{"id":4702,"date":"2022-07-17T13:56:39","date_gmt":"2022-07-17T13:56:39","guid":{"rendered":"https:\/\/www.njoftime.co\/blog\/?p=4702"},"modified":"2022-07-17T14:13:06","modified_gmt":"2022-07-17T14:13:06","slug":"cfare-eshte-ne-vertete-nje-sulm-kibernetik","status":"publish","type":"post","link":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html","title":{"rendered":"\u00c7far\u00eb \u00ebsht\u00eb n\u00eb v\u00ebrtet\u00eb nj\u00eb sulm kibernetik?"},"content":{"rendered":"\n<p>Nj\u00eb sulm kibernetik \u00ebsht\u00eb nj\u00eb p\u00ebrpjekje p\u00ebr t\u00eb \u00e7aktivizuar kompjuter\u00ebt (Serverat), p\u00ebr t\u00eb vjedhur t\u00eb dh\u00ebna ose p\u00ebr t\u00eb p\u00ebrdorur nj\u00eb sistem kompjuterik t\u00eb d\u00ebmtuar p\u00ebr t\u00eb nisur sulme shtes\u00eb. Kriminel\u00ebt kibernetik\u00eb p\u00ebrdorin metoda t\u00eb ndryshme p\u00ebr t\u00eb nisur nj\u00eb sulm kibernetik q\u00eb p\u00ebrfshin malware, phishing, ransomware, sulm njeriu n\u00eb mase ose metoda t\u00eb tjera.<\/p>\n\n\n\n<p><strong>Llojet e sulmeve kibernetike<\/strong><\/p>\n\n\n\n<p><br><strong>Malware<\/strong><\/p>\n\n\n\n<p><br>Malware \u00ebsht\u00eb nj\u00eb term q\u00eb p\u00ebrshkruan programet me q\u00ebllim t\u00eb keq, duke p\u00ebrfshir\u00eb spyware, ransomware, viruse dhe krimba. Malware shkel nj\u00eb rrjet p\u00ebrmes nj\u00eb cenueshm\u00ebrie, zakonisht kur nj\u00eb p\u00ebrdorues klikon nj\u00eb lidhje t\u00eb rrezikshme ose nj\u00eb bashk\u00ebngjitje emaili q\u00eb m\u00eb pas instalon softuer t\u00eb rreziksh\u00ebm.<\/p>\n\n\n\n<p><strong>Fishing<\/strong><\/p>\n\n\n\n<p><br>Phishing \u00ebsht\u00eb metoda e d\u00ebrgimit t\u00eb komunikimeve mashtruese q\u00eb duket se vijn\u00eb nga nj\u00eb burim me reputacion, zakonisht p\u00ebrmes emailit. Q\u00ebllimi \u00ebsht\u00eb vjedhja ose marrja e t\u00eb dh\u00ebnave t\u00eb ndjeshme si informacioni i kart\u00ebs s\u00eb kreditit dhe identifikimi ose instalimi i malware n\u00eb kompjuterin e viktim\u00ebs. Phishing \u00ebsht\u00eb nj\u00eb k\u00ebrc\u00ebnim kibernetik gjithnj\u00eb e m\u00eb i zakonsh\u00ebm.<\/p>\n\n\n\n<p><strong>Sulmi njeri n\u00eb mes<\/strong><\/p>\n\n\n\n<p><br>Sulmet Man-in-the-Middle (MitM), t\u00eb quajtura gjithashtu sulme p\u00ebrgjimi, ndodhin kur sulmuesit futen n\u00eb nj\u00eb transaksion me dy pal\u00eb. Pasi sulmuesit nd\u00ebrpresin trafikun, ata mund t\u00eb filtrojn\u00eb dhe vjedhin t\u00eb dh\u00ebna.<\/p>\n\n\n\n<p><strong>Dy pika t\u00eb zakonshme t\u00eb hyrjes p\u00ebr sulmet MitM:<\/strong><\/p>\n\n\n\n<p>N\u00eb Wi-Fi publike t\u00eb pasigurt, sulmuesit mund t\u00eb futen mes pajisjes s\u00eb nj\u00eb vizitori dhe rrjetit. Pa e ditur, vizitori i kalon t\u00eb gjitha informacionet p\u00ebrmes sulmuesit.<br>Pasi malware ka shkelur nj\u00eb pajisje; nj\u00eb sulmues mund t\u00eb instaloj\u00eb softuer p\u00ebr t\u00eb p\u00ebrpunuar t\u00eb gjith\u00eb informacionin e viktim\u00ebs.<\/p>\n\n\n\n<p><br><strong>Sulmi i mohimit t\u00eb sh\u00ebrbimit<\/strong><br>Nj\u00eb sulm i mohimit t\u00eb sh\u00ebrbimit mbush sistemet, server\u00ebt ose rrjetet me trafik q\u00eb shterojn\u00eb burimet dhe gjer\u00ebsin\u00eb e burimit. Kjo e b\u00ebn sistemin t\u00eb paaft\u00eb p\u00ebr t\u00eb p\u00ebrmbushur k\u00ebrkesat standarte. Sulmuesit p\u00ebrdorin gjithashtu pajisje t\u00eb shumta t\u00eb komprometuara p\u00ebr t\u00eb nisur k\u00ebt\u00eb sulm. Ky \u00ebsht\u00eb i njohur si nj\u00eb sulm i shp\u00ebrndar\u00eb-mohimit t\u00eb sh\u00ebrbimit (DDoS).