Skip to main content

Featured Question

iPhone SE 4: How Apple’s Next Budget Phone Will Borrow iPhone 14’s Powerful Battery

Apple iPhone SE 4 is a smartphone that may come out in March 2024. It will look like the iPhone 14. The iPhone SE 4th Generation will also have the same battery as the iPhone 14. This battery has a model code of A2863 and can store 3,279mAh of power. This is what some sources have seen in the iPhone SE 4 prototypes. A prototype is a test version of … The post iPhone SE 4: How Apple’s Next Budget Phone Will Borrow iPhone 14’s Powerful Battery first appeared on XiaomiToday . The post iPhone SE 4: How Apple’s Next Budget Phone Will Borrow iPhone 14’s Powerful Battery appeared first on XiaomiToday .

DDoS, or zombie computers are attacking. How to defend against them?

The Internet of Things is growing in strength, and with it the danger of turning thousands of cameras or refrigerators into huge botnets, cutting off access to key services. Fortunately, you can defend against DDoS attacks.

What do we usually associate with the hacker attack? The criminal breaks into critical infrastructure, steals sensitive data from it and sells on the black market. In this way, 400 GB of data from UN servers was stolen in February. Our NBP has also recently been the victim of a hacker attack. Fortunately, the burglars did it only for entertainment and did not exchange any data.

However, there are other types of attacks when the goal is to disable a service. These are DDoS (Distributed Denial of Service) attacks.

DoS, or an access denied attack.

The Distributed Add- on has only become more important in the last two decades when the internet has become a common medium. Previously, hackers usually limited themselves to one device sending queries.

The first attack of this type took place over 40 years ago , when a 13-year-old student decided to play a trick on PLATO (Programmed Logic for Automatic Teaching Operations) system users. He used the external command to do this, which allowed communication with other devices connected to the educational terminals.

However, if no device was connected to it, then the terminal hung up. Thus, the teenager developed a script that sent a command to all devices in the computer room, effectively denying access. It only helped restart, and later disable the unlucky command. However, the culprit himself was not targeted at that time. A perfect crime!

In more modern times, a similar patent could be used for online forums. These crashed after receiving too many queries. The effect was also to disconnect ordinary users who were browsing their favorite threads.

DDoS, i.e. we join forces.

As the number of devices connected to the network increased, new models of attacks began to appear - this time from many places simultaneously. That's how the first letter was co-opted into the acronym.

One of the first attacks of this type took place in 1999 on the University of Minnesota computer network. It fell victim to an attack of 114 computers controlled by the Trin00 script. The result was an army of zombie devices that obeyed the cybercriminal's orders. He first communicated with the Masters line of computers to then watch the commands being passed to the Deamons line. It was here that the university network was flooded with data packets. Interestingly, users of hijacked computers may not even know that their machines are part of a botnet, conducted by a hacker.

Today, virtually every access denied attack is a DDoS attack. In this way, the Anonymous group attacked websites of Polish parliamentary and government institutions after signing the ACTA agreement in 2012. DDoS was also used to mask the attack on PlayStation servers. The purpose of hackers was to steal data from console owners, and the botnet was used as a smoke screen.

DRDoS, or DDoS on steroids.

DDoS attack strength is measured by the amount of information sent by the network of hijacked devices. They can be hundreds of gigabytes per second that no servers can handle. So you can guess that cyber criminals were looking for ways to increase the effectiveness of their attacks. So they used IP spoofing. The attacker therefore sends a query to the network nodes, which then broadcasts them throughout the domain. The query is faked in such a way that computers think that its author is not the attacker, but the victim. And that's why response packets go to a server that didn't send a query at all.

Hackers take advantage of the weaknesses of DNS , SNMP and NTP . In the case of the former, the answer is 8 times greater than the query, but for the NTP protocol the difference is even 200 times. All this means that the servers under attack are put to a huge test.

More devices connected = greater risk.

The Internet of Things is slowly becoming a reality. We connect TVs, refrigerators, washing machines, cameras, parking meters, bus shelters or even litter bins. All of them can potentially be included in the botnet. If the security of the devices that surround us on a daily basis is insufficient, then the situation of 2016 may repeat, when a botnet consisting of 25,000 webcams was discovered . In October this year, he broke access to the network in a large area of ​​the US east coast .

The IoT revolution is progressing before our eyes, but at the same time we must be prepared to face cybercriminals who want to use them for their own good. So how do you protect yourself against DDoS attacks?

TAMA of Polish Exatel.

