{"id":4691,"date":"2021-04-15T13:46:32","date_gmt":"2021-04-15T13:46:32","guid":{"rendered":"http:\/\/www.limbtec.com\/newsite\/?page_id=4691"},"modified":"2023-10-11T07:25:34","modified_gmt":"2023-10-11T07:25:34","slug":"hacking-videos","status":"publish","type":"page","link":"https:\/\/www.limbtec.com\/newsite\/hacking-videos\/","title":{"rendered":"Hacking Video&#8217;s"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]We&#8217;ve been working with an ethical hacker to enable us to have these 3 video&#8217;s produced.\u00a0 They each explore a different type of hack, and enable you to see what happens not only on your screen, but also what the hacker is doing in the background.<\/p>\n<p>If you have any questions about this please either call 01752 546967, or email info@limbtec.com[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2>Email Ransomware Attack<\/h2>\n<p>In this video we explorer what happens during a crypto lock style attack.\u00a0 This is a relatively common attack, and can be utterly devastating to your business.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2>Man in the middle attack<\/h2>\n<p>In this video we see what happens in another common attack.\u00a0 This time the attacker is after your password by tricking you into entering it in to a portal.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2>Eternal Blue<\/h2>\n<p>In this hack, a missing security patch enables the hacker to gain access to your login usernames and passwords.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_raw_html]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[\/vc_raw_html][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h3>What to do?<\/h3>\n<p>These examples show you how easy it can be to attack your computer systems.\u00a0 This is why it is important to make sure you keep your computers up to date with the security patches.\u00a0 The examples that start from an email are also a good indication of what to look for, unfortunately to many people will just click on the links regardless, specially if they are being rushed.<\/p>\n<p>Please remember to make sure you also have\u00a0 a good base line of security software installed, and back up your files.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]We&#8217;ve been working with an ethical hacker to enable us to have these 3 video&#8217;s produced.\u00a0 They each explore a different type of hack, and&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4691","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Hacking Video&#039;s - Limbtec Limited<\/title>\n<meta name=\"description\" content=\"On this page we give you the opportunity to see what happens if someone is successful in hacking your computer systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.limbtec.com\/newsite\/hacking-videos\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking Video&#039;s\" \/>\n<meta property=\"og:description\" content=\"We&#039;ve been working with an ethical hacker to enable us to have these 3 video&#039;s produced.\u00a0 They each explore a different type of hack, and enable you to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.limbtec.com\/newsite\/hacking-videos\/\" \/>\n<meta property=\"og:site_name\" content=\"Limbtec Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Limbtec\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-11T07:25:34+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@limbtec\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.limbtec.com\/newsite\/hacking-videos\/\",\"url\":\"https:\/\/www.limbtec.com\/newsite\/hacking-videos\/\",\"name\":\"Hacking Video's - Limbtec Limited\",\"isPartOf\":{\"@id\":\"https:\/\/www.limbtec.com\/newsite\/#website\"},\"datePublished\":\"2021-04-15T13:46:32+00:00\",\"dateModified\":\"2023-10-11T07:25:34+00:00\",\"description\":\"On this page we give you the opportunity to see what happens if someone is successful in hacking your computer systems.