; vertical-align: baseline;"><!--[if !supportLists]--><span class="normaltextrun"><b><span face=""Calibri",sans-serif" style="font-size: 11pt; mso-ascii-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;"><span style="mso-list: Ignore;">1.<span style="font: 7pt "Times New Roman";"> </span></span></span></b></span><span class="normaltextrun"><b><span face=""Calibri",sans-serif" style="font-size: 11pt; mso-ascii-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">Email
Security: </span></b></span><span class="normaltextrun"><span style="font-size: 11pt;"><span face="Calibri, sans-serif">Email
security is one of the most important infrastructure security measures for an
organization. It is also the biggest attack surface for an organization. Some
of the security risks for email are as follows:</span><b><o:p></o:p></b></span></span></p><p class="paragraph" style="margin-bottom: 0in; margin-left: 1.0in; margin-right: 0in; margin-top: 0in; margin: 0in 0in 0in 1in; mso-list: l0 level2 lfo2; text-indent: -0.25in; vertical-align: baseline;"></p><ul style="text-align: left;"><ul><li><span class="normaltextrun"><span style="font-family: verdana;">Spoofing
and Phishing</span></span></li><li><span style="font-family: verdana;">Vulnerabilities
in E-mail Security</span></li><li><span style="font-family: verdana;">Domain
Squatting</span></li><li><span style="font-family: verdana;">Malware
via email attachments</span></li><li><span style="font-family: verdana;">Spear
Phishing attacks and Business E-mail Compromise (BEC)</span></li><li><span style="font-family: verdana;">File
Format Exploits</span></li><li><span style="font-family: verdana;">Configuration
Errors</span></li></ul></ul><p></p>
<p class="paragraph" style="margin-bottom: 0in; margin-left: 1.0in; margin-right: 0in; margin-top: 0in; margin: 0in 0in 0in 1in; vertical-align: baseline;"><span class="normaltextrun"><b><span face=""Calibri",sans-serif" style="font-size: 11pt; mso-ascii-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;"><o:p> </o:p></span></b></span></p>
<p class="paragraph" style="margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; margin: 0in 0in 0in 0.5in; mso-list: l0 level1 lfo2; text-indent: -0.25in; vertical-align: baseline;"><!--[if !supportLists]--><span class="normaltextrun"><b><span face=""Calibri",sans-serif" style="font-size: 11pt; mso-ascii-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;"><span style="mso-list: Ignore;">2.<span style="font: 7pt "Times New Roman";"> </span></span></span></b></span><span class="normaltextrun"><b><span face=""Calibri",sans-serif" style="font-size: 11pt; mso-ascii-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">Password
Security: </span></b></span><span class="normaltextrun"><span face=""Calibri",sans-serif" style="font-size: 11pt; mso-ascii-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">Weak
passwords are always a major component in any hack. For user convenience,
some applications do not enforce password complexity, and as a result, users
use simple passwords such as password, password123, Password@123, 12345, god,
own mobile number, and so on. Weak passwords are not only short in length and
character count; they are also easily guessable. Below mentioned are some of
the risks that passwords face.</span></span></p><p class="paragraph" style="margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; margin: 0in 0in 0in 0.5in; mso-list: l0 level1 lfo2; text-indent: -0.25in; vertical-align: baseline;"></p><ul style="text-align: left;"><ul><li><span face="Calibri, sans-serif" style="font-size: 11pt; text-indent: -0.25in;">Brute
Force or Dictionary attacks on weak passwords</span></li><li><span face="Calibri, sans-serif" style="font-size: 11pt; text-indent: -0.25in;">Cracking
of Hashes</span></li><li><span face="Calibri, sans-serif" style="font-size: 11pt; text-indent: -0.25in;">Reuse
of Passwords</span></li><li><span face="Calibri, sans-serif" style="font-size: 11pt; text-indent: -0.25in;">Educated
Guesswork for Brute Force attacks</span></li><li><span face="Calibri, sans-serif" style="font-size: 11pt; text-indent: -0.25in;">Default
Passwords</span></li><li><span class="normaltextrun" style="text-indent: -0.25in;"><span face=""Calibri",sans-serif" style="font-size: 11pt; mso-ascii-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;">Password
embedded in code</span></span></li></ul></ul><p class="paragraph" style="margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; margin: 0in 0in 0in 0.5in; mso-list: l0 level1 lfo2; text-indent: -0.25in; vertical-align: baseline;"><b><span face=""Calibri",sans-serif" style="font-size: 11pt; mso-ascii-theme-font: minor-latin; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-theme-font: minor-latin;"><span style="mso-list: Ignore;">3.<span style="font: 7pt "Times New Roman";"> </span></span></span></b><span class="normaltextrun"><b><span face=""Calibri",sans-serif" style="color: black; font-size: 11pt;">Phone Security:</span></b></span><span class="normaltextrun"><span face=""Calibri",sans-serif" style="color: black; font-size: 11pt;"> Potential
risks to Phone Security involves malicious mobile apps, phishing scams, data
leakage, Spyware and unsecure Wi-Fi networks. There are 4 major types of Phone
Security Threats: </span></span></p><ul style="text-align: left;"><ul><li><span class="normaltextrun"><span face=""Calibri",sans-serif" style="color: black; font-size: 11pt;">Mobile
Application Security Threats</span></span></li><li><span class="normaltextrun"><span face=""Calibri",sans-serif" style="color: black; font-size: 11pt;">Web-Based
Mobile Security Threats</span></span></li><li><span class="normaltextrun"><span face=""Calibri",sans-serif" style="color: black; font-size: 11pt;">Mobile Network
Security Threats</span></span></li><li><span class="normaltextrun"><span face=""Calibri",sans-serif" style="color: black; font-size: 11pt;">Mobile
Device Security Threats</span></span></li></ul></ul><p></p>