<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>injeksionet SQL<\/strong><\/p>\n\n\n\n<p><br>Nj\u00eb injeksion i gjuh\u00ebs s\u00eb strukturuar t\u00eb databazes (SQL) ndodh kur nj\u00eb sulmues fut kod me q\u00ebllim t\u00eb keq n\u00eb nj\u00eb server q\u00eb p\u00ebrdor SQL dhe e detyron serverin t\u00eb zbuloj\u00eb informacione q\u00eb normalisht nuk do ta b\u00ebnte. Nj\u00eb sulmues mund t\u00eb kryej\u00eb nj\u00eb injeksion SQL thjesht duke paraqitur kodin me q\u00ebllim t\u00eb keq n\u00eb nj\u00eb kuti k\u00ebrkimi t\u00eb cenuesh\u00ebm t\u00eb faqes n\u00eb internet.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Shfryt\u00ebzimi i dit\u00ebs zero<\/strong><\/p>\n\n\n\n<p><br>Nj\u00eb shfryt\u00ebzim i dit\u00ebs zero goditet pasi shpallet nj\u00eb dob\u00ebsi e rrjetit, por p\u00ebrpara se t\u00eb zbatohet nj\u00eb rregullim ose zgjidhje. Sulmuesit synojn\u00eb cenueshm\u00ebrin\u00eb e zbuluar gjat\u00eb k\u00ebsaj periudhe kohe. Zbulimi i k\u00ebrc\u00ebnimeve t\u00eb cenueshm\u00ebris\u00eb n\u00eb dit\u00eb zero k\u00ebrkon nd\u00ebrgjegj\u00ebsim t\u00eb vazhduesh\u00ebm.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Tuneli DNS<\/strong><\/p>\n\n\n\n<p><br>Tuneli DNS p\u00ebrdor protokollin DNS p\u00ebr t\u00eb komunikuar trafikun jo-DNS mbi portin 53. Ai d\u00ebrgon HTTP dhe trafikun tjet\u00ebr t\u00eb protokollit mbi DNS. Ka arsye t\u00eb ndryshme, legjitime p\u00ebr t\u00eb p\u00ebrdorur tunelizimin DNS. Sidoqoft\u00eb, ka edhe arsye dashakeqe p\u00ebr t\u00eb p\u00ebrdorur sh\u00ebrbimet DNS Tunneling VPN. Ato mund t\u00eb p\u00ebrdoren p\u00ebr t\u00eb maskuar trafikun dal\u00ebs si DNS, duke fshehur t\u00eb dh\u00ebnat q\u00eb zakonisht ndahen p\u00ebrmes nj\u00eb lidhjeje interneti. P\u00ebr p\u00ebrdorim me q\u00ebllim t\u00eb keq, k\u00ebrkesat DNS manipulohen p\u00ebr t\u00eb nxjerr\u00eb t\u00eb dh\u00ebna nga nj\u00eb sistem i komprometuar n\u00eb infrastruktur\u00ebn e sulmuesit. Mund t\u00eb p\u00ebrdoret gjithashtu p\u00ebr kthimin e komand\u00ebs dhe kontrollit nga infrastruktura e sulmuesit n\u00eb nj\u00eb sistem t\u00eb komprometuar.<\/p>\n\n\n\n<p><strong>Cil\u00ebt jan\u00eb shembujt e nj\u00eb sulmi kibernetik?<\/strong><\/p>\n\n\n\n<p><br><em>K\u00ebtu jan\u00eb disa shembuj t\u00eb sulmeve t\u00eb zakonshme kibernetike dhe llojet e shkeljeve t\u00eb t\u00eb dh\u00ebnave:<\/em><\/p>\n\n\n\n<p>Vjedhja e identitetit, mashtrimi, zhvatja<br>Malware, phishing, spamming, spyware, spyware, trojans dhe viruse<br>Pajisje t\u00eb vjedhura, t\u00eb tilla si laptop\u00eb ose pajisje celulare<br>Refuzimi i sh\u00ebrbimit dhe sulmet e shp\u00ebrndara t\u00eb mohimit t\u00eb sh\u00ebrbimit<br>Shkelja e aksesit<br>Nuhatja e fjal\u00ebkalimit<br>Infiltrimi i sistemit<br>Deformimi i faqes n\u00eb internet<br>Shfletuesi i internetit privat dhe publik exploits<br>Abuzimi i mesazheve t\u00eb \u00e7astit<br>Vjedhja e pron\u00ebsis\u00eb intelektuale (IP) ose aksesi i paautorizuar<\/p>\n\n\n\n<p><br><strong>\u00c7far\u00eb ndodh gjat\u00eb nj\u00eb sulmi kibernetik?