Blog Category


What is a Smart Contract?

A smart contract is a computer protocol which was designed with the goal of digitally facilitating, verifying, or enforcing the negotiation of a contract. Through the protocol, credible transactions can be successfully processed without the use of a third party and are trackable and immutable; that is, they cannot be modified or removed after being successfully completed. Their entire purpose for being designed is to provide a higher level of security unattainable by traditional contractual law and to reduce other transaction costs associated with the traditional process.

What is a Network?

A network is a connection between one or more nodes (devices) regardless of distance and size. They are established for the sake of communication of data between the nodes. To accomplish this, the nodes will utilize circuit switching, message switching, or packet switching to send the data through from one signal to another. They are the basis for telephone networks, computer networks, and the Internet as a whole.

The User Datagram Protocol (UDP) is one of the core protocols of the Internet Protocol (IP) Suite in the transport layer. The protocol’s primary purpose is for the use of sending messages (datagrams) between two endpoints across the Internet without the need of a pre-existing data path from prior communication between the endpoints. This is what is referred to as connectionless communication and is ideal in situations where error-checking and error-correction are not needed between two endpoints. In these scenarios, the datagrams can be sent between the two endpoints faster than using the Transmission Control Protocol (TCP) and Stream Control Transmission Protocol (SCTP) as the overhead generated from error-checking and error-correction is no longer a factor. This makes UDP very popular and a very optimal solution in these types of situations as it would be more preferred than its counterparts.

Public Wi-Fi is a lifesaver if you're trying to save on data usage or you need the Internet access, but sometimes the consequences of using public Wi-Fi can outweigh its convenience. Whether you're in a coffee shop, public library, university or an airport, all free Wi-Fi hotspots are equally susceptible to hackers and other data thieves. To mitigate these risks, users must take preventative measures to ensure that they are using public Wi-Fi safely.

Network Address Translation (NAT) is the process of remapping one IP Address space into another by modifying the network addressing information in IP header packets. This process occurs while the packets are in transit across a traffic routing device and was originally used as a shortcut instead of having every individual host readdressed whenever a network was moved. Since then, however, especially thanks to the exhaustion of IPv4 addresses, NAT has become a popular and essential tool for conserving global address space. This is because even just one Internet-routable IP Address of a NAT gateway can be used for an entire private network.

What is a firewall?

Firewall is one of best security mechanism that monitor and control the network traffic incoming and outgoing, based on predefined security rules. The firewall is always established between trusted internal and some other outside network (can be internet), assuming that outside network unsecured and untrusted. There are mainly two kinds of firewalls, host-based firewalls and network firewalls. Some of firewall provide additional services like DHCP (Dynamic Host Configuration Protocol) or VPN (Virtual Private Network) services for the internal network. There are Three generations of firewalls named First, Second and Third. First generation firewalls were based on packet filtering. Looking at the network address (IP) and the port of the packet, it determined whether packet is to block or allowed. If a particular packet or series of packets did not match for packet filtering rules, those were simply dropped. In 1988 first packet filter firewall was developed from Digital Equipment Firewalls. If packets do not match the rules, the filter will reject or drop the packet. These filtering works on the first three layers (physical layer, data link layer and network layer) of the OSI (Open Systems Interconnection) model.

What is SSH?

Secure Shell (SSH) is a cryptographic protocol with the focus for secure data communication over a network. It's most common application is for remote login by users onto other systems; usually servers. The protocol was designed to be the successor and replacement to Telnet and other similar unsecured remote shell protocols as they all sent information in plain text which made them privy to attacks. As this information was user login credentials, the demand for the encryption of this data was something deeply sought after to ensure security. While the protocol does achieve this function, recent incidents involving the files leaked by Edward Snowden has revealed that the National Security Agency (NSA) is actually capable of sometimes decrypting the protocol.

The File Transfer Protocol (FTP) is a protocol used in the Internet Protocol (IP) Suite used for the transferring of files across a network between a server and a client. The protocol was built from the ground up with the client-server model in mind and utilizes different connections for data and control between the two. Users can authenticate themselves with a clear-text sign-in protocol which is usually in the form of a username and password or they can connect to the server anonymously if it is configured to allow it. Transmissions of a user's login credentials can be secured by Transport Layer Security / Secure Sockets Layer (TLS/SSL); which can also encrypt the content of transmissions. Should this not be the case, the information is transmitted unencrypted which leaves it susceptible to a sniffing attack. In some scenarios, SSH File Transfer Protocol (SFTP) might be used but it should be noted that the protocol is technologically different than TLS/SSL.