<p class="paragraph" style="margin-bottom: 0in; margin-left: .75in; margin-right: 0in; margin-top: 0in; margin: 0in 0in 0in 0.75in; mso-list: l1 level1 lfo1; tab-stops: list .5in; text-indent: 0in; vertical-align: baseline;"><span class="normaltextrun"><span face=""Calibri",sans-serif" style="color: black; font-size: 11pt;"><br /></span></span></p><p class="paragraph" style="margin-bottom: 0in; margin-left: .75in; margin-right: 0in; margin-top: 0in; margin: 0in 0in 0in 0.75in; mso-list: l1 level1 lfo1; tab-stops: list .5in; text-indent: 0in; vertical-align: baseline;"><span class="normaltextrun"><span face=""Calibri",sans-serif" style="color: black; font-size: 11pt;"><br /></span></span></p>Healhttp://www.blogger.com/profile/16998845674641892888noreply@blogger.com0tag:blogger.com,1999:blog-488793345302828632.post-53800008689789270032023-10-12T09:06:00.003-05:002023-10-12T11:12:09.708-05:00Identity Theft Protection - Cybersecurity Awareness Month<p style="text-align: center;"> <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuVjFw4bLCY3dIcPsAhk_XCJ7aBtNizdSe5F_9ZKeHpPPKR0InE5VgRL2WTQz3gbIhZ6VR6eImOpd2HKoFXwUXr0sQ7eoand6cEX85lmHhAA2ERXGhVXBk52t48Ejgh6dQb-I-Ht48z60IX_dXyBUBG2nWcxzokAF6fn5-uqoKHNEXCTkJPAyqyhJ0cljg/s4300/ID%20theft-global%20hacker.jpeg" style="margin-left: 1em; margin-right: 1em; text-align: center;"><img border="0" data-original-height="2150" data-original-width="4300" height="244" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuVjFw4bLCY3dIcPsAhk_XCJ7aBtNizdSe5F_9ZKeHpPPKR0InE5VgRL2WTQz3gbIhZ6VR6eImOpd2HKoFXwUXr0sQ7eoand6cEX85lmHhAA2ERXGhVXBk52t48Ejgh6dQb-I-Ht48z60IX_dXyBUBG2nWcxzokAF6fn5-uqoKHNEXCTkJPAyqyhJ0cljg/w486-h244/ID%20theft-global%20hacker.jpeg" width="486" /></a></p><h1 style="text-align: left;"><b><span style="color: #0070c0; font-family: verdana; font-size: 27pt; line-height: 107%; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri;">Identity Theft</span></b></h1>
<h2 style="text-align: justify;"><b><span style="color: #00b0f0; font-size: 12pt; line-height: 107%; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri;">What
is identity theft?</span></b></h2>
<p class="MsoNormal" style="text-align: justify;"><span style="color: black; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri; mso-themecolor: text1;">Identity theft
is the term used to refer to the types of crime in which someone wrongfully
obtains and uses another person's personal data in some way that involves fraud
or deception, typically for economic gain. Anyone can fall victim to identity
theft. These acts can damage your credit status and cost you time and money to
restore your good name.<o:p></o:p></span></p>
<p class="MsoNormal"><b><span style="color: #00b0f0; font-size: 12pt; line-height: 107%; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri;">How can my identity be
stolen?</span></b></p><p class="MsoNormal">The following includes some of the ways a threat actor may
try to steal your identity:</p><p class="MsoNormal" style="text-align: left;"></p><ul style="text-align: left;"><li><span style="color: black; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri; mso-themecolor: text1;">Steal wallets or purses in order to obtain
identification, credit and bank cards<o:p></o:p></span></li><li><span style="color: black; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri; mso-themecolor: text1;">Dig through mail and trash to retrieve applications for
"pre-approved" credit cards, bank statements, tax documents, etc.,
that were discarded without being shredded<o:p></o:p></span></li><li><span style="color: black; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri; mso-themecolor: text1;">Phish” for electronic information with phony emails, text
messages, phone calls and websites that are solely designed to steal sensitive
information<o:p></o:p></span></li><li><span style="color: black; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri; mso-themecolor: text1;">Steal data or personal records through a data breach, or
purchase stolen data from a malicious third party <o:p></o:p></span></li></ul><p></p>
<h2 style="text-align: justify;"><b><span style="color: #00b0f0; font-size: 12pt; line-height: 107%; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri;">What
can someone <a name="_Int_dlu62ln9">do</a> with your identity?</span></b></h2>
<p class="MsoNormal" style="text-align: left;"><span style="color: black; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri; mso-themecolor: text1;">With enough information about someone, a threat actor can
take over that individual's identity to conduct a wide range of fraudulent
activities, such as:</span></p><p class="MsoNormal" style="text-align: left;"></p><ul style="text-align: left;"><li><span style="text-indent: -0.25in;">File applications for loans and credit cards,</span></li><li><span style="text-indent: -0.25in;">Make withdrawals from bank accounts,</span></li><li><span style="text-indent: -0.25in;">Access online accounts</span></li></ul><p></p>
<p class="MsoNormal" style="text-align: justify;"><b><span style="color: #00b0f0; font-size: 12pt; line-height: 107%; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri;">Types
of Identity Theft:<o:p></o:p></span></b></p>
<p class="MsoNormal" style="text-align: justify;"><span style="color: black; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri; mso-themecolor: text1;">There are many
types of identity theft that can occur. Some of the common ones include:</span></p><p class="MsoNormal" style="text-align: justify;"></p><ul><li><span style="text-align: left; text-indent: -0.25in;">Tax ID Theft</span></li><li><span style="text-align: left; text-indent: -0.25in;">Medical ID Theft</span></li><li><span style="text-align: left; text-indent: -0.25in;">Child ID Theft</span></li><li><span style="text-align: left; text-indent: -0.25in;">Account Takeover Fraud</span></li></ul><p></p>
<h2 style="text-align: justify;"><b><span style="color: #00b0f0; font-size: 12pt; line-height: 107%; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri;">What
do I do if my identity gets stolen?</span></b></h2><p style="text-align: justify;"><span style="text-indent: -0.25in;">Call the companies where you know the
fraud occurred.</span></p><p class="MsoListParagraphCxSpFirst" style="mso-list: l1 level1 lfo1; text-align: justify; text-indent: -0.25in;"></p><ul><li><span style="text-indent: -0.25in;">Place a fraud alert and get your
credit reports.</span></li><li><span style="text-indent: -0.25in;">Report identity theft to the FTC.</span></li><li><span style="text-indent: -0.25in;">Y</span><span style="text-indent: -0.25in;">ou may choose to file a report with
your local police department.</span></li></ul><p></p>
<p class="MsoNormal" style="text-align: justify;"><b><span style="color: #00b0f0; font-size: 12pt; line-height: 107%; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri;">How
do I protect my identity?<o:p></o:p></span></b></p>
<p class="MsoNormal" style="text-align: left;"><span style="color: black; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri; mso-themecolor: text1;">Experts believe that identity theft cases occur so often
that there is a new victim every 22 seconds. Please check out this <b>comprehensive
guide </b>and <b>accompanying infographic</b> to help you take proactive steps
to protect your identity. <o:p></o:p></span></p>
<p class="MsoNormal" style="text-align: left;"><span style="color: black; mso-ascii-font-family: Calibri; mso-bidi-font-family: Calibri; mso-fareast-font-family: Calibri; mso-hansi-font-family: Calibri; mso-themecolor: text1;">If you receive a suspicious email, please report it <a name="_Int_a81QuEis">to</a> <b>reportphish@gap.com</b></span> </p><p class="MsoNormal" style="text-align: left;"><span style="color: #00b0f0;">Additional resources:</span></p>