<\/strong><\/p>\n\n\n\n<p><br>Nj\u00eb sulm kibernetik ndodh kur kriminel\u00ebt kibernetik\u00eb p\u00ebrpiqen t\u00eb fitojn\u00eb akses t\u00eb paligjsh\u00ebm n\u00eb t\u00eb dh\u00ebnat elektronike t\u00eb ruajtura n\u00eb nj\u00eb kompjuter ose nj\u00eb rrjet. Q\u00ebllimi mund t\u00eb jet\u00eb shkaktimi i d\u00ebmtimit t\u00eb reputacionit ose d\u00ebmtimi i nj\u00eb biznesi ose personi, ose vjedhja e t\u00eb dh\u00ebnave t\u00eb vlefshme. Sulmet kibernetike mund t\u00eb synojn\u00eb <strong>individ\u00eb<\/strong>, <strong>grupe<\/strong>, <strong>organizata<\/strong> ose <strong>qeveri<\/strong>.<\/p>\n\n\n\n<p><strong>M\u00ebnyrat p\u00ebr t\u00eb parandaluar sulmet kibernetike.<\/strong><\/p>\n\n\n\n<p><br>Jan\u00eb 7 strategji kryesore q\u00eb rekomandojm\u00eb t&#8217;i p\u00ebrdorni p\u00ebr t\u00eb mbrojtur nj\u00eb biznes ose organizat\u00eb t\u00eb vog\u00ebl dhe t\u00eb mesme nga sulmet kibernetike.<\/p>\n\n\n\n<p>P\u00cbRDORNI Autentifikimin me shum\u00eb faktor\u00eb<br>Nj\u00eb nga m\u00ebnyrat m\u00eb efektive p\u00ebr t\u00eb parandaluar sulmet kibernetike \u00ebsht\u00eb t\u00eb sigurohet q\u00eb v\u00ebrtetimi me shum\u00eb faktor\u00eb \u00ebsht\u00eb aktivizuar p\u00ebr t\u00eb gjitha aplikacionet q\u00eb aksesojn\u00eb internetin n\u00eb nj\u00eb organizat\u00eb.<\/p>\n\n\n\n<p>T\u00eb kesh vet\u00ebm nj\u00eb hyrje me fjal\u00ebkalim p\u00ebr punonj\u00ebsit nuk mjafton. N\u00ebse fjal\u00ebkalimet e punonj\u00ebsve jan\u00eb komprometuar p\u00ebrmes nj\u00eb hakeri ose p\u00ebrmes nj\u00eb mashtrimi phishing, kriminel\u00ebt kibernetik\u00eb mund t\u00eb jen\u00eb n\u00eb gjendje t\u00eb ken\u00eb hyrje leht\u00ebsisht n\u00eb sisteme.<\/p>\n\n\n\n<p>N\u00eb vend t\u00eb k\u00ebsaj, aktivizimi i nj\u00eb procesi v\u00ebrtetimi me shum\u00eb faktor\u00eb p\u00ebr hyrje do t\u00eb k\u00ebrkoj\u00eb q\u00eb punonj\u00ebsit t\u00eb ofrojn\u00eb disa pjes\u00eb informacioni n\u00eb vend t\u00eb vet\u00ebm nj\u00eb. Si rezultat, siguria do t\u00eb rritet. Do t\u00eb jet\u00eb shum\u00eb m\u00eb e v\u00ebshtir\u00eb p\u00ebr \u00e7do person t\u00eb paautorizuar t\u00eb hyj\u00eb n\u00eb sistemet.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nj\u00eb sulm kibernetik \u00ebsht\u00eb nj\u00eb p\u00ebrpjekje p\u00ebr t\u00eb \u00e7aktivizuar kompjuter\u00ebt (Serverat), p\u00ebr t\u00eb vjedhur t\u00eb dh\u00ebna ose p\u00ebr t\u00eb p\u00ebrdorur nj\u00eb sistem kompjuterik t\u00eb d\u00ebmtuar p\u00ebr t\u00eb nisur sulme shtes\u00eb. Kriminel\u00ebt kibernetik\u00eb p\u00ebrdorin metoda t\u00eb ndryshme p\u00ebr t\u00eb nisur nj\u00eb sulm kibernetik q\u00eb p\u00ebrfshin malware, phishing, ransomware, sulm njeriu n\u00eb mase ose metoda t\u00eb tjera. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4704,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"tdm_status":"","tdm_grid_status":"","footnotes":""},"categories":[333],"tags":[],"class_list":{"0":"post-4702","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u00c7far\u00eb \u00ebsht\u00eb n\u00eb v\u00ebrtet\u00eb nj\u00eb sulm kibernetik? - Blogu i njoftimeve<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html\" \/>\n<meta property=\"og:locale\" content=\"sq_AL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00c7far\u00eb \u00ebsht\u00eb n\u00eb v\u00ebrtet\u00eb nj\u00eb sulm kibernetik?