{"id":4013,"date":"2021-10-08T12:14:25","date_gmt":"2021-10-08T11:14:25","guid":{"rendered":"https:\/\/unihost.com\/blog\/?p=4013"},"modified":"2026-01-09T13:05:42","modified_gmt":"2026-01-09T11:05:42","slug":"how-to-defend-yourself-from-hackers","status":"publish","type":"post","link":"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/","title":{"rendered":"How to defend yourself from hackers in public"},"content":{"rendered":"<p class=\"head-text\">Most people think that hackers are neckbeards that sit in a dark cellar and try to break into Pentagon. But in reality, anyone can be a hacker. Any teen can download a suit of scripts from some forum and try to get an access to someone else\u2019s information.<\/p>\n<p><span style=\"font-weight: 400;\">And there are no cellars involved either. Hackers usually prey in cafes, in hostels, on buses or planes \u2014 anywhere, where there\u2019s an open WiFi hotspot and people that are constantly using it. So let\u2019s figure out how hackers actually operate and how you can protect against their attacks.<\/span><\/p>\n<p><b>IMPORTANT. <\/b><span style=\"font-weight: 400;\">All attacks described here are illegal and actively prosecuted.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Sniffing<\/span><\/h2>\n<p><a href=\"https:\/\/unihost.com\/blog\/minio.php?2017\/06\/20045113082_bea315772f_b-v2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1727 size-full\" src=\"https:\/\/unihost.com\/blog\/minio.php?2017\/06\/20045113082_bea315772f_b-v2.jpg\" alt=\"Sniffing\" width=\"1024\" height=\"682\" \/ title=\"How to defend yourself from hackers in public - Image 1\"><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Timmy has a laptop, some leisure time and a desire to do something with it. So he goes to the nearest cafe, turns his laptop on, connects to the open WiFi spot and waits till something happens. For example, until Michael \u2014 another visitor of the cafe \u2014 logs into his blog.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At that moment, the server that hosts the blog sends a cookie file on Michael\u2019s laptop. It is needed to identify Michael\u2019s browser and stop demanding his password on every page. But since the WiFi is open, Timmy\u2019s laptop intercepts the cookie file and copies it. Later, hacker will be able to access the website without a password, since it will think that the cookie is till used by Michael.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That is called <\/span><i><span style=\"font-weight: 400;\">sniffing, <\/span><\/i><span style=\"font-weight: 400;\">since Timmy\u2019s laptop sniffs the cookie files out of the other traffic.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Man in the middle<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Timmy still has his laptop and leisure time, but there\u2019s no open WiFi spots around. But Timmy has a 3G-modem with a WiFi router. So he goes to the cafe with a secure WiFi hotspot and transforms his laptop into another hotspot, with the same name and password. Later, Michael accidentally connects to the fake hotspot. Now all his traffic is going through Timmy\u2019s laptop and he can easily find all his logins, passwords and even financial info.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That is called <\/span><i><span style=\"font-weight: 400;\">A Man in the Middle. <\/span><\/i><span style=\"font-weight: 400;\">That\u2019s the name of the third party that is a part of a transaction, but remains unknown to both the sender and the receiver. In this case, the Man in the Middle is Timmy\u2019s laptop.<\/span><\/p>\n<p>There are two ways to execute this attack.<\/p>\n<ol>\n<li><b>Passive MitM.<\/b>\u00a0In this case, the attacker simply reads all the data and transmits them to the receiver unmodified.<\/li>\n<li><strong>Active MitM<\/strong>. The data is still read and saved, but now it is also modified. For example, virus-like scripts are added to the web pages. Or the software update packages are replaced with viruses. Later, the virus will take over the infected device and the hacker will get all the information on it.<\/li>\n<\/ol>\n<h2><span style=\"font-weight: 400;\">Phishing<\/span><\/h2>\n<p><a href=\"https:\/\/unihost.com\/blog\/minio.php?2017\/06\/pexels-photo-24345-new.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1705 size-full\" src=\"https:\/\/unihost.com\/blog\/minio.php?2017\/06\/pexels-photo-24345-new.jpg\" alt=\"Phishing\" width=\"1200\" height=\"900\" \/ title=\"How to defend yourself from hackers in public - Image 2\"><\/a><\/p>\n<p><span style=\"font-weight: 400;\">A Man in the Middle is pretty advanced for a homegrown hacker. But if Michael\u2019s website uses HTTPS, then Timmy has no use for his traffic \u2014 it is encrypted by a 256-bit key, which Timmy will be cracking until the joint release of Half-Life 3 and Dreams of Spring. So he decides to bypass the encryption and make Michael give him the login and password directly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To do this, he creates on his laptop, which will once again act as a hotspot, a direct copy of Michael\u2019s login page. Then, he creates a redirection. Now when Michael accesses his blog, he doesn\u2019t get to his login page \u2014 he gets to the page Timmy made. There he enters his login and password, receives a message that his blog is unavailable right now due to some maintenance at the hosting, shrugs and goes off to do something else. And Timmy gets to keep the password.