<p class="MsoNormal"><a href="https://www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud" target="_blank">United States Department of Justice Identity Theft Awareness</a></p><p class="MsoNormal"><a href="https://www.equifax.com/personal/education/identity-theft/articles/-/learn/how-does-identity-theft-happen/" target="_blank">Equifax: How Does Theft Happen?</a></p><p class="MsoNormal"><a href="https://www.usa.gov/identity-theft" target="_blank">USA.gov Identity Theft Awareness</a></p>
<p class="MsoNormal"><a href="https://www.experian.com/blogs/ask-experian/20-types-of-identity-theft-and-fraud/" target="_blank">Experian: Many Different Forms of Identity Theft</a> </p>Healhttp://www.blogger.com/profile/16998845674641892888noreply@blogger.com0tag:blogger.com,1999:blog-488793345302828632.post-52398746948739408002023-10-02T22:35:00.003-05:002023-10-02T22:35:25.947-05:00Public Wi-Fi Usage - Cybersecurity Awareness Month<p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5eDMFYiZ7o610TE23-6J-TdWp0ud_SoS-5ZrxUZQdnyZoVgv3BekbrP8VEz_K3aXxfp9C2u9wO7UJJsoTwIUlQJrutP83SndNzNnIYETmHc7dNiSlDIHebNZSOoK17Kw6qpH2egOvstf6tntSrrSRTYvexi-1kpzx2T3V6h-MqhiLhNKOY_cuS54l08_I/s5674/CAM_01.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="2644" data-original-width="5674" height="238" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5eDMFYiZ7o610TE23-6J-TdWp0ud_SoS-5ZrxUZQdnyZoVgv3BekbrP8VEz_K3aXxfp9C2u9wO7UJJsoTwIUlQJrutP83SndNzNnIYETmHc7dNiSlDIHebNZSOoK17Kw6qpH2egOvstf6tntSrrSRTYvexi-1kpzx2T3V6h-MqhiLhNKOY_cuS54l08_I/w511-h238/CAM_01.jpeg" width="511" /></a></div><br />Cybersecurity awareness month is was created in October 2004 by the government with support from the non-governmental security community to help Americans become better at protecting themselves from attacks over the Internet. You can find more information on <a href="https://en.wikipedia.org/wiki/National_Cyber_Security_Awareness_Month" rel="nofollow" target="_blank">Wikipedia</a>.<p></p><p>As a parent or young adult reading this article, we at Hak4Kidz want you to know that we are going to do our best to make a meaningful contribution to this month's awareness cycle. Feel free to join in with comments below. This article will go into public Wi-Fi usage.</p><p><b>What is Public Wi-Fi?</b></p><p>Airports, coffee shops, malls, restaurants, and hotels all have free public Wi-Fi that one may use to access the web. People regularly connect to these "hotspots" without giving it any thought because they are so ubiquitous and common.</p><p><b>What are the risks?</b></p><p>The issue with public Wi-Fi is that there are a lot of risks associated with using these networks. Although business owners may think they're giving their consumers a helpful service, it's likely that the security on these networks is insufficient or nonexistent. Below mentioned are some of the risks involved with using public unsecure Wi-Fi:</p><p></p><ul style="text-align: left;"><li>Man-in-the-Middle Attacks</li><li>Malware Distribution – Targeting a specific vulnerability in a system by injecting code onto your device.</li><li>Wi-Fi Snooping and Sniffing – Eavesdropping on WiFi signals to access everything that one does when online. From viewing websites visited to collecting login credentials.</li></ul><p></p><p><b>How to identify rogue Wi-Fi Networks?</b></p><p>While many hackers like using public Wi-Fi networks, some may go above and beyond by setting up a hotspot specifically for malicious purposes, such rogue networks can be identified as follows:</p><p></p><ul style="text-align: left;"><li>Network/Wi-Fi name matches a trusted network.</li><li>“HTTPS” sites are rendered as “HTTP”</li><li>Names of the Wi-Fi networks are generic – such as “Free Wi-Fi”</li></ul><p></p><p><b>Things to avoid if connected to Public Wi-Fi:</b></p><p>There are things you shouldn’t do while connected to an unknown network. Some of the ones include:</p><p></p><ul style="text-align: left;"><li>Online banking</li><li>Paying Bills or Doing transactions.</li><li>Shopping on Online Sites</li><li>Filing Taxes</li></ul><p></p><p><b>How to Safely use Public Wi-Fi if there is an absolute need?</b></p><p></p><ul style="text-align: left;"><li>Use a VPN.</li><li>Stick to “HTTPS” websites.</li><li>Avoid accessing sensitive information.</li><li>Turn off file sharing on public networks.</li><li>Use two-factor authentication for logins.</li><li>Keep your operating system up to date with the latest software and OS updates.</li><li>Remember to log out of sessions.</li><li>Use antivirus software</li></ul><div>Thank you <b>Admin <a href="https://twitter.com/dr0pbears" target="_blank">dr0pbears</a></b> for your contributions to this article.</div><p></p>Healhttp://www.blogger.com/profile/16998845674641892888noreply@blogger.com0tag:blogger.com,1999:blog-488793345302828632.post-45233023329733182432022-07-25T21:07:00.001-05:002022-07-25T21:07:09.826-05:00Hak4Kidz 2022 Chicago Event Will Be In-person!<p> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgsK4HU6uP_06JtSMHYYm11SsOnelAbTFj3nBVQEtd0ypa9Z1pEZCKOSaxEobCVRXH1Mayj37BFnR1mCp5IgUTNtDonfVFxvm2Qpjh3_ntpODQXc199M7fAWyDG22oVCDKDzM0xhn1HfL9bATqMD-R7rsBenqvpq8UGQPXZ5rRILBTdmBtv1oecNQU_jg" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="1399" data-original-width="2100" height="340" src="https://blogger.googleusercontent.com/img/a/AVvXsEgsK4HU6uP_06JtSMHYYm11SsOnelAbTFj3nBVQEtd0ypa9Z1pEZCKOSaxEobCVRXH1Mayj37BFnR1mCp5IgUTNtDonfVFxvm2Qpjh3_ntpODQXc199M7fAWyDG22oVCDKDzM0xhn1HfL9bATqMD-R7rsBenqvpq8UGQPXZ5rRILBTdmBtv1oecNQU_jg=w512-h340" width="512" /></a></div><br /><p></p><p>We are thrilled to announce that <a href="https://www/hak4kidz.com" rel="nofollow" target="_blank">Hak4Kidz</a> Chicago events are returning to meeting in-person!</p><p>Scheduled on Saturday, September 17, 2022 in the <b>Old Post Office</b> located at 433 W. Van Buren St.</p><p>Even though we had fun teaching Tyros virtual over Webex with <a href="https://www.cisco.com/c/en/us/products/security/cyber-defense-clinic.html" target="_blank">Cisco's Cyber Defense Clinic</a> platform, based upon <a href="https://www.cdc.gov/coronavirus/2019-ncov/your-health/gatherings.html" target="_blank">CDC guidance on gatherings</a>, many locations have changed their in-person gathering policies enabling events to proceed.</p><p>We are also excited to announce this year's youth keynote presenter is a high school freshmen, while in middle school, Kendrick Lee earned the <a href="https://www.comptia.org/certifications/a" target="_blank">CompTIA A+ certification</a>! Kendrick will share his adventure of earning a certification that launches many adult's careers into IT. Very inspiring!</p><p>When asked about his experience studying for the exam, Kendrick responded, "<i>The CompTIA A+ is brutal, for anyone. But with the right motivation and passion, you’ll prevail.