\" \/>\n<meta property=\"og:description\" content=\"Nj\u00eb sulm kibernetik \u00ebsht\u00eb nj\u00eb p\u00ebrpjekje p\u00ebr t\u00eb \u00e7aktivizuar kompjuter\u00ebt (Serverat), p\u00ebr t\u00eb vjedhur t\u00eb dh\u00ebna ose p\u00ebr t\u00eb p\u00ebrdorur nj\u00eb sistem kompjuterik t\u00eb\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html\" \/>\n<meta property=\"og:site_name\" content=\"Blogu i njoftimeve\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Njoftime.co\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/Njoftime.co\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-17T13:56:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-17T14:13:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.njoftime.co\/blog\/wp-content\/uploads\/2022\/07\/hacking.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Njoftime blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Njoftime_co\" \/>\n<meta name=\"twitter:site\" content=\"@Njoftime_co\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Njoftime blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html\"},\"author\":{\"name\":\"Njoftime blog\",\"@id\":\"https:\/\/www.njoftime.co\/blog\/#\/schema\/person\/05d216b94bdf910d1a93cb106b0f0fe3\"},\"headline\":\"\u00c7far\u00eb \u00ebsht\u00eb n\u00eb v\u00ebrtet\u00eb nj\u00eb sulm kibernetik?\",\"datePublished\":\"2022-07-17T13:56:39+00:00\",\"dateModified\":\"2022-07-17T14:13:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html\"},\"wordCount\":985,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.njoftime.co\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.njoftime.co\/blog\/wp-content\/uploads\/2022\/07\/hacking.jpg\",\"articleSection\":[\"Hacking\"],\"inLanguage\":\"sq\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#respond\"]}],\"copyrightYear\":\"2022\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.njoftime.co\/blog\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html\",\"url\":\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html\",\"name\":\"\u00c7far\u00eb \u00ebsht\u00eb n\u00eb v\u00ebrtet\u00eb nj\u00eb sulm kibernetik? - Blogu i njoftimeve\",\"isPartOf\":{\"@id\":\"https:\/\/www.njoftime.co\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.njoftime.co\/blog\/wp-content\/uploads\/2022\/07\/hacking.jpg\",\"datePublished\":\"2022-07-17T13:56:39+00:00\",\"dateModified\":\"2022-07-17T14:13:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#breadcrumb\"},\"inLanguage\":\"sq\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sq\",\"@id\":\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#primaryimage\",\"url\":\"https:\/\/www.njoftime.co\/blog\/wp-content\/uploads\/2022\/07\/hacking.jpg\",\"contentUrl\":\"https:\/\/www.njoftime.co\/blog\/wp-content\/uploads\/2022\/07\/hacking.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.njoftime.co\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00c7far\u00eb \u00ebsht\u00eb n\u00eb v\u00ebrtet\u00eb nj\u00eb sulm kibernetik?