Blog


What determines the speed of your internet?

Speed of Internet
There is really no one specific thing that you can say determines the speed of your internet connection because there are several players and components responsible to deliver internet to your PC or laptop. Internet speed is not just determined by the speed of your computer’s processor as many people think.

How to secure your home network?

Secure Home Network
Our home router has become an internal part of the global communication footmark when the use of the Internet has developed to contain home-based telework, entertainment, personal financial management, social networks, school work, and businesses. The router facilitates the broadened connection. Almost all these devices are pre-configured by the company that made and are plug and play for immediate use. After installing a router at home, people frequently connect directly to the World Wide Web without conducting any additional configuration. People might be reluctant to enhance safeguard configurations because those configurations may seem a bit difficult or people are unwilling to spend more time with these advanced configuration settings.

What is the DNS?

DNS
The Domain Name System (DNS) is a decentralized naming schema of resolving domain (host) names into numerical IP Addresses. The IP Addresses are assigned to various computing devices and services on the Internet but because remembering a series of numbers is difficult for people, it's easier to remember them by their corresponding domain names and have the DNS translate it into the relevant IP address.


What is Kerberos?

Kerberos
In simplest words, Kerberos is an authentication protocol which can service requests over an untrusted network such as the Internet. Kerberos formed its name from Greek mythology which was a three-headed dog that guarded the gates of Hades. Similarly, in Kerberos authentication, we have three heads representing

What is Cyberbullying and How to respond?

Cyberbullying
Cyberbullying is bullying someone by using an electronic medium such as social media, SMS, messaging app or email to harass or intimidate a victim. Cyberbullying is more frequent in children, but some high school or even college kids experience it. Easy access to anonymous messaging apps also influence teenagers to bully someone without identifying himself, and it makes it very difficult for victim to identify who is doing it.

What is Cache Poisoning?

Cache Poisoning
Cache Poisoning (or DNS Spoofing) is an attack technique where corrupted Domain Name Server (DNS) data is stored into the DNS Resolver’s cache and causes it to return an incorrect Internet Protocol (IP) Address. As a result of this, the network traffic is then redirected to the attacker’s (or any other) computer instead of the intended recipient. From here, the attacker could use this to supplement other types of attacks such as a Denial of Service (DoS) attack or a man-in-the-middle attack. It can even be used in aiding them to spread computer worms and other malware or even redirecting users to a malicious site owned by the attacker (this method can be used in phishing attacks).


What is a Smart Contract?

Smart Contract
A smart contract is a computer protocol which was designed with the goal of digitally facilitating, verifying, or enforcing the negotiation of a contract. Through the protocol, credible transactions can be successfully processed without the use of a third party and are trackable and immutable; that is, they cannot be modified or removed after being successfully completed. Their entire purpose for being designed is to provide a higher level of security unattainable by traditional contractual law and to reduce other transaction costs associated with the traditional process.

What is a Botnet?

Botnet
The most recent news of huge cyber-attacks using “Zombies” and “Bots” will not be alarming. This will not create this enthusiast think, even for a second, that the digital world has been taken by the living dead creatures or yet alien armies. But one thing will come to realize the "Botnets".

What is the Keystroke Logging?

Keystroke Logging
Keystroke logging, also called keylogging or keyboard capturing, is the action of recording and saving each keystroke on a keyboard over sometime, usually covertly. This is so that the person who enters the information onto to the keyboard remains unaware of having their information be monitored. The action is done through a logging program which is called a keylogger and it can be either software or hardware.


What is a Man in the Middle Attack?

Man in the Middle Attack
A man-in-the-middle (MITM) attack is a special type of attack in which an attacker covertly relays and potentially alters data between two parties on a network. These parties are usually oblivious to this attack and believe their connection and communication between each other is secured and their messages have integrity; however, that is not the case. The basis of the attack is to circumvent mutual authentication between the two parties and it can only be considered successful if the attacker can successfully impersonate the involved parties to each other. That is to say, the attacker must appear like Person A to Person B and like Person B to Person A. While it is a very common form of attack, most protocols do provide some kind of endpoint verification process to prevent MITM attacks; such as Transport Layer Security (TLS) which can authenticate both parties via a mutually trusted certificate authority.