</i>"</p><p>This year's badge is a Do-It-Yourself soldering badge project that's designed to get us restarting our passion to build.</p><p><u>Activities this year will include:</u></p><ul style="background-color: white; font-family: Play, sans-serif;"><li>The ultimate Hak4Kidz themed <strong>hacker escape room</strong>!</li><li>The wildly popular lock picking roadshow... <strong>Fox Pick!!</strong> </li><li><strong>Hardware Hacking Station</strong></li><li><strong>Crash-bots</strong></li><li><strong>Vintage Computing</strong></li><li><strong>jrCTF</strong> - Bring a laptop.</li><li><strong>Snap Circuits</strong></li><li><strong>SpyMath</strong></li><li><strong>STEHM</strong></li><li><strong>Technology Destruction Village</strong></li></ul><p>For more detailed descriptions and to stay up to date with activity changes, visit our <a href="https://www.hak4kidz.com/activities/" rel="nofollow" target="_blank">Activities page</a>.</p><p><u>Workshops this year will include:</u></p><ul style="background-color: white; font-family: Play, sans-serif;"><li><b>Byte Size HackerBox 0003 Walk-through</b></li><li><b>Intermediate Soldering</b> ( 2 sessions )</li><li><b>Building the Game of Life</b> with Python</li><li><b>Cyber Defense Clinic</b></li></ul><p>We are trying something new this year, workshops are <b>add-ons</b> in Eventbrite. Please remember to select a couple workshops with <a href="https://www.hak4kidz.com/eventchi.html" target="_blank">registration</a>.</p><p>Share this <a href="https://hak4kidz.us14.list-manage.com/track/click?u=69c5892a76325952b24760dce&id=d49d2cc48a&e=0133cf3d66" rel="nofollow" target="_blank">event flyer</a> with friends, family, frienemies, and total strangers over email and social media using this year's flyer.</p><p>Hak4Kidz is planning to return to our traditional early June schedule in 2023.</p><p><a href="https://www.hak4kidz.com/eventchi.html" target="_blank">Register today</a> for our 7th annual event!</p><p>Stay safe everyone! Question truth, and be better.</p>Healhttp://www.blogger.com/profile/16998845674641892888noreply@blogger.com0tag:blogger.com,1999:blog-488793345302828632.post-27321103846622814952022-07-09T14:42:00.004-05:002022-07-09T14:49:54.261-05:00Byte Size Box 0001 Walk-through Video Available<p> </p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEgTLeHLGSncVPU1Y0EjImbMAS4Xh8ouH5Syy-s0MWaSzoHAo7PL_2UidH49bKthgcDeF6QGDtVV4Geue-TAkv-LDhqCVhJteBsTCizciMDk23BpKrRI_6aEjWu-D5FlL2RhItm-e6M5Gih90ZXX5BLykGAe3SXpjV9Qz8B75jixcECTg_HMU0bntYpibA" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="885" data-original-width="1060" height="340" src="https://blogger.googleusercontent.com/img/a/AVvXsEgTLeHLGSncVPU1Y0EjImbMAS4Xh8ouH5Syy-s0MWaSzoHAo7PL_2UidH49bKthgcDeF6QGDtVV4Geue-TAkv-LDhqCVhJteBsTCizciMDk23BpKrRI_6aEjWu-D5FlL2RhItm-e6M5Gih90ZXX5BLykGAe3SXpjV9Qz8B75jixcECTg_HMU0bntYpibA=w407-h340" width="407" /></a></div><br /><p></p><p>This month's <b>HackerBox Byte Size</b> is about USB data protection and privacy.</p><p>Whether you are a fan of the Incognito sticker to hide your activity online, or the HB shield sticker to protect your laptop with a glider and Open Source hardware logo, or the <b><span style="color: red;">CAUTION CYBER HAZARD</span></b> key chain, these contents provide edutainment as a reminder to stay vigilant in the cyberz.</p><p>Difficult to avoid a virtual meeting these days. So let's add a webcam cover! Keep your privacy safe from accidental viewers while you are preparing to join the meeting.</p><p>Printed Circuit Boards (PCBs) are typically green and used in most electronics. Here HackerBoxes is showing how PCBs can be artistic as well. The black 6" PCB ruler has the HackerBoxes copper logo on one side, and 19 SMD footprints along with trace widths on the other side. Super handy to have around and satisfying to look at.</p><p>Next up is the <b>USB Data Blocker</b>! Great to prevent someone taking data off or putting unwanted files onto your USB charging devices. Watch <a href="https://h4kacademy.moodlecloud.com/mod/page/view.php?id=56" target="_blank">Heal's walk-through video</a> to show you how it works.</p><p>Last, and far from least, the <b>Lily GO USB</b> keyboard impersonating stick. Lily GO can be used as a <b>GoodUSB</b> or a <b>BadUSB</b> (for pen-testing only Tyros!). Heal shows you how to flash the micro-controller on the Lily GO to send friendly messages, or play harmless pranks on those who love you. Or at a minimum is patient with your shenanigans. Such as Heal rick-rolling his kid. He's working on an Advanced video to step through how the Arduino sketches work so you can make your own.</p><p>Be sure to pick up your <a href="https://hackerboxes.com/collections/past-byte-size/products/byte-size-0001-goodusb" target="_blank">Byte Size Box 0001</a> to join the fun or <a href="https://hackerboxes.com/collections/subscriptions-1/products/byte-size-monthly-subscription" target="_blank">subscribe monthly</a> so not to miss any boxes while <b>saving some cash</b>.</p><p><br /></p>Healhttp://www.blogger.com/profile/16998845674641892888noreply@blogger.com0tag:blogger.com,1999:blog-488793345302828632.post-59727433740259630232022-05-11T17:25:00.001-05:002022-05-11T22:56:48.096-05:00Pulling in the same direction with HackerBoxes<p><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNT0NEBz-Kn-3Ry95lawtDUACWFzE0fBidkyHDx_VD_DMFU1UNreOy9mJNzEQw7jbRYVfvLeDGFZhIn-zLfXcJyKPKiGKySlKWa9fq4b8Ni19DbHdVtwqOYBUGYkaGnCBQDEgRZ0va8-tUkGQLL3ek86zcMg_xRJCGPQ4EVlhZaGIyxcA6vJftOilk9w/s400/Tinker_BS_badge_400x400.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="400" data-original-width="400" height="215" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNT0NEBz-Kn-3Ry95lawtDUACWFzE0fBidkyHDx_VD_DMFU1UNreOy9mJNzEQw7jbRYVfvLeDGFZhIn-zLfXcJyKPKiGKySlKWa9fq4b8Ni19DbHdVtwqOYBUGYkaGnCBQDEgRZ0va8-tUkGQLL3ek86zcMg_xRJCGPQ4EVlhZaGIyxcA6vJftOilk9w/w215-h215/Tinker_BS_badge_400x400.png" width="215" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgph4wLyyQib66EMxfDNGx8IhEGRyY974brDrt0crANfSznWoU2yv0kO1aU7XfVw7E6q49BbJ9c6e6kzHAOQOw7De9z7Kgq7gU7yzkNdXAtXOqJfxE8K-UXokm4it3bQ3RHXvy8V0ZF_nu1_lXteXRow--H826orYXHDmnfqz1n3pimLgn9Yr87AjRPMg/s998/Byte%20Size%20Fractal%20Sticker.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="998" data-original-width="998" height="215" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgph4wLyyQib66EMxfDNGx8IhEGRyY974brDrt0crANfSznWoU2yv0kO1aU7XfVw7E6q49BbJ9c6e6kzHAOQOw7De9z7Kgq7gU7yzkNdXAtXOqJfxE8K-UXokm4it3bQ3RHXvy8V0ZF_nu1_lXteXRow--H826orYXHDmnfqz1n3pimLgn9Yr87AjRPMg/w215-h215/Byte%20Size%20Fractal%20Sticker.png" width="215" /></a></div><br /><p class="MsoNormal"><span style="background: white; color: black; font-family: "Arial",sans-serif; mso-fareast-font-family: "Times New Roman";">For some time now, I've been
talking to like-minded information security folks about how we have the same
objectives when it comes to security awareness training and youth education.
