Cyber Security Lab Record
Cyber Security Lab Record
Click OK to save.
With these settings enabled, you can now transfer files via Bluetooth from other devices. This
process will differ, depending on the type of device you’re using.
7. What is malware? Write the steps to remove the malware from your PC.
Malware, short for malicious software, is any type of software designed to
harm or exploit a computer system, network, or device. Malware can
come in many forms, including viruses, trojans, spyware, ransomware,
and adware.
8. What are the various types of vulnerabilities for hacking the web
applications.
There are various types of vulnerabilities that can be exploited by hackers
to compromise web applications. Here are some of the most common
types of web application vulnerabilities:
9.Write the steps for sharing files and printer remotely between two systems
1. Connect both computers to the same network: The first step is to
ensure that both computers are connected to the same network,
either through Ethernet cables or wirelessly.
2. Enable file and printer sharing: On the computer that you want to
share files or printers from, navigate to the Network and Sharing
Center in the Control Panel and select "Change advanced sharing
settings". Turn on file and printer sharing and make sure that
network discovery is enabled.
3. Share the printer: On the computer that has the printer connected,
navigate to the printer properties and select the "Sharing" tab.
Check the box to share the printer and give it a name.
4. Share the files: Select the files or folders that you want to share and
right-click on them. Choose "Properties" and select the "Sharing"
tab. Click "Share" and choose the user or group that you want to
share the files with.
5. Access the shared printer or files: On the remote computer,
navigate to the Network and Sharing Center and select "View
computers and devices". Double-click on the computer that has the
shared printer or files and enter the username and password if
prompted. You should now be able to access the shared printer or
files.
10. Create a presentation on “Ethical hacking” atleast 10 slides.
12. Write the steps to detect the number of devices connected to WiFi and
block un authorized devices.
1. Access your router's settings: In order to detect and block devices
on your WiFi network, you need to access your router's settings. To
do this, open a web browser and enter your router's IP address into
the address bar. This can typically be found on the bottom of your
router or in the manual.
2. Log in to your router: Enter your router's username and password to
log in to the router settings page. If you have not changed the
default login credentials, these can typically be found in the manual.
3. Check connected devices: Look for a section in the router settings
that displays the devices currently connected to your WiFi network.
This may be called "Connected Devices," "Device List," or something
similar.
4. Block unauthorized devices: If you see any devices that you don't
recognize or don't want on your network, you can typically block
them from the router settings page. Look for an option to block or
disconnect devices, and follow the prompts to block the
unauthorized device.
5. Set up MAC filtering: Another way to block unauthorized devices is
to set up MAC filtering. Each device has a unique MAC address that
can be used to restrict access to your WiFi network. In the router
settings, look for an option to set up MAC filtering and add the MAC
addresses of the devices that you want to allow or block.
6. Save your changes: Once you have made any changes to your
router settings, be sure to save your changes before exiting the
settings page.