Blog


How a VPN Helps Avoid Ad Targeting to your IP Address

Have you ever visited a website, filled up your cart, then left the website before completing your purchase — only to see an ad elsewhere online for that website the next day? IP Retargeting is a marketing tactic used by many industries. Websites can keep records of the IP addresses window shopping their pages, then target ads to those IP addresses in an effort to gain its patronage. Instead of broad advertisement strokes which may or may not reach the right audience, targeting specific IP addresses speaks to an audience most likely to revisit the website and complete a purchase.

Cyberbullying Case Studies

With a number of social media platform cohesively blended into our lives, our online activities can be easily viewed by friends, acquaintances, and many strangers. Cyberbullying is harder to notice at times as unlike traditional bullying, it happens in the virtual world and there is a possibility that it might not happen in publicly accessible forums and groups. When someone is bullied in the cyberspace, the victim generally starts distancing himself or herself from the internet and avoids social activities and gatherings. Moreover, cyberbullying also leads to eating disorders and improper mental health. In this post, we will discuss two infamous cases of Amanda Todd and Tyler Clementi.


What is ARP Spoofing?

The Address Resolution Protocol (ARP) Spoofing attack, also called ARP Cache Poisoning or ARP Poison Routing, is a technique by which an attacker sends spoofed ARP messages onto a Local Area Network (LAN). It is used to allow the attacker access to incoming internet traffic on a LAN by having their Media Access Control (MAC) Address be linked to the Internet Protocol (IP) Address of another host (usually, the default gateway). Through this, they’re able to receive incoming traffic intended for that IP Address which allows them to intercept the data, modify traffic, or even stop all traffic on the network. Because of this, the technique is often used to open up the possibility of other attacks such as a Denial of Service (DoS) attack, a man in the middle attack, and a session hijacking attack. The success of the attack depends heavily on the attacker gaining direct success to the targeted local network segment and it can only be used on networks which use ARP.

What is LDAP Injection?

The Lightweight Directory Access Protocol (LDAP) is a standard application layer protocol in the Internet Protocol (IP) Suite used for accessing and maintaining distributed directory information services over a network. This is achieved by the protocol's methods to query and manipulate these directory services. Directory services are integral in setting up an Intranet and internet applications through allowing the sharing of the user, system, network, service, and application information on the network. For example, a corporate email for an organization and a telephone directory are both only achievable through directory services. As such, these records are always stored in an organized and often hierarchical structure.

What is a firewall?

Firewall is one of best security mechanism that monitor and control the network traffic incoming and outgoing, based on predefined security rules. The firewall is always established between trusted internal and some other outside network (can be internet), assuming that outside network unsecured and untrusted. There are mainly two kinds of firewalls, host-based firewalls and network firewalls. Some of firewall provide additional services like DHCP (Dynamic Host Configuration Protocol) or VPN (Virtual Private Network) services for the internal network. There are Three generations of firewalls named First, Second and Third. First generation firewalls were based on packet filtering. Looking at the network address (IP) and the port of the packet, it determined whether packet is to block or allowed. If a particular packet or series of packets did not match for packet filtering rules, those were simply dropped. In 1988 first packet filter firewall was developed from Digital Equipment Firewalls. If packets do not match the rules, the filter will reject or drop the packet. These filtering works on the first three layers (physical layer, data link layer and network layer) of the OSI (Open Systems Interconnection) model.


Is my Incognito Browser Private?

Incognito has a pretty catchy name - it sounds private, secure, and makes you feel like you can browse the web without leaving a recordable trace. However, the reality of incognito browsers is quite contrary.

What is Z-Wave?

With home & industrial automation slowly getting prominence across the globe, the efficiency of supporting infrastructure to perform as desired plays a significant role. Just like Zigbee, Z-Wave is one such protocol which supports communication between smart devices. Z-Wave relies on Radio Frequency (RF) for performing signaling and controlling operations.

What determines the speed of your internet?

There is really no one specific thing that you can say determines the speed of your internet connection because there are several players and components responsible to deliver internet to your PC or laptop. Internet speed is not just determined by the speed of your computer’s processor as many people think.


How to secure your home network?

Our home router has become an internal part of the global communication footmark when the use of the Internet has developed to contain home-based telework, entertainment, personal financial management, social networks, school work, and businesses. The router facilitates the broadened connection. Almost all these devices are pre-configured by the company that made and are plug and play for immediate use. After installing a router at home, people frequently connect directly to the World Wide Web without conducting any additional configuration. People might be reluctant to enhance safeguard configurations because those configurations may seem a bit difficult or people are unwilling to spend more time with these advanced configuration settings.