Blog


How to track your lost Android Smartphone?

Did you lose your Android smartphone without installing a tracking app? If you're like most people, you realize that there are anti-theft or phone tracking app available for your Android smartphone after it's stolen or lost. It would be easier to track your phone if you have such app installed, but you still have a chance to track your phone and recover it. There are a couple of ways to track your phone if you use your Google Account linked to your phone.

How to track your lost smartphone with an IP address?

Our readers have been inquiring about retrieving lost or stolen smartphones by tracking down the IP address of the phone. Is it possible to track down the phone by using an IP address? The answer is Yes. But, can you recover the lost phone by tracing the IP accress? The answer is unlikely. If you lost an Android Smartphone, you still have a chance to recover it by following the Locate your lost Android smartphone article. If you lost a non-Android phone, this article will describe what it takes to track down the IP address of your phone, and how hard it is to recover it.


What is Internet?

Internet can be defined as the worldwide network where machines like computers, servers, and smart devices are connected together for communication and data exchange purposes. In the layman's terminology, the Internet is the network of networks interconnecting computing devices located throughout the world. These networks use some communication protocols to link the network devices with each other.

How to Protect Yourself on Public Wi-Fi?

Public Wi-Fi is a lifesaver if you're trying to save on data usage or you need the Internet access, but sometimes the consequences of using public Wi-Fi can outweigh its convenience. Whether you're in a coffee shop, public library, university or an airport, all free Wi-Fi hotspots are equally susceptible to hackers and other data thieves. To mitigate these risks, users must take preventative measures to ensure that they are using public Wi-Fi safely.

What is the private IP address?

The private IP addresses are the reserved IP address blocks that cannot be routed through the internet. Since private IP addresses are only intended to be used in private networks, they are not globally unique. The private IP address must be unique within its network (usually LAN) so that there is no conflict between two computers within its network. Due to scarce nature of IPv4 Address (i.e. approximately 4 billion IP addresses), IANA reserved private IP address blocks so that they can be used by any organization without registering them with IANA. The private IP address block can be used in homes, small businesses, or even medium and large enterprises to create their own network. Computing devices with a private IP address cannot be directly accessed from the Internet unless NAT (Network Address Translation) is used. The advanced network planning techniques have also enabled network planners to use same private IP address within different private networks thus allowing them to save valuable IP address space. A private address may also be referred to as a local IP address. It also enables to hide the identity of the users over the Internet.


What is HyperText Transfer Protocol (HTTP)?

The Hypertext Transfer Protocol (HTTP) is a protocol at the application layer of the Internet Protocol (IP) Suite. The protocol is used for distributed, collaborative, and hypermedia information systems which put it at the core of data communication across the World Wide Web (WWW). This means that when a user goes to a (distributed or collaborative information systems) website or loads any form of interactive media (hypermedia information systems), it is this protocol which transfers the information back and forth. Hypertext is structured text which has the feature of logical links (hyperlinks) between endpoints. This means that HTTP is literally the protocol to handle the transfer of hypertext.

How to get around IP Ban?

IP ban is a block set up by a server to reject the request made from a particular IP or range of IP addresses. The IP ban may have been implemented automatically due to an abuse pattern detected by the server or placed manually by an administrator. IP ban is implemented to protect the server from abuse such as brute force attacks, block emails from known spammers, and limit usage by users.

DDoS Use Case - How we mitigated a 9Mbps DDoS attack?

One of our sister website hosted on cloud server was recently hit by a 9Mbps DDoS, and the apache web server ran out of memory and crashed. The attack lasted more than 2-months with no known reason. We've taken a number of mitigation steps including installation of mod_security with mod_evasive, APF, BFD, DDoS Deflate and Rootkit and Traffic Control, but none came to rescue. Use of Linux provided WAF will mitigate the DDoS to the extent where CPU, Memory and Bandwidth are allowed; and in our case a single CentOS server with 4GB RAM wasn't sufficient to mitigate DDoS.


What is File Transfer Protocol (FTP)?

The File Transfer Protocol (FTP) is a protocol used in the Internet Protocol (IP) Suite used for the transferring of files across a network between a server and a client. The protocol was built from the ground up with the client-server model in mind and utilizes different connections for data and control between the two. Users can authenticate themselves with a clear-text sign-in protocol which is usually in the form of a username and password or they can connect to the server anonymously if it is configured to allow it. Transmissions of a user's login credentials can be secured by Transport Layer Security / Secure Sockets Layer (TLS/SSL); which can also encrypt the content of transmissions. Should this not be the case, the information is transmitted unencrypted which leaves it susceptible to a sniffing attack. In some scenarios, SSH File Transfer Protocol (SFTP) might be used but it should be noted that the protocol is technologically different than TLS/SSL.