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.njoftime.co\/blog\/#website\",\"url\":\"https:\/\/www.njoftime.co\/blog\/\",\"name\":\"Njoftime.co Portal\",\"description\":\"Blogu informativ\",\"publisher\":{\"@id\":\"https:\/\/www.njoftime.co\/blog\/#organization\"},\"alternateName\":\"Portali Shqiptar i Biznesit\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.njoftime.co\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sq\"},{\"@type\":[\"Organization\",\"Place\",\"EntertainmentBusiness\"],\"@id\":\"https:\/\/www.njoftime.co\/blog\/#organization\",\"name\":\"Elbhost.com\",\"url\":\"https:\/\/www.njoftime.co\/blog\/\",\"logo\":{\"@id\":\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#local-main-organization-logo\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Njoftime.co\",\"https:\/\/x.com\/Njoftime_co\",\"https:\/\/www.instagram.com\/njoftime.co\/\",\"https:\/\/www.linkedin.com\/company\/njoftime-co\"],\"address\":{\"@id\":\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"41.326729\",\"longitude\":\"19.8097683\"},\"telephone\":[\"0672832470\"],\"openingHoursSpecification\":{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\",\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"23:59\"},\"email\":\"info@njoftime.co\",\"priceRange\":\"$$$$\",\"currenciesAccepted\":\"Euro,Pound,Dollar\",\"paymentAccepted\":\"paypal\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.njoftime.co\/blog\/#\/schema\/person\/05d216b94bdf910d1a93cb106b0f0fe3\",\"name\":\"Njoftime blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sq\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e639b9dd1f7a6b3f58ecb10d71e69eed7e10072c9888b4918a7fa466650a8716?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e639b9dd1f7a6b3f58ecb10d71e69eed7e10072c9888b4918a7fa466650a8716?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e639b9dd1f7a6b3f58ecb10d71e69eed7e10072c9888b4918a7fa466650a8716?s=96&d=mm&r=g\",\"caption\":\"Njoftime blog\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Njoftime.co\/\",\"https:\/\/www.linkedin.com\/company\/njoftime-co\/\"],\"honorificPrefix\":\"Mr\",\"knowsAbout\":[\"PHP\"],\"url\":\"https:\/\/www.njoftime.co\/blog\/author\/admin\"},{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#local-main-place-address\",\"streetAddress\":\"11 Nentori\",\"addressLocality\":\"Elbasan\",\"postalCode\":\"1001\",\"addressRegion\":\"Albania\",\"addressCountry\":\"AL\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"sq\",\"@id\":\"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#local-main-organization-logo\",\"url\":\"https:\/\/www.njoftime.co\/blog\/wp-content\/uploads\/2017\/09\/logo.png\",\"contentUrl\":\"https:\/\/www.njoftime.co\/blog\/wp-content\/uploads\/2017\/09\/logo.png\",\"width\":177,\"height\":42,\"caption\":\"Elbhost.com\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Elbasan\" \/>\n<meta name=\"geo.position\" content=\"41.326729;19.8097683\" \/>\n<meta name=\"geo.region\" content=\"Albania\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u00c7far\u00eb \u00ebsht\u00eb n\u00eb v\u00ebrtet\u00eb nj\u00eb sulm kibernetik? - Blogu i njoftimeve","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html","og_locale":"sq_AL","og_type":"article","og_title":"\u00c7far\u00eb \u00ebsht\u00eb n\u00eb v\u00ebrtet\u00eb nj\u00eb sulm kibernetik?","og_description":"Nj\u00eb sulm kibernetik \u00ebsht\u00eb nj\u00eb p\u00ebrpjekje p\u00ebr t\u00eb \u00e7aktivizuar kompjuter\u00ebt (Serverat), p\u00ebr t\u00eb vjedhur t\u00eb dh\u00ebna ose p\u00ebr t\u00eb p\u00ebrdorur nj\u00eb sistem kompjuterik