<\/span><\/p>\n<p>Also, if Timmy\u2019s attack is really well engineered, then the fake page will actually transmit Michael\u2019s data to the real one and send him to his intended destination. But the login and password will be stolen anyway.<\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s called phishing, due to Timmy baiting people, who do not pay attention to the URLs or hotspot names, with the fake website pages. Of course, some people will notice the wrong URL and close the tab ASAP, but some won\u2019t \u2014 and that\u2019s enough for Timmy.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Why hackers collect passwords<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">If hacker gets access to your blog or Facebook page \u2014 they will write a swear word on it. Or delete it. Or maybe even upload some banned materials to it and send a link to your local law enforcement.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If hacker accesses your financial data \u2014 it\u2019s even worse. But the exact damage done depends on the type of the attack. Sniffing rarely gets them enough data to access your bank account, but now that they know which bank you are using, they can prepare a phishing page. And with it, they will get the rest of the data and the access to your money.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Overall, the destructive potential of any given hacker is limited only by their imagination.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">How to protect against hackers<\/span><\/h2>\n<ol>\n<li><strong>Do not use public WiFi. <\/strong>If you need internet outside of your house \u2014 get a mobile plan with 3G or 4G and use your phone as a hotspot. Or even buy a portable modem with embedded WiFi in order to spare your phone\u2019s battery.<\/li>\n<li><b>Do not go to suspicious websites. <span style=\"font-weight: 400;\">If your browser warns you that the page is unreliable or unprotected \u2014 do not access it. Most likely, it\u2019s a phishing page.<a href=\"https:\/\/unihost.com\/blog\/minio.php?2017\/06\/DS_130617_776d70.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-860 size-full\" src=\"https:\/\/unihost.com\/blog\/minio.php?2017\/06\/DS_130617_776d70.png\" alt=\"A bad SSL connection page\" width=\"709\" height=\"394\" \/ title=\"How to defend yourself from hackers in public - Image 3\"><\/a><\/span><\/b><\/li>\n<li><strong>Don\u2019t forget to log off on all devices.<\/strong> Some websites offer an option to log off on all devices. This invalidates all already issued cookies and forbids hackers from using them to bypass the login screen. So if you are accessing a website from an open hotspot \u2014 don\u2019t forget to use this option.<\/li>\n<li><strong>Check whether your software updates are legit.<\/strong> <span style=\"font-weight: 400;\">A talented hacker can easily send a fake update signal to your Adobe Flash or Java plugin. But instead of a new software version, it will contain a virus that will hijack your PC. So, before you install something, check where it came from.<\/span>\n<ol>\n<li>The best option is using only the software from the official store. It\u2019s nearly impossible to send a fake update from Windows Store, App Store or Google Play.<\/li>\n<\/ol>\n<\/li>\n<li><b>Use VPN. <span style=\"font-weight: 400;\">VPN is a relay server. All connections between the VPN and your device are encrypted \u2014 including the URLs you are accessing. It\u2019s a great protection from sniffing and phishing pages. Free VPN is available in Opera browser.<\/span><\/b><\/li>\n<li>\n<p style=\"display: inline !important;\"><strong>Install an antivirus.<\/strong> <span style=\"font-weight: 400;\">If your device is powerful enough \u2014 install an antivirus software. It can even be a free Avast Suite. This will supplement Windows Defender and stop hackers from using virus attacks. Even on your phone, you must have an antivirus.<\/span><\/p>\n<\/li>\n<li>\n<p style=\"display: inline !important;\"><strong>Do not use the same password elsewhere.<\/strong> <span style=\"font-weight: 400;\">When a hacker gets access to the password, he gets access to everything protected by it. So use unique passwords for everything \u2014 this way you will be able to minimize the damage if you are ever hacked.<\/span><\/p>\n<\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Massive attacks using public WiFi are probably the most dangerous ones. They require minimal preparation and guarantee a hacker a lot of leeway. Of course, targetted attacks on someone are much more sophisticated, but at the same time they require a lot of time and skill, and are a lot more risky. Most of us are not interesting enough for hackers to employ them.<\/span><\/p>\n<p>So follow those rules, be vigilant and not afraid to seem paranoid. And if you have any questions\u00a0\u2014 leave them in comments!<\/p>\n<!