The ping command when used in command prompt is typically used to test the connectivity between two devices. However, it can also be used in conjunction with other commands to perform network attacks such as a “ping flood” attack. This is done by changing the initial line of code from “ping www.google.com” to something like “ping –l 56 –t www.google.com” where –l is the amount of data sent with each packet and –t is used to continue pinging until the host times out. Computers are prone to phishing scams because they are disguised very well which tricks victims into opening the link or attached file. These scams are designed to gather sensitive information from the user such as, bank account information, account logins, credit card numbers, social security numbers, and much more. Once the hackers have the victim’s personal information, they work quickly to obtain as much information or resources as possible before being detected. One way users can prevent this type of scam is
This blog was created as a way to document my journey into the world of technology and cybersecurity.