t\u00eb","og_url":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html","og_site_name":"Blogu i njoftimeve","article_publisher":"https:\/\/www.facebook.com\/Njoftime.co","article_author":"https:\/\/www.facebook.com\/Njoftime.co\/","article_published_time":"2022-07-17T13:56:39+00:00","article_modified_time":"2022-07-17T14:13:06+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.njoftime.co\/blog\/wp-content\/uploads\/2022\/07\/hacking.jpg","type":"image\/jpeg"}],"author":"Njoftime blog","twitter_card":"summary_large_image","twitter_creator":"@Njoftime_co","twitter_site":"@Njoftime_co","twitter_misc":{"Written by":"Njoftime blog","Est. reading time":"5 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#article","isPartOf":{"@id":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html"},"author":{"name":"Njoftime blog","@id":"https:\/\/www.njoftime.co\/blog\/#\/schema\/person\/05d216b94bdf910d1a93cb106b0f0fe3"},"headline":"\u00c7far\u00eb \u00ebsht\u00eb n\u00eb v\u00ebrtet\u00eb nj\u00eb sulm kibernetik?","datePublished":"2022-07-17T13:56:39+00:00","dateModified":"2022-07-17T14:13:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html"},"wordCount":985,"commentCount":0,"publisher":{"@id":"https:\/\/www.njoftime.co\/blog\/#organization"},"image":{"@id":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#primaryimage"},"thumbnailUrl":"https:\/\/www.njoftime.co\/blog\/wp-content\/uploads\/2022\/07\/hacking.jpg","articleSection":["Hacking"],"inLanguage":"sq","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#respond"]}],"copyrightYear":"2022","copyrightHolder":{"@id":"https:\/\/www.njoftime.co\/blog\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html","url":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html","name":"\u00c7far\u00eb \u00ebsht\u00eb n\u00eb v\u00ebrtet\u00eb nj\u00eb sulm kibernetik? - Blogu i njoftimeve","isPartOf":{"@id":"https:\/\/www.njoftime.co\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#primaryimage"},"image":{"@id":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#primaryimage"},"thumbnailUrl":"https:\/\/www.njoftime.co\/blog\/wp-content\/uploads\/2022\/07\/hacking.jpg","datePublished":"2022-07-17T13:56:39+00:00","dateModified":"2022-07-17T14:13:06+00:00","breadcrumb":{"@id":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#breadcrumb"},"inLanguage":"sq","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html"]}]},{"@type":"ImageObject","inLanguage":"sq","@id":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#primaryimage","url":"https:\/\/www.njoftime.co\/blog\/wp-content\/uploads\/2022\/07\/hacking.jpg","contentUrl":"https:\/\/www.njoftime.co\/blog\/wp-content\/uploads\/2022\/07\/hacking.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.njoftime.co\/blog\/"},{"@type":"ListItem","position":2,"name":"\u00c7far\u00eb \u00ebsht\u00eb n\u00eb v\u00ebrtet\u00eb nj\u00eb sulm kibernetik?"