Blog Category


In this fast-moving age of the internet, it isn't uncommon that many of us share our Wi-Fi credentials with friends and guests. At first glance, it doesn't seem to be a big deal to share your Wi-Fi credentials but when your guests join your home network they can see all of your smart devices and computers. Without properly securing your smart devices and PCs, your smart devices may be accessible to your guests.

Technology has come a long way and is constantly evolving every day and it's no exception with geolocation. Thanks to this, geolocation has found a very strong and everyday use in today's world. RFID (radio frequency identification) tags have come about as a result of this and function as neat little devices which can be tagged to other items that have no means of connecting to the Internet. Through this, one can then geolocate these tags and their tagged objects.

What is Cloud?

The Cloud is a general term referred to as the Internet in a broad way. It generally refers to accessing computer, storage and applications over the Internet. It should be noted that these services involve the use of some extremely powerful machines, mega scale storage devices in remote locations that the user would not be able to access physically.

Public DNS

To first understand what a Public DNS is, we must first recognize what DNS means to begin with. In its simplest definition, the DNS (or the Domain Name System), is basically an Internet service that functions like a giant dictionary. This dictionary maps the IP address of every website to a human-readable name called a domain (or host) name. This service functions when a user enters the name of some website into a browser's url bar (for example, https://www.iplocation.net) to visit that website. Most ISPs provide a set of DNS servers for it's customers to use, and they are usually private designed to be used by their customers only.

What is WAP?

WAP stands for Wireless Application Protocol. This is a well-known and commonly used standardized protocol which defines how wireless communication can take place between mobile devices and a wireless network. This could include devices such as radio transceivers, cell phones, world wide web, newsgroup, instant messaging and any device that can be used for Internet access. Devices which are based on WAP can interoperate as technology advancement happens over time.

File sharing is something which is part of our daily activities. This is also commonly referred to as P2P or Peer-to-Peer sharing. This could be sharing files between two nodes in a network or between a client and a server or between two nodes not within the same network. Any multi-user environment will require a file sharing mechanism.

What is net neutrality?

In today's digital world net neutrality has become increasingly significant. As an Internet user, something that all of us should be aware of. Net neutrality is a fundamental law that several governments impose on Internet Service Providers (ISP). This ensures all data irrespective of the content is treated equally. With this, the Internet service provider will not be able to charge differently to its users based on content, platform, application or website being accessed.

Our home router has become an internal part of the global communication footmark when the use of the Internet has developed to contain home-based telework, entertainment, personal financial management, social networks, school work, and businesses. The router facilitates the broadened connection. Almost all these devices are pre-configured by the company that made and are plug and play for immediate use. After installing a router at home, people frequently connect directly to the World Wide Web without conducting any additional configuration. People might be reluctant to enhance safeguard configurations because those configurations may seem a bit difficult or people are unwilling to spend more time with these advanced configuration settings.

There is really no one specific thing that you can say determines the speed of your internet connection because there are several players and components responsible to deliver internet to your PC or laptop. Internet speed is not just determined by the speed of your computer’s processor as many people think.

What is ARP Spoofing?

The Address Resolution Protocol (ARP) Spoofing attack, also called ARP Cache Poisoning or ARP Poison Routing, is a technique by which an attacker sends spoofed ARP messages onto a Local Area Network (LAN). It is used to allow the attacker access to incoming internet traffic on a LAN by having their Media Access Control (MAC) Address be linked to the Internet Protocol (IP) Address of another host (usually, the default gateway). Through this, they’re able to receive incoming traffic intended for that IP Address which allows them to intercept the data, modify traffic, or even stop all traffic on the network. Because of this, the technique is often used to open up the possibility of other attacks such as a Denial of Service (DoS) attack, a man in the middle attack, and a session hijacking attack. The success of the attack depends heavily on the attacker gaining direct success to the targeted local network segment and it can only be used on networks which use ARP.