The unfortunate truth is we haven't made much progress collaborating. People
talk, they get excited, and then something else happens resulting in no follow
up. Yeah, there might be some exceptions out there, but very few?</span><span style="font-family: "Arial",sans-serif; mso-fareast-font-family: "Times New Roman";"><o:p></o:p></span></p>
<p class="MsoNormal" style="background: white; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"><span style="color: black; font-family: "Arial",sans-serif; mso-color-alt: windowtext;"><a href="https://hackerboxes.com/" target="_blank"><span style="color: #1c1d98; mso-fareast-font-family: "Times New Roman";">HackerBoxes </span></a></span><span style="color: black; font-family: "Arial",sans-serif; mso-fareast-font-family: "Times New Roman";">and </span><span style="color: black; font-family: "Arial",sans-serif; mso-color-alt: windowtext;"><a href="https://www.hak4kidz.com/" target="_blank"><span style="color: #1c1d98; mso-fareast-font-family: "Times New Roman";">Hak4Kidz</span></a></span><span style="color: black; font-family: "Arial",sans-serif; mso-fareast-font-family: "Times New Roman";"> have entered into
a mutual agreement to use each other's strengths and pull together in the same
direction. HackerBoxes has figured out designing, curating, and distributing
fun and challenging kits. Hak4Kidz is excels at educating kids on IT and
Information Security.<o:p></o:p></span></p>
<p class="MsoNormal" style="background: white; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"><span style="color: black; font-family: "Arial",sans-serif; mso-fareast-font-family: "Times New Roman";">The benefits of the partnership is for kids ages
10-110 to submerge themselves into an edutaining hands-on experience of the joy
of receiving a monthly mystery <a href="https://hackerboxes.com/products/byte-size-monthly-subscription" target="_blank"><span style="color: #1c1d98;">HackerBox Byte Size</span></a> and
a </span><span style="color: black; font-family: "Arial",sans-serif; mso-color-alt: windowtext;"><a href="https://hack.h4kacademy.com/" target="_blank"><span style="color: #1c1d98; mso-fareast-font-family: "Times New Roman";">walk-through
video</span></a></span><span style="color: black; font-family: "Arial",sans-serif; mso-fareast-font-family: "Times New Roman";"> provided by Hak4Kidz. President of
Hak4Kidz, David Schwartzberg, stated, "We are thrilled at the opportunity
to expand our services to an underserved demographic over the Internet. The
combined forces of HackerBoxes and Hak4Kidz will surely elevate the skills of
youths and adults in electronics, cybersecurity, and ethical hacking."<o:p></o:p></span></p>
<p class="MsoNormal" style="background: white; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"><span style="color: black; font-family: "Arial",sans-serif; mso-fareast-font-family: "Times New Roman";">The CEO of HackerBoxes commented, "</span><span style="background: white; color: #222222; font-family: "Arial",sans-serif; mso-fareast-font-family: "Times New Roman";">After shipping our advanced monthly HackerBoxes
to adult hobbyists for over six years, we are super excited to also offer Byte
Size as a more focused, straight-forward monthly box for beginners of all ages.</span><span style="color: black; font-family: "Arial",sans-serif; mso-fareast-font-family: "Times New Roman";">"<o:p></o:p></span></p>
<p class="MsoNormal" style="background: white; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"><span style="color: black; font-family: "Arial",sans-serif; mso-fareast-font-family: "Times New Roman";">While subscriptions for Byte Size are available
today, May 15th is the anticipated first ship date of Byte Size with the
walk-through video to be released a couple days later. Hak4Kidz is also offering
a monthly or annual subscription of Advanced Hacks with the Byte Size box.</span></p><p class="MsoNormal" style="background: white; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto;"><span style="color: black; font-family: "Arial",sans-serif; mso-fareast-font-family: "Times New Roman";">Educationally exciting times are ahead!</span></p>Healhttp://www.blogger.com/profile/16998845674641892888noreply@blogger.com0tag:blogger.com,1999:blog-488793345302828632.post-23328726643807192492022-04-16T17:38:00.001-05:002022-04-16T21:58:36.623-05:00A Difficult Decision<p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1wyhA6UWzGi3fjoXHwRLcznvYE3wH3rdu0XUgSXPNODvgdqhfHkLY2ZINb8ccfB1OAMpQzfwHuJf4DIBZ1tmvQfFeuiSbCwyALN3962NvLZHbSmcMDRcyOeyEmEkNlwI-74TEKhPcsn_epfgFJx4PrBQT2_RzH8xgGPm4NzotI3FmYrNk7PmmQwa5iw/s2647/No%20Chicago%20Event.png" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="1765" data-original-width="2647" height="362" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1wyhA6UWzGi3fjoXHwRLcznvYE3wH3rdu0XUgSXPNODvgdqhfHkLY2ZINb8ccfB1OAMpQzfwHuJf4DIBZ1tmvQfFeuiSbCwyALN3962NvLZHbSmcMDRcyOeyEmEkNlwI-74TEKhPcsn_epfgFJx4PrBQT2_RzH8xgGPm4NzotI3FmYrNk7PmmQwa5iw/w544-h362/No%20Chicago%20Event.png" width="544" /></a></div><p> As the title of this article states, the Board of Hak4Kidz NFP had to make a difficult decision today. With so much opening up in the Chicagoland area, people are still not getting out of the house as much as we were expecting by this time. How do we know? Our Milwaukee event registration is lower than expected, but a Wisconsin middle school purchased 30 tickets, so we will carry on.</p><p></p><p> In our professional lives, one of us planned 3 different professional events on the same day and the turnout was less than desired. That was a big tell. Having a Hak4Kidz event on June 4th is reasonably close to those events mentioned above. So whether the concern is being in large crowds (understandably) or people don't want to put on outside clothes thus leaving the comfort of their home (understandably) , or both, the decision had to be made quickly.</p><p> We are working on selecting a date in late summer or early fall for the next event. But, we want to hear from you first. Please complete this very simple <a href="https://doodle.com/meeting/participate/id/e0R9Bqyb" target="_blank">Doodle poll</a> before May 1st to let us know what works best for you. We will communicate the new schedule once the logistics of reserving the venue are finalized.</p><p> Anyone who purchased a ticket will have the option of deferring their ticket for the new date, or a full refund. Once the new date is determined we will notify via social media and an article. We will honor the decision up to two weeks prior to the new date.</p><p> Thank you very much for your community support and we are planning to make the next Chicago event bigger and better than ever!</p><p>Securely,</p><p>Hak4Kidz Team</p>Healhttp://www.blogger.com/profile/16998845674641892888noreply@blogger.com0tag:blogger.com,1999:blog-488793345302828632.post-15908137804737435272022-04-16T15:22:00.005-05:002022-04-16T21:58:43.962-05:00Hak4Kidz is back in Milwaukee...and more!