Exatel is a Polish company that has been providing secure services for operators, business and the public sector for over 20 years. Has over a thousand clients, including the Ministry of the Interior and Administration or the Ministry of National Defense, as well as banks, energy companies, large international corporations and other operators.

In addition to telecommunications services, he also deals with cyber security. Her main weapon to fight DDoS attacks is TAMA - a proprietary solution built in 2019. It's a service that literally damages the queries generated by the attackers. The tool analyzes traffic continuously. If it detects an unusual event and classifies it as harmful, it will take action. It filters traffic in such a way that only secure queries reach the client's network.

In this way, companies can protect themselves against the unwanted consequences of attacks. We can imagine how severe the cutting off of the banking platform can be - not only for the institution's finances, but also for its image.

* The partner of the article is Exatel.

DDoS, or zombie computers are attacking. How to defend against them?


Popular Questions This Week

What is VoLTE and how can you activate it on your Xiaomi

In recent years, phone calls have evolved to achieve great sound quality. So much so that today we can find technologies such as VoLTE allowing us to make voice calls in high definition on our Xiaomi. Beyond the classic GSM networks, movistar, vodafone and other operators have integrated this technology, which in turn derives from the advantages of Internet access. Thanks to 4G or LTE networks, VoLTE allows us to make not only high-definition calls, but also to improve consumption and add other services . What is VoLTE and what are its advantages after activating it on a Xiaomi In detail, VoLTE is a technology capable of transmitting voice communications over the Internet . For this, whether we have a Redmi Note 8 Pro, a Xiaomi Mi A2 or any other smartphone from the firm, our voice will be encoded from analog to digital allowing its transmission in the form of packets through the network. With this, as we have already said, after activating VoLTE we will achieve higher sou

So you can check the battery status of your Xiaomi smartphone and how many cycles you have performed

Today, our smartphone has become one of the most important tools in our day to day. That is why the duration of its battery and the state of it is very important if we want to be able to use it with total peace of mind and in a continuous way. In view of this, MIUI includes a secret menu that allows us to verify the state or health of the battery of our Xiaomi smartphone and also check the cycles that we have performed . Let's not forget that each cycle represents a full battery charge from 0% to 100% Since lithium batteries degrade with the passage of time , use and recharges that we have made, knowing these two data will give us a vision of the general state of your state and with it knowing if it has worsened considerably with the passage of weather. How to check the battery status and cycles performed on our Xiaomi smartphone To access this hidden menu in MIUI and check the battery status of our Xiaomi smartphone we will only have to perform the following steps:

How to exit the FASTBOOT mode of your Xiaomi if you have entered accidentally

Although, the fastboot mode of Xiaomi phones with MIUI allows us to solve bugs or change ROMs, it is also common to enter without wanting to. If this has been your case, you most likely want to get out of Xiaomi's fastboot without spoiling anything. In general, leaving this mode that includes all Xiaomi, Redmi and POCO with MIUI is extremely simple. Even so, on certain occasions, exiting fastboot mode is more complex , either because Recovery starts or because our smartphone does not work correctly. In view of this, below we are going to explain how to exit the fastbook mode of your Xiaomi if you have entered without wanting to . In addition, if the conventional mode does not work, we will also give you other tips to exit this mode without causing any damage at the software level. How to exit Xiaomi fastboot If we have accidentally entered the Xiaomi fastboot , to exit this way we will only have to perform the following steps: Press and hold the power button for about 10

How to activate the second space if your Xiaomi does not have this option

MIUI's Second Space functionality allows us to have two smartphones in one. A way to divide our Xiaomi into two different accounts , either for personal and work use, to perform tests or simply, to prevent our son or little brother from accessing our applications and documents. Unfortunately, terminals like the Redmi Note 10 lack this functionality . The same happens with other terminals of Xiaomi, Redmi and POCO of mid-range and entry. If we access the Settings, this functionality is not found among the various MIUI options . Even so, there is a little trick that allows us to access the Second Space functionality even if your Xiaomi does not have it . In this way we can create a second space without any type of restriction and in any Xiaomi, Redmi or POCO. Activate the second space on your Xiaomi If your Xiaomi, Redmi or POCO does not have the Second space functionality when accessing Settings> Special functions , do not worry, below we will explain how to use it with

What is the Safe Mode of your Xiaomi, what is it for and how can you activate it

In addition to the typical options that we find in the MIUI settings, Xiaomi also adds a mode called " Safe Mode " or " Safe Mode " to its smartphones. We will talk about this below, explaining its usefulness and how to activate or deactivate it on your Xiaomi, Redmi or POCO. Safe Mode allows us to start a special boot, loading only the system itself and the applications that were installed on our Xiaomi when we bought it. That is, starting the Safe Mode or Safe Mode our smartphone will start loading only the essential applications . This mode is a temporary state of our smartphone and does not make any important modification on the device. In itself, Safe Mode does not delete our data , it just starts our Xiaomi, loading the basics and essentials for its operation. Safe Mode only starts essential MIUI applications. Thanks to this, the Safe Mode will help us to rule out failures in our Xiaomi derived from the installation of an application or the modific

