Blog


How to prevent online tracking?

Have you ever used a website that requires login information? Or been online shopping and realized that advertisements are suspiciously familiar with what you’ve been browsing at? Have you saved your financial information on your browser when making a purchase online? Online tracking allows you to save these details, enjoy (or despise) targeted advertising, and capture your login details on your favorite browser. While online tracking may provide some beneficial features, tracking can also introduce unprecedented security concerns you might not be aware of.

What is a blockchain?

A blockchain is a decentralized digital ledger which is shared between every node on the network. For a device to become a node on a blockchain, a user must acquire that blockchain's token on the device so that it can be recognized as such and then be a part of the digital ledger. This ledger stores all of the data on each node across the system in such a way that it is all immutable; that is, it can never be modified or deleted. This process occurs simultaneously on all the machines on the network by having them solve a mathematical cryptographic puzzle which is heavy on the machine's computational power and can take a significant time to complete. This is the process which is called mining and a machine which is used for this is called a miner. Miners are typically in competition with each other to completely mine the transaction first as its only that miner who is rewarded with more tokens for completing the task. This is what has led to the cost of computer components costing so much as the demand for better hardware for miners has increased the price. One of the most popular of blockchains right now is the Bitcoin blockchain which functions as a cryptocurrency with a public digital ledger and was one of the very first to do this.

What is net neutrality?

In today's digital world net neutrality has become increasingly significant. As an Internet user, something that all of us should be aware of. Net neutrality is a fundamental law that several governments impose on Internet Service Providers (ISP). This ensures all data irrespective of the content is treated equally. With this, the Internet service provider will not be able to charge differently to its users based on content, platform, application or website being accessed.


What are cyber threats?

Ransomware is a type of malware that locks users from accessing their data in their computer or any mobile device. To unlock their data, the users must pay a certain amount of ransom, this is mainly done by the payment method which uses Bitcoin. Although paying is an option in recovering your data, it is recommended not to pay because we cannot guarantee the promise of the attackers.

Zoho Free Email Hosting

Are you looking for free email hosting for your personal domain or smaill business? Google Apps and Microsoft Outlook used to offer reliable and free email hosting on a custom domain, but they are no longer free. A viable alternative to Google Apps and Outlook is Zoho Mail, and you can have up to 5 free email accounts.

What is SQL Injection?

Explore the power and vulnerabilities of SQL (Structured Query Language). Discover how SQL revolutionized data management and the risks posed by SQL Injection attacks. Learn about the types of SQL Injection vulnerabilities and effective mitigation strategies to safeguard your data and applications.


How a VPN Helps Avoid Ad Targeting to your IP Address

Have you ever visited a website, filled up your cart, then left the website before completing your purchase — only to see an ad elsewhere online for that website the next day? IP Retargeting is a marketing tactic used by many industries. Websites can keep records of the IP addresses window shopping their pages, then target ads to those IP addresses in an effort to gain its patronage. Instead of broad advertisement strokes which may or may not reach the right audience, targeting specific IP addresses speaks to an audience most likely to revisit the website and complete a purchase.

Cyberbullying Case Studies

With a number of social media platform cohesively blended into our lives, our online activities can be easily viewed by friends, acquaintances, and many strangers. Cyberbullying is harder to notice at times as unlike traditional bullying, it happens in the virtual world and there is a possibility that it might not happen in publicly accessible forums and groups. When someone is bullied in the cyberspace, the victim generally starts distancing himself or herself from the internet and avoids social activities and gatherings. Moreover, cyberbullying also leads to eating disorders and improper mental health. In this post, we will discuss two infamous cases of Amanda Todd and Tyler Clementi.


What is ARP Spoofing?

The Address Resolution Protocol (ARP) Spoofing attack, also called ARP Cache Poisoning or ARP Poison Routing, is a technique by which an attacker sends spoofed ARP messages onto a Local Area Network (LAN). It is used to allow the attacker access to incoming internet traffic on a LAN by having their Media Access Control (MAC) Address be linked to the Internet Protocol (IP) Address of another host (usually, the default gateway). Through this, they’re able to receive incoming traffic intended for that IP Address which allows them to intercept the data, modify traffic, or even stop all traffic on the network. Because of this, the technique is often used to open up the possibility of other attacks such as a Denial of Service (DoS) attack, a man in the middle attack, and a session hijacking attack. The success of the attack depends heavily on the attacker gaining direct success to the targeted local network segment and it can only be used on networks which use ARP.