<p></p><div class="separator" style="clear: both; text-align: center;"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEi7FCZsXJ32bQ6VipGdOQt0YroqpVe7oOb-cVizaQ-4-JUfQVV5pG6hojDBa5p4Bgx5M3zpV32R8QVKb6V2p85XKe9kluSyN8_5P_ct3C7M6U52Fgs3bIz54o2Mpvb3_pRgtuJmJHYVqSJ3-Rad3NQHBYlt5CK99zxyslr9Un791BW1_12x1KHHbeoZ1g" style="margin-left: 1em; margin-right: 1em;"><img alt="" data-original-height="600" data-original-width="1200" height="267" src="https://blogger.googleusercontent.com/img/a/AVvXsEi7FCZsXJ32bQ6VipGdOQt0YroqpVe7oOb-cVizaQ-4-JUfQVV5pG6hojDBa5p4Bgx5M3zpV32R8QVKb6V2p85XKe9kluSyN8_5P_ct3C7M6U52Fgs3bIz54o2Mpvb3_pRgtuJmJHYVqSJ3-Rad3NQHBYlt5CK99zxyslr9Un791BW1_12x1KHHbeoZ1g=w533-h267" width="533" /></a></div><br /><br /></div><span style="background-color: white;"><span face="Play, sans-serif">Hak4Kidz is excited to be returning to Milwaukee in partnership with our friends at</span></span> <a href="https://www.cyphercon.com/" target="_blank">CypherCon</a> <span face="Play, sans-serif" style="background-color: white;">and the</span> <a href="https://www.midwestgamingclassic.com/" target="_blank">Midwest Gaming Classic</a>! <p></p><p><span style="background-color: white;"><span face="Play, sans-serif">We want folks to enjoy what Hak4Kidz and the Midwest Gaming Classic have to offer on Saturday, so we decided to reduce our hours to give participants more time for both. This year the Milwaukee Tyro badge will be the badge we created for 2019 and was our first Kickstarter. Tyros and 'Pones can each add-on a deeply discounts Saturday afternoon and evening only pass! This is a great opportunity for Hak4Kidz fans to experience some fun gaming time at the MGC.</span></span></p><p><strong style="background-color: white; font-family: Play, sans-serif;">When:</strong><span face="Play, sans-serif" style="background-color: white;"> April 30, 2022, 8:30am doors open, Opening Ceremonies begin 9am, day ends at 12pm CDT</span><br style="background-color: white; font-family: Play, sans-serif;" /><strong style="background-color: white; font-family: Play, sans-serif;">Where:</strong><span face="Play, sans-serif" style="background-color: white;"> </span><a href="http://www.hiltonmilwaukee.com/" style="background-color: white; font-family: Play, sans-serif;" target="new">Hilton Milwaukee</a><span face="Play, sans-serif" style="background-color: white;"> in Wright Ballroom A, 509 W. Wisconsin Ave, Milwaukee, WI</span><br style="background-color: white; font-family: Play, sans-serif;" /><strong style="background-color: white; font-family: Play, sans-serif;">Registration:</strong><span face="Play, sans-serif" style="background-color: white;"> ** </span><a href="https://www.eventbrite.com/e/hak4kidz-mke-2022-tickets-253765578677&ref=home" style="background-color: white; font-family: Play, sans-serif;" target="new">OPEN</a><span face="Play, sans-serif" style="background-color: white;"> **</span><br style="background-color: white; font-family: Play, sans-serif;" /><strong style="background-color: white; font-family: Play, sans-serif;">Registration ends:</strong><span face="Play, sans-serif" style="background-color: white;"> ** April 29th, 2022 **</span><br style="background-color: white; font-family: Play, sans-serif;" /><strong style="background-color: white; font-family: Play, sans-serif;">Activities:</strong><span face="Play, sans-serif" style="background-color: white;"> ** </span><a href="https://www.hak4kidz.com/activities/mke.html" style="background-color: white; font-family: Play, sans-serif;" target="new">Hak4Kidz Milwaukee 2022 Activities</a><span face="Play, sans-serif" style="background-color: white;"> are available</span><br style="background-color: white; font-family: Play, sans-serif;" /><strong style="background-color: white; font-family: Play, sans-serif;"><br /></strong></p><p><strong style="background-color: white; font-family: Play, sans-serif;">Thank you CypherCon and Midwest Gaming Classic for the space!</strong><br /><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-4Ko7R2U1qYp_Y2cthLEuBWCSt0HYPuBWZY73SSIMNQmDE7sdA-IHpTDPnFWWif969oMXKJOl-c7VMM7QoiNWvClZzrhszYT0-4Fz1vxuH0TVwmKL23HSPc_hOS93zJHT1gafNMu_wwptdGW5RW1aUVIyBjaYxhc03HWiHcvy7NsBzGoZ8jH93Tn1YA/s629/MKE_MGC_add-on.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="585" data-original-width="629" height="482" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-4Ko7R2U1qYp_Y2cthLEuBWCSt0HYPuBWZY73SSIMNQmDE7sdA-IHpTDPnFWWif969oMXKJOl-c7VMM7QoiNWvClZzrhszYT0-4Fz1vxuH0TVwmKL23HSPc_hOS93zJHT1gafNMu_wwptdGW5RW1aUVIyBjaYxhc03HWiHcvy7NsBzGoZ8jH93Tn1YA/w518-h482/MKE_MGC_add-on.JPG" width="518" /></a></div><br /><p><br /></p>Healhttp://www.blogger.com/profile/16998845674641892888noreply@blogger.com0tag:blogger.com,1999:blog-488793345302828632.post-68619572791994859532022-01-23T20:36:00.001-06:002022-01-23T22:03:42.939-06:00New Year Message from Hak4Kidz<p><span style="background-color: white; color: #202020; font-family: Helvetica; font-size: 16px;"></span></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEg_Zub7lJaIjJV2G7gQbn913rPWMvJmikIYxOWq6AE04TBZKVpE1b8lzlife1Ku5no8Ql63WYv-uGjPOMPDP257Ov44dsFYz9G6RFjZx3RAzqdQPwOHpv7cJNxj2uI6ItyyiCTUYqeljWCSZnax2qXBCNDatnN2a4HK6F3b2pJSeXS6myqy-1ft1CbhJQ=s1279" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="900" data-original-width="1279" height="354" src="https://blogger.googleusercontent.com/img/a/AVvXsEg_Zub7lJaIjJV2G7gQbn913rPWMvJmikIYxOWq6AE04TBZKVpE1b8lzlife1Ku5no8Ql63WYv-uGjPOMPDP257Ov44dsFYz9G6RFjZx3RAzqdQPwOHpv7cJNxj2uI6ItyyiCTUYqeljWCSZnax2qXBCNDatnN2a4HK6F3b2pJSeXS6myqy-1ft1CbhJQ=w504-h354" width="504" /></a></div><br />With the holiday season behind us and the new year having begun, some of us may already be reflecting on what to accomplish over the next twelve months. Such as, how to make a difference in a community or what personal outcomes you are striving for. Whatever it may be, you are going to do something amazing!<p></p><p style="background-color: white; color: #202020; font-family: Helvetica; font-size: 16px; line-height: 24px; margin: 10px 0px; padding: 0px; text-size-adjust: 100%;">We hope during the holidays you were able to reconnect with the people you love and are important in your life. Took a break from the electronic devices and did something like playing a board game. My family enjoys playing Settlers of Catan and Star Munchkin.<br /><br />With 2021 in the rearview mirror, the Hak4Kidz Board of Directors at the end of December to review 2021, plan for 2022, and beyond. Without going into deep detail and long written prose, here are the highlights and exciting news:</p><ul style="background-color: white; color: #202020; font-family: Helvetica; font-size: 16px; margin: 1em 0px 1em 24px; padding: 0px 0px 0px 16px;"><li style="line-height: normal; margin-bottom: 0.5em; text-size-adjust: 100%;">in person events will resume in 2022, as along as it's safe to bring Tyros together.</li><li style="line-height: normal; margin-bottom: 0.5em; text-size-adjust: 100%;">in person events will be following the safety guidelines and vaccination policies of both the local government, venue, and partnering organization.</li><li style="line-height: normal; margin-bottom: 0.5em; text-size-adjust: 100%;">current date for Hak4Kidz in Milwaukee in partnership with CypherCon is scheduled for Saturday April 30th. Exact location is still be finalized. <a href="https://www.eventbrite.com/e/hak4kidz-mke-2022-tickets-253765578677" target="_blank">Ticket sales</a> will open up at the end of January.</li><li style="line-height: normal; margin-bottom: 0.5em; text-size-adjust: 100%;">the flagship Chicago event is scheduled for Saturday June 4th. Location is tentatively the new Cisco office on 433 West Van Buren Street in downtown Chicago. <a href="https://www.eventbrite.com/e/hak4kidz-2022-tickets-253814364597" target="_blank">Ticket sales</a> will open up at the end of January.