Does your Xiaomi charge slowly or intermittently? So you can fix it

Does your Xiaomi charge very slowly or intermittently? This error is usually very common when our cable is in poor condition, we use a low-quality charger or even when the USB or USB Type-C port of your Xiaomi is dirty or obstructed. With a view to this, below we will explain the main steps or solutions to take if your Xiaomi charges slowly , if the charge is intermittent or if in the worst case, your mobile does not detect the USB that is connected to the socket electric. 1. Clean the USB port Although it may sound simple, in most cases slow charging problems are usually caused by a piece of paper or a speck of dust that obstructs the pins of the USB port . Taking into account the nature of this connector, it is normal that after repeated use dirt accumulates inside. A dirty USB C port is usually the main cause of slow or intermittent charging. To solve this charging problem and clean the USB C port of your Xiaomi, it is recommended to blow lightly inside the port itself.

If your Xiaomi disconnects only from the WiFi it may be because of that MIUI setting

One of the most common problems in Xiaomi smartphones is usually related to the WiFi connection and its automatic disconnection . A quite annoying problem, which in most cases is usually caused by a bad MIUI configuration . If you have a Xiaomi, Redmi or POCO and you notice that sometimes your smartphone disconnects only from the WiFi without having taken any action, do not miss this article where we tell you how to solve it in most cases. Disconnection of WiFi on your Xiaomi, how to solve it Although it is true that the problem may be caused by some other failure, in most cases the spontaneous disconnection of the WiFi connection is caused by a bad MIUI configuration, specifically, its automatic connection to the networks with better signal . By having this option activated on our smartphone, if the WiFi signal drops at any time, it will automatically disconnect to use the data connection . To deactivate it enough to do the following steps: Go to Settings> WiFi> Wi-Fi

So you can activate the double tap on MIUI to wake up or turn on the screen of your Xiaomi

Among all the functionalities that we can find in MIUI, today we want to talk about the double tap on the screen . This functionality allows us after activation to wake up the screen of our Xiaomi with a double click on it. This will avoid having to press the power button or having to position our finger on the fingerprint recognition area. An extremely useful utility, which can also be used in case the power button stops working. In this way, the functionality " Double tap on the screen to wake up " will allow us to turn on or off the screen of our mobile in a quick and simple way by just doing a double tap on your XIaomi.i How to activate the double tap to wake up the screen of a Xiaomi mobile To activate the double tap functionality on the screen of your Xiaomi we only have to make the following settings: Go to Settings> Lock screen Activate Double tap on screen to wake up After its activation we will only have to double-click on the off screen of our X

Problems with Android Auto and your Xiaomi? So you can fix it

Unfortunately Android Auto continues to present certain problems on some Xiaomi . Errors such as error 16 that prevent our smartphone from correctly linking to this Google vehicle system. Still, these bugs are largely solvable. And it is that, in most cases the impossibility of using Android Auto through our Xiaomi is given by the dual applications themselves. In view of this and taking as a source this interesting article from Mi Community , below we will explain how to solve two of the most common errors that we usually find when linking or connecting our Xiaomi to a car with Android Auto. Fix Android Auto error on Xiaomi devices One of the main errors of the type « An error has occurred » that we usually find when connecting Android Auto to our Xiaomi is related to Google Play Services . In itself, this error shows the message « It seems that Google Play Services does not work at the moment «, making it impossible to connect Android Auto to our Xiaomi. To solve it we j

How to hide the content of notifications on the lock screen of your Xiaomi

Receiving a notification on our Xiaomi and viewing it without further ado from the lock screen is very comfortable. Still, prying eyes could read this information , details that in many cases we would not like to know and that put our privacy at risk . In addition, if we forget our smartphones or it is stolen, anyone could have access to the information contained in new messages . Let's not forget that many services make use of SMS to send the access code, not to say that the same happens with some online payment methods. That is why hiding the messages of the notifications on the lock screen of our Xiaomi becomes one of the most important recommendations in order to protect our private information and thus improve our own privacy. How to hide notifications from the lock screen of a Xiaomi If we want to continue receiving notifications but their information is hidden from the lock screen, MIUI has the setting we are looking for. For this, we will only have to carry out th