Blog


What is Cross-Site Scripting (XSS)?

In the world of technology which is constantly growing and improving comes with increased risks and security vulnerabilities that those with malicious intent seek to take advantage. Cross-Site Scripting (XSS) is one such method which is primarily used in web-applications to allow the attacker to inject client-side scripts onto web pages. This type of attack is called code injection. Unsuspecting users then view these web pages which then give the attacker a means of bypassing authorization for access controls. One such access control is the same-origin policy which follows that a script running on a web page is allowed to run on the same web page only if they are both of the same origin (URI scheme, hostname, and port number). Typically, this would prevent a malicious script from one web page to go to another web page and access sensitive data and information; however, XSS bypasses this by taking advantage of security flaws in web applications' servers or plug-in systems. Once the attacker has successfully taken advantage of one of these vulnerabilities and compromised the site, unsuspecting victims have basically granted the script the same level of permissions they would have given to the site, such as access to cookies. This would then allow the attacker to view any sensitive information a user might be inputting onto the site ranging from passwords to credit card information. The website's page content, session cookies, and browser-maintained information would all be accessible by the attacker at this point.

What is smart homes?

Due to the advancement in network technology, a trend in “Smart Homes” has developed allowing users to control each device remotely in their home. In this article, we will define what a Smart Home is, what technologies are used, and how this can be advantageous to homeowners.

What is the private IP address?

The private IP addresses are the reserved IP address blocks that cannot be routed through the internet. Since private IP addresses are only intended to be used in private networks, they are not globally unique. The private IP address must be unique within its network (usually LAN) so that there is no conflict between two computers within its network. Due to scarce nature of IPv4 Address (i.e. approximately 4 billion IP addresses), IANA reserved private IP address blocks so that they can be used by any organization without registering them with IANA. The private IP address block can be used in homes, small businesses, or even medium and large enterprises to create their own network. Computing devices with a private IP address cannot be directly accessed from the Internet unless NAT (Network Address Translation) is used. The advanced network planning techniques have also enabled network planners to use same private IP address within different private networks thus allowing them to save valuable IP address space. A private address may also be referred to as a local IP address. It also enables to hide the identity of the users over the Internet.

What is Cybersecurity?

Cybersecurity deals with the protection of computer systems, networks, and data from cyber theft and damage to hardware, software and information. Cybersecurity is equally important for companies as well as individuals.

What is the DNS?

The Domain Name System (DNS) is a decentralized naming schema of resolving domain (host) names into numerical IP Addresses. The IP Addresses are assigned to various computing devices and services on the Internet but because remembering a series of numbers is more difficult for people, it's easier to remember them by their corresponding domain names and have the DNS translate it into the relevant IP address. In this way, the DNS is equivalent to a telephone directory where you would look up a person's telephone number by their name. This is accomplished by having the DNS map domain names to the aforementioned Internet resources by giving authoritative name servers (Top Level Domain name servers) for each domain. This then allows network administrators to create their own sub-domains on their domain and have them connect to other name servers; thus, allowing for a decentralized, fault-tolerant, and distributed database. As this is the DNS main purpose, the handling of the domain name hierarchy namespace and IP Address translations, it is an integral part of the Internet communication at the Application Layer of the Internet Protocol Suite.

What is an Intranet?

The term intranet is comprised of two words: "Intra" means internal and the "net" represents the network. The Intranet, therefore, can be defined as the internal network. It is a private network with access limited to the authorized users only. The Intranet can be as simple as a private website or it can be as big as private organizational infrastructure, accessed by only the authorized users. The intranet may not necessarily be connected to the Internet but they usually do. In typical intranet architecture, there are specific computers in a defined parameter where each computer in the intranet plays a specific role to provide common tools and features to every computer connected to the intranet. There are vendors that provide the intranet portal software like Share Point, Igloo, and Huddle.

VPN Buyer's Guide

VPN has spread across markets owing to the high risks involved with online privacy. This is because of the increase in the number of cyber attacks. Hackers and malicious users constantly employ sophisticated techniques to intrude into networks. Today, a lot of people understand the importance of VPN and how VPN can encrypt data and provide security to the users while online. However, there is no specific guideline available for a VPN buyer. Not every VPN will suit your personal requirements and hence there is a comprehensive checklist that we have compiled to help you guide through buying a VPN.

What is Internet?

Internet can be defined as the worldwide network where machines like computers, servers, and smart devices are connected together for communication and data exchange purposes. In the layman's terminology, the Internet is the network of networks interconnecting computing devices located throughout the world. These networks use some communication protocols to link the network devices with each other.

What is Wi-Fi?

A Wi-Fi (also known as WiFi) is a wireless network technology which allows WiFi enabled devices to communicate with each other, and also share the Internet without wired connectivity. Wi-Fi is based on 802.11 IEEE network standard which uses radio frequency signals to transmit data. The distance supported by Wi-Fi network depends on the type of Wi-Fi radio and antenna in use, and whether the environment is open or enclosed within walls and bricks. As the distance between the Wireless Access Point (WAP) and mobile device move farther away, the radio signal weakens and the transmission data rate slows down until the signal is not strong enough to be usable. The performance of Wi-Fi network also varies depending on the type of standard employed by the Wi-Fi devices, namely 802.11 (a), (b), (g), (n) and (ac).

How accurate is IP-based Geolocation Lookup?

By finding IP address of yourself or a person you wish to lookup, the geolocation lookup tool provide you with an estimate of where this IP address is located. American Registry of Internet Numbers, also known as ARIN, maintains the Whois Database containing contact and registration information for IP addresses. The companies requiring IP addresses obtain and register them with ARIN, and those IP addresses obtained are assigned to their users and customers. Internet Service Providers (ISPs) assign a dynamic IP address to a user when their customers connect to the Internet. Since a company may be located throughout a large region (or a country), the accuracy of geolocation may vary depending on how they assign them to their users.