</li><li style="line-height: normal; margin-bottom: 0.5em; text-size-adjust: 100%;">other in person events need to be confirmed such as at GrrCON, BloomCon, and BSides KC. Stay tuned for more details.</li><li style="line-height: normal; margin-bottom: 0.5em; text-size-adjust: 100%;">BSides Toronto has confirmed that they will most likely not be in person for 2022. </li><li style="line-height: normal; margin-bottom: 0.5em; text-size-adjust: 100%;">Heal has been working on some digital projects that will be for sale at Def Con 30 or at partner events. For example, check out the <a href="https://hak4kidz.us14.list-manage.com/track/click?u=69c5892a76325952b24760dce&id=c883d65d91&e=2e4f4485e1" rel="noopener" style="color: #007c89; text-size-adjust: 100%; word-break: break-word;" target="_blank">prototype video</a> of this phaser pin and #badgelife badge add-on!</li><li style="line-height: normal; margin-bottom: 0.5em; text-size-adjust: 100%;">our new <a href="https://hak4kidz.us14.list-manage.com/track/click?u=69c5892a76325952b24760dce&id=138c764341&e=2e4f4485e1" rel="noopener" style="color: #007c89; text-size-adjust: 100%; word-break: break-word;" target="_blank">blog site</a> has launched! You already knew that. This blog will be a resource for education and news. We are looking for technical writers so please DM <a href="https://twitter.com/hak4kidz" target="_blank">our Twitter</a> account if interested.</li><li style="line-height: normal; margin-bottom: 0.5em; text-size-adjust: 100%;">and most exciting of all, <a href="https://hak4kidz.us14.list-manage.com/track/click?u=69c5892a76325952b24760dce&id=b0c9d31a4b&e=2e4f4485e1" rel="noopener" style="color: #007c89; text-size-adjust: 100%; word-break: break-word;" target="_blank">Jeffrey Man</a> joined the Hak4Kidz Board to support our initiatives involving diversity, equity, and inclusion.</li></ul><p style="background-color: white; color: #202020; font-family: Helvetica; font-size: 16px; line-height: 24px; margin: 10px 0px; padding: 0px; text-size-adjust: 100%;">There is more going on which we are eager to share, so keep checking the Hak4Kidz website and blog for news.<br /><br />Thanks again for participating at and <a href="https://www.hak4kidz.com/sponsorship.html" target="_blank">believing</a> in Hak4Kidz. 2021 was an interesting year for everyone, so we are planning to make 2022 a much better one!<br /><br />Happy New Year,<br />The Hak4Kidz Team</p>Healhttp://www.blogger.com/profile/16998845674641892888noreply@blogger.com0tag:blogger.com,1999:blog-488793345302828632.post-80501058599450757742021-12-15T15:33:00.010-06:002021-12-15T22:45:46.523-06:00Recorded Webinar: Making Cybersecurity Fun For Kids!<p> <a href="https://blogger.googleusercontent.com/img/a/AVvXsEgiChMtRI2Ah2rWkQ1BVdnyjD-cNX7kIPMip7bnW2OmxKOMhpEvpnMzjkI0OHb_4FEH1y5ghiRk8X6owW_K6Oj99q5ase8a_5hh7qrbtIkqHoD4T8_LWwJClDBVVlwNWGsIYCHU5rBgQuBxqd0_IF2bw0hWus1WqE3Avvn-yt5J6KNdwmIMGCaf5AKAcw=s768" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="403" data-original-width="768" height="267" src="https://blogger.googleusercontent.com/img/a/AVvXsEgiChMtRI2Ah2rWkQ1BVdnyjD-cNX7kIPMip7bnW2OmxKOMhpEvpnMzjkI0OHb_4FEH1y5ghiRk8X6owW_K6Oj99q5ase8a_5hh7qrbtIkqHoD4T8_LWwJClDBVVlwNWGsIYCHU5rBgQuBxqd0_IF2bw0hWus1WqE3Avvn-yt5J6KNdwmIMGCaf5AKAcw=w511-h267" width="511" /></a></p><h2 style="text-align: left;"><span style="font-family: arial;"><span face=""Libre Franklin", "Helvetica Neue", helvetica, arial, sans-serif" style="background-color: white; box-sizing: inherit; color: #333333; font-size: 16px; font-weight: 700;">To view the recording:<br /></span></span><span style="font-family: arial;"><span face=""Libre Franklin", "Helvetica Neue", helvetica, arial, sans-serif" style="background-color: white; box-sizing: inherit; color: #333333; font-size: 16px; font-weight: 700;"><a href="https://www.crowdcast.io/e/cybertalentseries1/register" style="background-color: transparent; box-shadow: rgb(15, 15, 15) 0px -1px 0px inset; box-sizing: inherit; color: #222222; text-decoration-line: none; transition: color 80ms ease-in 0s, box-shadow 130ms ease-in-out 0s, -webkit-box-shadow 130ms ease-in-out 0s;">Developing Cyber Talent Series 1: Making Cybersecurity Fun for Kids! – Crowdcast</a></span></span></h2><p><span style="background-color: white; color: #333333; font-family: arial;">Hak4Kidz's very own Robert Wagner, Board of Directors member since 2014, was a guest speaker on the webinar <span><u>Making Cybersecurity Fun For Kids!</u></span> This is a great honor to be on a panel with the esteemed co-panelists John D. Johnson, Ph.D., Somchai Rice, Ph.D. and Kate Kuehn. </span></p><p><span style="font-family: arial;"><span style="background-color: white; color: #333333;">When asked about providing advice to reduce the InfoSec employment gap, </span><span style="background-color: white; color: #333333;">Wagner responded</span><span style="background-color: white; color: #333333;"> "Making InfoSec fun is a great strategy for encouraging the next generation of InfoSec practitioners." Which is great advice for every age. Wagner continued with additional advice, "Hear what security leaders are doing today to make this possible."</span></span></p><p><span face=""Libre Franklin", "Helvetica Neue", helvetica, arial, sans-serif" style="background-color: white; color: #333333; font-family: arial; font-size: 16px;">From the D</span><span face="Libre Franklin, Helvetica Neue, helvetica, arial, sans-serif" style="color: #333333; font-family: arial;">ocent Institute's website, "</span><span face=""Libre Franklin", "Helvetica Neue", helvetica, arial, sans-serif" style="background-color: white; color: #333333; font-family: arial; font-size: 16px;">This interactive webinar is designed for educators and professionals who want to learn from cybersecurity professionals who have developed engaging STEM events to get kids excited about cybersecurity as a possible career. The panelists will share examples of successful events and activities that they have led with K-12 students for over a decade, many of which you can duplicate in your own community.</span></p><p style="background-color: white; box-sizing: inherit; color: #333333; font-size: 16px; margin: 0px 0px 1.5em; padding: 0px;"><span style="font-family: arial;">Students often have no idea or misconceptions about careers in the cybersecurity field. By engaging with professionals and STEM educators, they learn that the field is broad and inclusive and that regardless of their background, there are opportunities to have a career that is exciting and rewarding. Through activities such as coding, cryptography, electronics, lock picking, and competitions, students have fun and learn that they can be a white hat hacker, using their skills to benefit society.</span></p><p style="background-color: white; box-sizing: inherit; color: #333333; font-size: 16px; margin: 0px 0px 1.5em; padding: 0px;"><span style="font-family: arial;">The panel includes founders and organizers from <a href="https://r00tz.org/" target="_blank">DEFCON R00tz Asylum</a>, <a href="https://corncon.net/" target="_blank">CornCon Kids</a>, and <a href="https://www.hak4kidz.com" target="_blank">Hak4Kidz</a>.