--themify_builder_content-->\n<div id=\"themify_builder_content-4013\" data-postid=\"4013\" class=\"themify_builder_content themify_builder_content-4013 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n","protected":false},"excerpt":{"rendered":"<p>Most people think that hackers are neckbeards that sit in a dark cellar and try to break into Pentagon. But in reality, anyone can be a hacker. Any teen can download a suit of scripts from some forum and try to get an access to someone else\u2019s information. And there are no cellars involved either. [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":3232,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":["post-4013","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to defend yourself from hackers in public - Unihost.com Blog<\/title>\n<meta name=\"description\" content=\"Every time you pull up your laptop in a cafe or access your Facebook in a subway, you put your online identity at risk. Learn how to protect\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to defend yourself from hackers in public - Unihost.com Blog\" \/>\n<meta property=\"og:description\" content=\"Every time you pull up your laptop in a cafe or access your Facebook in a subway, you put your online identity at risk. Learn how to protect\" \/>\n<meta property=\"og:url\" content=\"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Unihost.com Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/unihost\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-08T11:14:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-09T11:05:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/unihost.com\/blog\/minio.php?2017\/03\/logo7.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"34\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex Shevchuk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@unihost\" \/>\n<meta name=\"twitter:site\" content=\"@unihost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex Shevchuk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/\"},\"author\":{\"name\":\"Alex Shevchuk\",\"@id\":\"https:\/\/unihost.com\/blog\/#\/schema\/person\/92e127fbc9a0ce4ca134886442a54474\"},\"headline\":\"How to defend yourself from hackers in public\",\"datePublished\":\"2021-10-08T11:14:25+00:00\",\"dateModified\":\"2026-01-09T11:05:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/\"},\"wordCount\":1260,\"publisher\":{\"@id\":\"https:\/\/unihost.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/unihost.com\/blog\/minio.php?2017\/06\/Safe_wifi.svg\",\"articleSection\":[\"Lifehacks\"],\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/\",\"url\":\"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/\",\"name\":\"How to defend yourself from hackers in public - Unihost.com Blog\",\"isPartOf\":{\"@id\":\"https:\/\/unihost.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/unihost.com\/blog\/minio.php?2017\/06\/Safe_wifi.svg\",\"datePublished\":\"2021-10-08T11:14:25+00:00\",\"dateModified\":\"2026-01-09T11:05:42+00:00\",\"description\":\"Every time you pull up your laptop in a cafe or access your Facebook in a subway, you put your online identity at risk. Learn how to protect\",\"breadcrumb\":{\"@id\":\"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/#primaryimage\",\"url\":\"https:\/\/unihost.com\/blog\/minio.php?2017\/06\/Safe_wifi.svg\",\"contentUrl\":\"https:\/\/unihost.com\/blog\/minio.php?2017\/06\/Safe_wifi.svg\",\"caption\":\"Safe_wifi\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Unihost\",\"item\":\"https:\/\/unihost.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/unihost.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to defend yourself from hackers in public\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/unihost.com\/blog\/#website\",\"url\":\"https:\/\/unihost.com\/blog\/\",\"name\":\"Unihost.com Blog\",\"description\":\"Web hosting, Online marketing and Web News\",\"publisher\":{\"@id\":\"https:\/\/unihost.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/unihost.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/unihost.com\/blog\/#organization\",\"name\":\"Unihost\",\"alternateName\":\"Unihost\",\"url\":\"https:\/\/unihost.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/unihost.com\/blog\/minio.php?2026\/01\/minio.png\",\"contentUrl\":\"https:\/\/unihost.com\/blog\/minio.php?2026\/01\/minio.png\",\"width\":300,\"height\":300,\"caption\":\"Unihost\"},\"image\":{\"@id\":\"https:\/\/unihost.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/unihost\",\"https:\/\/x.com\/unihost\",\"https:\/\/instagram.com\/unihost\",\"https:\/\/www.linkedin.com\/company\/unihost-com\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/unihost.com\/blog\/#\/schema\/person\/92e127fbc9a0ce4ca134886442a54474\",\"name\":\"Alex Shevchuk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/unihost.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/37068b7d8dd334ae091ca77c586798519f5157257b25f6bc5dbe0daa5f828510?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/37068b7d8dd334ae091ca77c586798519f5157257b25f6bc5dbe0daa5f828510?s=96&d=mm&r=g\",\"caption\":\"Alex Shevchuk\"},\"description\":\"Alex Shevchuk is the Head of DevOps with extensive experience in building, scaling, and maintaining reliable cloud and on-premise infrastructure. He specializes in automation, high-availability systems, CI\/CD pipelines, and DevOps best practices, helping teams deliver stable and scalable production environments. LinkedIn: https:\/\/www.linkedin.com\/in\/alex1shevchuk\/\",\"url\":\"https:\/\/unihost.com\/blog\/author\/alex-shevchuk\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to defend yourself from hackers in public - Unihost.com Blog","description":"Every time you pull up your laptop in a cafe or access your Facebook in a subway, you put your online identity at risk. Learn how to