{"id":419,"date":"2016-04-18T09:21:53","date_gmt":"2016-04-18T16:21:53","guid":{"rendered":"http:\/\/dshsolutions.com\/wordpress\/?p=419"},"modified":"2016-04-18T09:21:53","modified_gmt":"2016-04-18T16:21:53","slug":"dns-hijacking-introduction-cybrary","status":"publish","type":"post","link":"https:\/\/dshsolutions.com\/wordpress\/dns-hijacking-introduction-cybrary\/","title":{"rendered":"DNS HiJacking ( Introduction ) &#8211; Cybrary"},"content":{"rendered":"<h1>An introduction to DNS HiJacking<\/h1>\n<p>What is DNS and how does hijacking work? What are the dangers of DNS hijacking? How can you prevent or recover from hijacking or being hijacked? Well, read on!<\/p>\n<blockquote><p>Hello Readers\u2026 DNS hijacking (sometimes referred to as DNS redirection) is a type of malicious attack that overrides a computer\u2019s TCP\/IP settings to point it at a rogue DNS server, thereby invalidating the default DNS settings. In other words, when an attacker takes control of a computer \u2026<\/p><\/blockquote>\n<p>Source: <em><a href=\"\/\/www.cybrary.it\/0p3n\/dns-hijacking-introduction\/\">DNS HiJacking ( Introduction ) &#8211; Cybrary<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An introduction to DNS HiJacking What is DNS and how does hijacking work? What are the dangers of DNS hijacking? How can you prevent or recover from hijacking or being hijacked? Well, read on! Hello Readers\u2026 DNS hijacking (sometimes referred to as DNS redirection) is a type of malicious attack that overrides a computer\u2019s TCP\/IP [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,5],"tags":[],"class_list":["post-419","post","type-post","status-publish","format-standard","hentry","category-general-and-non-specific-topics","category-security-2"],"_links":{"self":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/comments?post=419"}],"version-history":[{"count":0,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/419\/revisions"}],"wp:attachment":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/media?parent=419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/categories?post=419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/tags?post=419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}