</span></p><p style="background-color: white; box-sizing: inherit; color: #333333; font-size: 16px; margin: 0px 0px 1.5em; padding: 0px;"><span style="font-family: arial;">Panelists:<br /></span><a href="https://linkedin.com/in/nullsession/" rel="" style="color: #333333; font-family: arial;" target="_blank">Dr. John D. Johnson</a><span style="font-family: arial;">, Founder/President, Docent Institute (CornCon Kids, DEFCON R00tz Asylum)</span></p><p style="background-color: white; box-sizing: inherit; color: #333333; font-size: 16px; margin: 0px 0px 1.5em; padding: 0px;"><a href="https://www.linkedin.com/in/somchairice/" rel="nofollow" style="font-family: arial;" target="_blank">Dr. Somchai Rice</a><span style="font-family: arial;">, Co-Founder/CISO, MedBlox (CornCon Kids)</span></p><p style="background-color: white; box-sizing: inherit; color: #333333; font-size: 16px; margin: 0px 0px 1.5em; padding: 0px;"><a href="https://www.linkedin.com/in/robertwagner2/" rel="nofollow" style="font-family: arial;" target="_blank">Robert Wagner</a><span style="font-family: arial;">, Security Executive Advisor, Splunk (Hak4Kidz)</span></p><p style="background-color: white; box-sizing: inherit; color: #333333; font-size: 16px; margin: 0px 0px 1.5em; padding: 0px;"><span style="font-family: arial;">This webinar series is organized by vArmour and hosted by Docent Institute. Docent is a tax-deductible educational non-profit. Donations are used to host educational events, professional development, public outreach and for educational scholarships. Learn more about our mission at </span><a href="http://www.docentinstitute.org/" style="background-color: transparent; box-shadow: rgb(15, 15, 15) 0px -1px 0px inset; box-sizing: inherit; color: #222222; font-family: arial; text-decoration-line: none; transition: color 80ms ease-in 0s, box-shadow 130ms ease-in-out 0s, -webkit-box-shadow 130ms ease-in-out 0s;">www.docentinstitute.org</a><span style="font-family: arial;">."</span></p><div><br /></div>Healhttp://www.blogger.com/profile/16998845674641892888noreply@blogger.com0tag:blogger.com,1999:blog-488793345302828632.post-60921853985194063112021-12-06T19:07:00.004-06:002021-12-15T00:14:49.429-06:00Internet Protocols: The Basics of IPv4 <div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEjKdp7hyoF_Lm1Wh6gunK0MpoJMcfRJXcjDzsxsx8egZvk319GeqggGAtDxmpMzs6PFBHW31aZ0Ssl5d8aZL0lucAqsKjdjvCKev5QncecK0AGUqcLXb0TT26gOqFFyOz1irqGk7Dm4T4Hn-hi3lpF52_cEiZUl4ytp7r7_q2nJpsrbaeIxpkB9fulUxw=s481" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="340" data-original-width="481" height="316" src="https://blogger.googleusercontent.com/img/a/AVvXsEjKdp7hyoF_Lm1Wh6gunK0MpoJMcfRJXcjDzsxsx8egZvk319GeqggGAtDxmpMzs6PFBHW31aZ0Ssl5d8aZL0lucAqsKjdjvCKev5QncecK0AGUqcLXb0TT26gOqFFyOz1irqGk7Dm4T4Hn-hi3lpF52_cEiZUl4ytp7r7_q2nJpsrbaeIxpkB9fulUxw=w447-h316" width="447" /></a></div><p>We all know that in order to communicate, a unique address is required. We all get mail, either in the post using a street address, or online, with an email address. </p><p>In both cases, a unique set of information is given, and as there is only one email address at <span style="font-family: courier;">JoeShmoe445@hotmail.com</span>, there's only one 42 Wallaby Way, Sydney, <a href="https://www.google.com/maps/place/42+Rock+Wallaby+Way,+Blaxland+NSW+2774,+Australia/@-33.7550958,150.6002273,17z/data=!3m1!4b1!4m5!3m4!1s0x6b12883f97111b4b:0x72042424009f2705!8m2!3d-33.7550958!4d150.602416?hl=en" target="_blank">sorta</a>. In order for a computer to be able to use the Internet, they need to have a unique address too.</p><p>In the year <b>1980</b>, IPv4, or <a href="https://en.wikipedia.org/wiki/Internet_Protocol" target="_blank">Internet Protocol</a> version 4 was developed to make communication easier on <a href="https://en.wikipedia.org/wiki/ARPANET" target="_blank">ARPANET</a>, the precursor to our modern-day internet. It was a set of four octets- four sets of eight bits, 1's and 0's in binary, which can then be converted into the decimal number system we humans use. </p><p>Converting binary to decimal is simple, as each octet can only contain up to 256 bits of information. This means that IP addresses in decimal are between <span style="font-family: courier;">0.0.0.0 - 256.256.256.256</span>. </p><p>For example, an IP address in binary would look like <span style="font-family: courier;">11000000.10101000.00001110.01110011</span>, while the same IP in decimal would be <span style="font-family: courier;">192.168.14.115</span>. If you actually count each possible address, its exactly 4,294,967,296. </p><p>That's a really big number! </p><p>Unfortunately, many of those addresses are reserved for special reasons, like <span style="font-family: courier;">10.0.0.0</span>, which is used by your own local computer network. But wait, why would you need to use a local network, where there should be plenty of unused addresses for each computer? </p><p>Find out in part two, where we will be delving into subnetting and the five classes of IPv4 addresses!</p><blockquote style="border: none; margin: 0px 0px 0px 40px; padding: 0px;"><div><br /></div></blockquote><p><span> </span></p>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-488793345302828632.post-71752973331273522082021-11-13T00:44:00.002-06:002021-11-13T00:49:58.821-06:00Genesis of Hak4Kidz Blog<p></p><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/a/AVvXsEhdc8i90kI6a8McsveHu7iWEYzR9h7SL-OHuEbl8s_Ywetnr1eHzJxaLEIMnUB3bV0vnWSqA-WSA7EipW8_pE7ZhLstJeqzP88bvmwHJ7lELEVMyEw0-ITeANDmGUGZeWH6SA7Q6iAaR9_jV7V8iwMKfRJgerU11ym8NEB0EJSsQ4DxtzsTB1Gg1e8FkA=s800" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="400" data-original-width="800" height="225" src="https://blogger.googleusercontent.com/img/a/AVvXsEhdc8i90kI6a8McsveHu7iWEYzR9h7SL-OHuEbl8s_Ywetnr1eHzJxaLEIMnUB3bV0vnWSqA-WSA7EipW8_pE7ZhLstJeqzP88bvmwHJ7lELEVMyEw0-ITeANDmGUGZeWH6SA7Q6iAaR9_jV7V8iwMKfRJgerU11ym8NEB0EJSsQ4DxtzsTB1Gg1e8FkA=w450-h225" width="450" /></a></div><b><br />Why? </b><p></p><p>Hak4Kidz has been thinking about, talking about, attempted to create, and collaborated with others on starting a quality blog site for adults and Hak4Kidz Tyros. Tyro is defined as someone who is learning or a novice. All attempts have been with great intention but failed to launch, until now.</p><p>Our goal is to provide InfoSec and CyberSec educational material for various audiences to consume, but with a primary focus on reiterating or expanding upon activities and workshops are run at our events. We have also discussed entertaining hacker stories. Stories which could be fiction based upon reality or pure fiction. There will also be articles explaining some of our creations in detail. The possibilities have no bounds but will always have our Tyros benefit in the forefront.</p><p>Please keep in mind that there is no sudden abundance of time or writers. The opposite is true. You can see who our contributors are quite easily on the sidebar to your right, there aren't that many at the time this article was written. Time? All I can say is the timing just feels right.</p><p>We hope you enjoy what we are offering or can share the content with someone you believe will. We strive to help our Tyros to learn about tech while having fun.</p><p>Stay healthy everyone and be better!</p>Healhttp://www.blogger.com/profile/16998845674641892888noreply@blogger.com0