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.limbtec.com\/newsite\/hacking-videos\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.limbtec.com\/newsite\/hacking-videos\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.limbtec.com\/newsite\/hacking-videos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.limbtec.com\/newsite\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacking Video&#8217;s\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.limbtec.com\/newsite\/#website\",\"url\":\"https:\/\/www.limbtec.com\/newsite\/\",\"name\":\"Limbtec Limited\",\"description\":\"First Class IT Support and Services\",\"publisher\":{\"@id\":\"https:\/\/www.limbtec.com\/newsite\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.limbtec.com\/newsite\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.limbtec.com\/newsite\/#organization\",\"name\":\"Limbtec Limited\",\"alternateName\":\"Limbtec\",\"url\":\"https:\/\/www.limbtec.com\/newsite\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.limbtec.com\/newsite\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/www.limbtec.com\/newsite\/wp-content\/uploads\/2018\/04\/limlogo.jpg\",\"contentUrl\":\"http:\/\/www.limbtec.com\/newsite\/wp-content\/uploads\/2018\/04\/limlogo.jpg\",\"width\":195,\"height\":65,\"caption\":\"Limbtec Limited\"},\"image\":{\"@id\":\"https:\/\/www.limbtec.com\/newsite\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Limbtec\/\",\"https:\/\/x.com\/limbtec\",\"https:\/\/www.instagram.com\/limbtec\/\",\"https:\/\/www.linkedin.com\/company\/limbtec\/\",\"https:\/\/www.pinterest.co.uk\/limbtec\/\",\"https:\/\/www.youtube.com\/user\/limbtec\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hacking Video's - Limbtec Limited","description":"On this page we give you the opportunity to see what happens if someone is successful in hacking your computer systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.limbtec.com\/newsite\/hacking-videos\/","og_locale":"en_GB","og_type":"article","og_title":"Hacking Video's","og_description":"We've been working with an ethical hacker to enable us to have these 3 video's produced.\u00a0 They each explore a different type of hack, and enable you to","og_url":"https:\/\/www.limbtec.com\/newsite\/hacking-videos\/","og_site_name":"Limbtec Limited","article_publisher":"https:\/\/www.facebook.com\/Limbtec\/","article_modified_time":"2023-10-11T07:25:34+00:00","twitter_card":"summary_large_image","twitter_site":"@limbtec","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.limbtec.com\/newsite\/hacking-videos\/","url":"https:\/\/www.limbtec.com\/newsite\/hacking-videos\/","name":"Hacking Video's - Limbtec Limited","isPartOf":{"@id":"https:\/\/www.limbtec.com\/newsite\/#website"},"datePublished":"2021-04-15T13:46:32+00:00","dateModified":"2023-10-11T07:25:34+00:00","description":"On this page we give you the opportunity to see what happens if someone is successful in hacking your computer systems.","breadcrumb":{"@id":"https:\/\/www.limbtec.com\/newsite\/hacking-videos\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.limbtec.com\/newsite\/hacking-videos\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.limbtec.com\/newsite\/hacking-videos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.limbtec.com\/newsite\/"},{"@type":"ListItem","position":2,"name":"Hacking Video&#8217;s"}]},{"@type":"WebSite","@id":"https:\/\/www.limbtec.com\/newsite\/#website","url":"https:\/\/www.limbtec.com\/newsite\/","name":"Limbtec Limited","description":"First Class IT Support and Services","publisher":{"@id":"https:\/\/www.limbtec.com\/newsite\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.limbtec.com\/newsite\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.limbtec.com\/newsite\/#organization","name":"Limbtec Limited","alternateName":"Limbtec","url":"https:\/\/www.limbtec.com\/newsite\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.limbtec.com\/newsite\/#\/schema\/logo\/image\/","url":"http:\/\/www.limbtec.com\/newsite\/wp-content\/uploads\/2018\/04\/limlogo.jpg","contentUrl":"http:\/\/www.limbtec.com\/newsite\/wp-content\/uploads\/2018\/04\/limlogo.jpg","width":195,"height":65,"caption":"Limbtec Limited"},"image":{"@id":"https:\/\/www.limbtec.com\/newsite\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Limbtec\/","https:\/\/x.com\/limbtec","https:\/\/www.instagram.com\/limbtec\/","https:\/\/www.linkedin.com\/company\/limbtec\/","https:\/\/www.pinterest.co.uk\/limbtec\/","https:\/\/www.youtube.com\/user\/limbtec"]}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.limbtec.com\/newsite\/wp-json\/wp\/v2\/pages\/4691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.limbtec.com\/newsite\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.limbtec.com\/newsite\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.limbtec.com\/newsite\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.limbtec.com\/newsite\/wp-json\/wp\/v2\/comments?post=4691"}],"version-history":[{"count":0,"href":"https:\/\/www.limbtec.com\/newsite\/wp-json\/wp\/v2\/pages\/4691\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.limbtec.com\/newsite\/wp-json\/wp\/v2\/media?parent=4691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}