protect","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/","og_locale":"en_US","og_type":"article","og_title":"How to defend yourself from hackers in public - Unihost.com Blog","og_description":"Every time you pull up your laptop in a cafe or access your Facebook in a subway, you put your online identity at risk. Learn how to protect","og_url":"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/","og_site_name":"Unihost.com Blog","article_publisher":"https:\/\/www.facebook.com\/unihost","article_published_time":"2021-10-08T11:14:25+00:00","article_modified_time":"2026-01-09T11:05:42+00:00","og_image":[{"width":200,"height":34,"url":"https:\/\/unihost.com\/blog\/minio.php?2017\/03\/logo7.png","type":"image\/png"}],"author":"Alex Shevchuk","twitter_card":"summary_large_image","twitter_creator":"@unihost","twitter_site":"@unihost","twitter_misc":{"Written by":"Alex Shevchuk","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/#article","isPartOf":{"@id":"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/"},"author":{"name":"Alex Shevchuk","@id":"https:\/\/unihost.com\/blog\/#\/schema\/person\/92e127fbc9a0ce4ca134886442a54474"},"headline":"How to defend yourself from hackers in public","datePublished":"2021-10-08T11:14:25+00:00","dateModified":"2026-01-09T11:05:42+00:00","mainEntityOfPage":{"@id":"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/"},"wordCount":1260,"publisher":{"@id":"https:\/\/unihost.com\/blog\/#organization"},"image":{"@id":"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/unihost.com\/blog\/minio.php?2017\/06\/Safe_wifi.svg","articleSection":["Lifehacks"],"inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/","url":"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/","name":"How to defend yourself from hackers in public - Unihost.com Blog","isPartOf":{"@id":"https:\/\/unihost.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/#primaryimage"},"image":{"@id":"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/unihost.com\/blog\/minio.php?2017\/06\/Safe_wifi.svg","datePublished":"2021-10-08T11:14:25+00:00","dateModified":"2026-01-09T11:05:42+00:00","description":"Every time you pull up your laptop in a cafe or access your Facebook in a subway, you put your online identity at risk. Learn how to protect","breadcrumb":{"@id":"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/#primaryimage","url":"https:\/\/unihost.com\/blog\/minio.php?2017\/06\/Safe_wifi.svg","contentUrl":"https:\/\/unihost.com\/blog\/minio.php?2017\/06\/Safe_wifi.svg","caption":"Safe_wifi"},{"@type":"BreadcrumbList","@id":"https:\/\/unihost.com\/blog\/how-to-defend-yourself-from-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Unihost","item":"https:\/\/unihost.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/unihost.com\/blog\/"},{"@type":"ListItem","position":3,"name":"How to defend yourself from hackers in public"}]},{"@type":"WebSite","@id":"https:\/\/unihost.com\/blog\/#website","url":"https:\/\/unihost.com\/blog\/","name":"Unihost.com Blog","description":"Web hosting, Online marketing and Web News","publisher":{"@id":"https:\/\/unihost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/unihost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/unihost.com\/blog\/#organization","name":"Unihost","alternateName":"Unihost","url":"https:\/\/unihost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/unihost.com\/blog\/minio.php?2026\/01\/minio.png","contentUrl":"https:\/\/unihost.com\/blog\/minio.php?2026\/01\/minio.png","width":300,"height":300,"caption":"Unihost"},"image":{"@id":"https:\/\/unihost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/unihost","https:\/\/x.com\/unihost","https:\/\/instagram.com\/unihost","https:\/\/www.linkedin.com\/company\/unihost-com"]},{"@type":"Person","@id":"https:\/\/unihost.com\/blog\/#\/schema\/person\/92e127fbc9a0ce4ca134886442a54474","name":"Alex Shevchuk","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/unihost.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/37068b7d8dd334ae091ca77c586798519f5157257b25f6bc5dbe0daa5f828510?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37068b7d8dd334ae091ca77c586798519f5157257b25f6bc5dbe0daa5f828510?s=96&d=mm&r=g","caption":"Alex Shevchuk"},"description":"Alex Shevchuk is the Head of DevOps with extensive experience in building, scaling, and maintaining reliable cloud and on-premise infrastructure. He specializes in automation, high-availability systems, CI\/CD pipelines, and DevOps best practices, helping teams deliver stable and scalable production environments. LinkedIn: https:\/\/www.linkedin.com\/in\/alex1shevchuk\/","url":"https:\/\/unihost.com\/blog\/author\/alex-shevchuk\/"}]}},"_links":{"self":[{"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/posts\/4013","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/comments?post=4013"}],"version-history":[{"count":3,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/posts\/4013\/revisions"}],"predecessor-version":[{"id":4602,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/posts\/4013\/revisions\/4602"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/media\/3232"}],"wp:attachment":[{"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/media?parent=4013"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/categories?post=4013"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/unihost.com\/blog\/wp-json\/wp\/v2\/tags?post=4013"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}