Network Architecture

What does an architect do? He designs the way things should be placed in a construction. So, what does a network architecture tell? It defines how computers are to be connected, in an organized manner, to gain maximum efficiency and scalability. And also tasks are allocated and files are shared on the network. The most […]

Protecting Mobile Application- Developer Side

We know that nowadays the usage of smartphones is growing exponentially. The mobile devices that are in use are more than three billion according to Statista and it might grow to a much higher number in the coming years. Smartphones became an essential tool for all to maintain their personal data, business data, and many […]

Network Topology

Have you ever gave a thought about why our streets or roads and maps are designed in a particular way? Of course, for our convenience. How do you say it is convenient? When it is an efficient path, shorter and describable. So in the same way the paths are, networks are connected, more specifically networking […]

Hashing

From the cryptography introduction, we are aware of hashing! If not exactly remembering, a quick recap! Hashing or a hashing function is a type of operation that takes arbitrary data as input and converts it to an output of fixed size. The fixed size resulting output is known as a hash digest. Actually, the size […]

Internet Backbone

We are aware how the Internet works, atleast the basic working! For the information to reach us, it should travel a long way from the Servers. As a medium between us and the servers, there is Internet Service Provider(ISP). Across the globe, these ISPs may be connected to some higher level ISP that is with […]

Bandwidth, Speed and a Misconception

Let’s start using a metaphor or say analogy to understand the concept. Let us assume two sorts of pipes, one wider and the other narrow. Imagine that water is flowing from both the pipes. Which will flow faster? It’s obvious that the water in wider pipe since the wider can offer much speed than the […]

Ethernet Frame

Yes we are here again to the Ethernet!! We have learnt about what is Ethernet and how it works from the top. Now we will get little deeper by dissecting it! Woo, that sounds little biological. But yes, we will make the operation successful. We are already aware that data is transmitted in the form […]

Ransomware attack at LG and Mitsubishi

Two electronic giant companies are targeted by two ransomware groups. LG, a south Korean electronic manufacturer, and Mitsubishi, a Japanese car manufacturing company are now demanded for ransom in exchange for their data. LG has already been warned by Maze group regarding the leak. See the earlier news here! On 24 June 2020, Maze told […]

Brute Force Attacks

So far we are good with what are different types of attacks by using Malware, Trojans, Adware, etc. Now a small question. Have you ever used the same password for most of your logins across sites? Are we too lazy to remember too many passwords? Then our data is at risk. Forget about the same […]

No code with Amazon Honeycode

As always Amazon thrive to provide more amazing services, now it had launched the beta version of Amazon Honeycode through which users can easily build their web or mobile applications with minimum code or no code. All of this is backed by a database in AWS and a web-based, drag-and-drop interface builder. Developers can build […]

Update on NVIDIA for Windows May 2020 Update

Windows has release its May 2020 update with new features, may be with some flaws. The 1809 version users are forced to update automatically and optional update is provided for 1909 users. Learn more about the update! Sources: The Verge, Anandtech, windows-latest. NVIDIA is releasing a new driver update today that will support Microsoft’s DirectX […]

Data breach at LG

Maze Ransomware: It is a particularly sophisticated strain of Windows ransomware that has hit companies and organizations around the world and demanded that a cryptocurrency payment be made in exchange for the safe recovery of encrypted data. Apart from encrypting data from the companies, they exfilterate into the servers of other malicious hackers and then […]

Google trying to stop the reuse of passwords

Direct Source: theverge.com Fifty-two percent of people reuse the same password for multiple accounts, according to the results of a poll published in February 2019 by Google and polling firm Harris. Thirteen percent of people reuse that password for all of their accounts, that poll found. And Microsoft said in 2019 that 44 million Microsoft accounts used logins that had been […]

Methods to solve IP address errors

We have already learnt about what is IP address and its types. A quick recap: Let’s take an analogy to understand the concept of IP address. Earlier, we used to send the letters to the address of the home or office. Same as that, we receive the Internet as letters to our home address known […]

Ethernet

We are most used to WiFi nowadays due to the convenience provided by them. But, for businesses and data centers the traditional cables are being used as they are more reliable, fast, and secured. Ethernet is a technology that connects wired Local Area Networks (LAN) and enables the device to communicate with each other. One […]