}]},{"@type":"WebSite","@id":"https:\/\/www.njoftime.co\/blog\/#website","url":"https:\/\/www.njoftime.co\/blog\/","name":"Njoftime.co Portal","description":"Blogu informativ","publisher":{"@id":"https:\/\/www.njoftime.co\/blog\/#organization"},"alternateName":"Portali Shqiptar i Biznesit","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.njoftime.co\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sq"},{"@type":["Organization","Place","EntertainmentBusiness"],"@id":"https:\/\/www.njoftime.co\/blog\/#organization","name":"Elbhost.com","url":"https:\/\/www.njoftime.co\/blog\/","logo":{"@id":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#local-main-organization-logo"},"image":{"@id":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/Njoftime.co","https:\/\/x.com\/Njoftime_co","https:\/\/www.instagram.com\/njoftime.co\/","https:\/\/www.linkedin.com\/company\/njoftime-co"],"address":{"@id":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"41.326729","longitude":"19.8097683"},"telephone":["0672832470"],"openingHoursSpecification":{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday","Saturday","Sunday"],"opens":"00:00","closes":"23:59"},"email":"info@njoftime.co","priceRange":"$$$$","currenciesAccepted":"Euro,Pound,Dollar","paymentAccepted":"paypal"},{"@type":"Person","@id":"https:\/\/www.njoftime.co\/blog\/#\/schema\/person\/05d216b94bdf910d1a93cb106b0f0fe3","name":"Njoftime blog","image":{"@type":"ImageObject","inLanguage":"sq","@id":"https:\/\/secure.gravatar.com\/avatar\/e639b9dd1f7a6b3f58ecb10d71e69eed7e10072c9888b4918a7fa466650a8716?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e639b9dd1f7a6b3f58ecb10d71e69eed7e10072c9888b4918a7fa466650a8716?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e639b9dd1f7a6b3f58ecb10d71e69eed7e10072c9888b4918a7fa466650a8716?s=96&d=mm&r=g","caption":"Njoftime blog"},"sameAs":["https:\/\/www.facebook.com\/Njoftime.co\/","https:\/\/www.linkedin.com\/company\/njoftime-co\/"],"honorificPrefix":"Mr","knowsAbout":["PHP"],"url":"https:\/\/www.njoftime.co\/blog\/author\/admin"},{"@type":"PostalAddress","@id":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#local-main-place-address","streetAddress":"11 Nentori","addressLocality":"Elbasan","postalCode":"1001","addressRegion":"Albania","addressCountry":"AL"},{"@type":"ImageObject","inLanguage":"sq","@id":"https:\/\/www.njoftime.co\/blog\/cfare-eshte-ne-vertete-nje-sulm-kibernetik.html#local-main-organization-logo","url":"https:\/\/www.njoftime.co\/blog\/wp-content\/uploads\/2017\/09\/logo.png","contentUrl":"https:\/\/www.njoftime.co\/blog\/wp-content\/uploads\/2017\/09\/logo.png","width":177,"height":42,"caption":"Elbhost.com"}]},"geo.placename":"Elbasan","geo.position":{"lat":"41.326729","long":"19.8097683"},"geo.region":"Albania"},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.njoftime.co\/blog\/wp-json\/wp\/v2\/posts\/4702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.njoftime.co\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.njoftime.co\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.njoftime.co\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.njoftime.co\/blog\/wp-json\/wp\/v2\/comments?post=4702"}],"version-history":[{"count":0,"href":"https:\/\/www.njoftime.co\/blog\/wp-json\/wp\/v2\/posts\/4702\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.njoftime.co\/blog\/wp-json\/wp\/v2\/media\/4704"}],"wp:attachment":[{"href":"https:\/\/www.njoftime.co\/blog\/wp-json\/wp\/v2\/media?parent=4702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.njoftime.co\/blog\/wp-json\/wp\/v2\/categories?post=4702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.njoftime.co\/blog\/wp-json\/wp\/v2\/tags?post=4702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}