Blog


What is Vishing?

To first understand what is vishing, we must first have an understanding of >a href="/phishing">phishing. At its core, phishing is a nefarious method to trick a person through some means of deceit. This can be achieved through either making the victim download malicious software or through tricking them with social engineering tactics.

What is Antivirus Software?

To understand what anti-virus software is, we must first have an understanding of what a computer virus is and how they threaten our privacy. The main goal of antivirus software is to counter virus programs. At the core, a virus is nothing more than a program which continuously duplicates itself on a person's system. These programs typically either allow an unwanted user to gain access to the affected system or performs some unwanted action on the affected system. As such, viruses are almost always used for nefarious reasons by malicious programs, and as I've mentioned before; antivirus software came about to counter such programs.

What is Cryptocurrency and Bitcoin?

Before we can discuss cryptocurrency and Bitcoin, we must first understand the underlying technology upon which they're built upon, blockchain. Blockchain is simply a normal accounting ledger that is stored digitally across multiple machines. Each machine holds the exact same copy of the ledger and compares it with each other every time there's an addition to the ledger. Each copy of the ledger must remain the same during this process and those who do not are considered outliers. Through this way, the ledgers pick the copies with the majority rule; meaning, if 51% of the machines have one result while 49% have the other, the 51% is considered to be right and all the machines are updated to suit. Another key factor of the technology is that once a record has been added to the ledger, it can never be deleted again and that each machine that is a part of the blockchain are individuals who use their machines computational power to secure these records in cryptographic hashes and are paid for it with tokens or coins.


How to Stay Safe from Online Scams?

The Internet is the common place where scammers are seeking innocent users. Scammers are using every tactic to trick users into obtaining personal info and asking them for money. They employ a series of different tricks to mislead people through social engineering or even fool them into a false sense of security. Learn how you can identify and prevent online scams.

How to Protect Your Privacy Online?

The Internet is one of the great tools within the modern world; enabling users everywhere globally to communicate with each other with minimal barriers. On top of this, as time went on, it became a great tool for almost every use imaginable: businesses can be run from online solely, information can be shared easily, games and entertainment can become available for all; truly a novelty of an invention.

How to Avoid a Computer Virus?

In its simplest form, a computer virus is basically some form of software with nefarious intentions which continuously duplicate itself much like a regular virus would do within a human. This program typically alters the behavior of some device as it continuously duplicates itself so as to make it harder to purge from the system. This is accomplished through exploits and vulnerabilities found within the software to aid the virus' creator; to gain unwanted access to the system or to perform unwanted actions on the system.


What is Hacking?

Hacking is a popular term that denotes the action of a nefarious actor in an attempt to gain unwanted access to a system. In a simpler way of wording it, this is the process of a person attempting to break into a machine or account to do some malicious activity. This isn't something limited to just the Internet either as hacking is something that can occur offline as well if the bad actor can gain physical access to your machine or account. In most scenarios, hackers do these actions to either access a user's private information such as their bank/credit card information or to use the user's account/machine in some other nefarious action such as a zombie in a DDoS attack.

What is Geolocation?

Technology has come a long way and is constantly evolving every day and it's no exception with geolocation. Thanks to this, geolocation has found a very strong and everyday use in today's world. RFID (radio frequency identification) tags have come about as a result of this and function as neat little devices which can be tagged to other items that have no means of connecting to the Internet. Through this, one can then geolocate these tags and their tagged objects.

What is Cloud?

The Cloud is a general term referred to as the Internet in a broad way. It generally refers to accessing computer, storage and applications over the Internet. It should be noted that these services involve the use of some extremely powerful machines, mega scale storage devices in remote locations that the user would not be able to access physically.


Public DNS

To first understand what a Public DNS is, we must first recognize what DNS means to begin with. In its simplest definition, the DNS (or the Domain Name System), is basically an Internet service that functions like a giant dictionary. This dictionary maps the IP address of every website to a human-readable name called a domain (or host) name. This service functions when a user enters the name of some website into a browser's url bar (for example, https://www.iplocation.net) to visit that website. Most ISPs provide a set of DNS servers for it's customers to use, and they are usually private designed to be used by their customers only.