Blog


What is a Smart Contract?

A smart contract is a computer protocol which was designed with the goal of digitally facilitating, verifying, or enforcing the negotiation of a contract. Through the protocol, credible transactions can be successfully processed without the use of a third party and are trackable and immutable; that is, they cannot be modified or removed after being successfully completed. Their entire purpose for being designed is to provide a higher level of security unattainable by traditional contractual law and to reduce other transaction costs associated with the traditional process.

What is a Botnet?

The most recent news of huge cyber-attacks using “Zombies” and “Bots” will not be alarming. This will not create this enthusiast think, even for a second, that the digital world has been taken by the living dead creatures or yet alien armies. But one thing will come to realize the "Botnets".

What is the Keystroke Logging?

Keystroke logging, also called keylogging or keyboard capturing, is the action of recording and saving each keystroke on a keyboard over sometime, usually covertly. This is so that the person who enters the information onto to the keyboard remains unaware of having their information be monitored. The action is done through a logging program which is called a keylogger and it can be either software or hardware.


What is a Man in the Middle Attack?

A man-in-the-middle (MITM) attack is a special type of attack in which an attacker covertly relays and potentially alters data between two parties on a network. These parties are usually oblivious to this attack and believe their connection and communication between each other is secured and their messages have integrity; however, that is not the case. The basis of the attack is to circumvent mutual authentication between the two parties and it can only be considered successful if the attacker can successfully impersonate the involved parties to each other. That is to say, the attacker must appear like Person A to Person B and like Person B to Person A. While it is a very common form of attack, most protocols do provide some kind of endpoint verification process to prevent MITM attacks; such as Transport Layer Security (TLS) which can authenticate both parties via a mutually trusted certificate authority.

What is Network Address Translation (NAT)?

Network Address Translation (NAT) is the process of remapping one IP Address space into another by modifying the network addressing information in IP header packets. This process occurs while the packets are in transit across a traffic routing device and was originally used as a shortcut instead of having every individual host readdressed whenever a network was moved. Since then, however, especially thanks to the exhaustion of IPv4 addresses, NAT has become a popular and essential tool for conserving global address space. This is because even just one Internet-routable IP Address of a NAT gateway can be used for an entire private network.

Cyberbullying by the Numbers

Cyberbullying has been around for decades, but it isn’t until today that it has been catapulted as one of society's biggest social issues. With technology’s unprecedented growth comes the increased integration of these innovations into our everyday lives. More and more people are being sucked into the void of social media, regardless of race, age, or social standing.


How does ZigBee Work?

With a plethora of high data rate communication standards not suitable for communicating with sensors and actuators, a system designer primarily looks for a standard to work effectively with low-power requirements and low-latency. Though it was initially built as an alternative to Bluetooth because of its inefficacy to work in certain applications, ZigBee is best suited for IoT devices including industrial automation, embedded systems, home automation, etc.

How to Prevent Your Social Media Account from Being Hacked

If you've ever noticed any strange activities on your social media account such as unknown posts, messages or notifications? If so, then you may have been hacked. A small hack of your social media account may result in some embarrassing posts or photos that you disagree with but are primarily a joke. However, large attacks can be serious, potentially leading to the theft of personal and financial information or even identity theft.

How to detect and prevent a DNS Leak while using VPN?

Domain Name Service (DNS) is a mapping of a domain name to an IP address, so that humans can remember computer address by a domain name instead of IP address. A DNS service is requested automatically when someone enters an web address on the web browser, so that the server knows how to find a website. When a user connects to the internet via a home router, the router gets an IP address and DNS server IP addresses via the DHCP it's Internet Service Provider (ISP). You may choose to use public DNS servers instead of the ones provided by your ISP by configuring your Internet connection manually.


What is Multi-factor authentication?

Multi-factor authentication also commonly known as MFA is an authentication process where more than one authentication mechanism is incorporated. A common implementation of MFA is the 2FA, which stands for 2-factor authentication. In a 2FA, two different authentication mechanisms are combined to successfully authenticate a user.