Skip to main content

Posts

Showing posts from February, 2020

How the Router works?

Router is device which forward data packets from the device to the internet and bring the requested data packets from the internet to the device, accurately. Router is the gateway of the internet . Router is used for the purpose of splitting the signal to share it, with more then one devices at the same time. To understand the concept of the router ? How it works? Let’s take an example, suppose you have to post a letter to your friend living in Delhi. For that you have to mention postal address in the letter. And post in the post box. From the post box it goes to the nearest post office from their it goes to nearest post office of the mentioned postal address. Now post office send this letter to the destination. Now, in this example consider letter as “ data packets ” and postal address as “ IP address ”, post office as “ router ”. Imagine the same scenario what will happen: When you request for some on internet data packet is send to the router with...

Is Vodafone idea going bankrupt?

As we known after the launch of JIO telecom industry has been boost up 3X time in the past 2 year. As new competitor arrived prize of data plan reduced 80%. The Indian government liberalised the telecom sector as per the National Telecom Policy in 1994, under which licences were given in accordance to the Indian Telegraph Act, 1885. Under this century-old law, telcos are required to pay a fixed annual licence fee for licences granted to them. Since fixed licence fee was high, telcos often defaulted on their payments. The government in 1999 announced the National Telecom Policy, which gave these companies an option to migrate from fixed licence fee to revenue sharing fee. As per the new policy, 15 per cent AGR was fixed as a licence fee under the revenue-sharing model, which was later reduced to 13 per cent and then 8 per cent in 2013. Telecom companies owe Rs 1.47 lakh crore to the DoT, including Rs 92,600 crore as licence fee and Rs 55,100 crore as spectrum usage ch...

Bitcoin mixer Service

As we know bitcoin was created to keep user information private. But as the time pass people discovered that bitcoin isn’t as anonymous as most of the user think. So, to improve Bitcoin anonymity, bitcoin mixer service is created. How this service works? Let’s take an example assume you want to make banana milk shake. For making milk shake, firstly you have to cut banana into small pieces and then put it into mixer and add some milk into it, next start the mixer after minute milkshake is ready. Now you can’t differentiate banana and milk. Similar happen in bitcoin mixer. Banana are your bitcoin and milk is other user’s bitcoin who uses bitcoin mixer and banana milkshake is the output of mixer, where you can’t differentiate your bitcoin and other user’s bitcoin. In short, Bitcoin mixing service breakdown your bitcoin into smaller, different parts. Next they mix them up with coin from other address is that third parties will find extremely difficu...

Is Bitcoin fully anonymous?

Bitcoin is not entirely anonymous. Each user has public address that can be tracked theoretically, through proper network analysis.       Bitcoin are stored in wallet and wallet have your personal data. When we transfer bitcoin, a message is broadcast In public about the transaction, we declare that bitcoin in been exchange so that miner can confirm our transaction and put it in the bitcoin blockchain network. This data is publicly broadcast and permanently stored on the bitcoin blockchain which has the address from where it came from and amount transfer. Using this hacker can reach to your wallet and get all personal detail, amount of bitcoin you have, and also have access to see your future transaction. To remain private though, this thing bitcoin mixing was introduced. How bitcoin mixer works? How it maintains our privacy? That will be explained in the next blog. Thanks for reading the content. If you like the content share it...

What is Malware?

Malware: When we think about malware, we say it’s a sort of virus, which not true in technical point of view. So, terminology is “Virus is type of Malware”. You would have encounter unexpected ads on your screen will surfing on web or sudden sound played, they are malware so stay always from this type of site. Malware is malicious code which is created with an intended of harming your computer system or stealing your personal data as well as for creating money through the malware by selling it to at highest bid on the dark web or by asking directly to from the victim for get rid of the malware. Common Type of malware: 1. Ransomware This malware gets into the system, encrypt and block access of the data and the key is sent to the hacker. To regain the access hacker, ask for an amount of money from the victim. The payment for this type pf things is done through cryptocurrency because they are untraceable. 2.Spyware. Spyware spy your acti...

How Google Authenticator app works?

In our previous blog we talk about 2-Factor authenticator app. So, I thought let know about the algorithm it work on. The TOTP algorithm generate single time password also known as token which are only valid for a certain period of time. This generated token are depend upon shared secret key. This algorithm was published as RFC 6238 by Internet Engineering Task Force (IETF) . TOTP is extension of HMAC based OTP algorithm. This algorithm is used by 2-factor authentication app for creating dynamic pattern of code. Without any further due let’s hope into it. Before getting started let me introduce you to a term called "Unix Epoch Time" . Unix Epoch Time (T(Unix)) is the m=number of second that elapsed(passed) since 1 Jan 2017 00:00:00 UTC not counting leap second. TOTP Algorithm: 1. Assume a date and time at which you want the code. So, I take 4 Dec 2018    12:24:20 T(Unix)=1543926260 Sec N=floor (T(Unix)/sec) N=counter which tell...

How to stay secure?

We are living in an era where technology is developing at a great pace and due to these security issues are also increasing day by day. Due to which our privacy is no longer private. I wouldn’t speak out the name because I will be judgmental. So, in this I will tell you how you can remain secure up to an extent. Becoming completely anonymous is difficult . Without a further due let’s see my ways to remain secure and private. Note: Here I will tell you about bot PC as well as Smartphone but majority of content will be concentrating on PC 1.       Update your PC and Smartphone. 2.       Admin privileges 3.       Browser 4.       2-step verification. 1. Update your PC and Smartphone. By this mean to say always keep your system and apps up to date. Whenever they push an update do it. That’s for your benefit. Why this important is because majority o...

Bitcoin Mining

Now you know the concept of bitcoin? And if don’t? I recommend you to read our previous blog. Now let’s understand what is bitcoin mining and how the bitcoin is created? Bitcoin mining is the backbone of the Bitcoin Network.  Miner are the one which make the network secure and confirm bitcoin transaction. By mining, you can earn cryptocurrency without having to put down money for it. Bitcoin mining: It is a decentralized computational process that serves 2 purposes: 1.Confirmation transaction in trustful manner when enough computational power is devoted to block. 2.Creating a new bitcoin with adding each block.     Sound cool right just confirm the transaction and add a block of that transaction into the bitcoin blockchain. But it’s not that easy.   In order to earn a bitcoin for a miner from verifying the transaction two things have to occur.  Firstly, they must verify 1-megabyte (M.B) worth of transaction, which c...

What is Bitcoin?

Before we understand what, is bitcoin and how it works? We must know why bitcoin was created? Bitcoins is created to cut the middleman (Bank) from the transaction process. To understand this let’s take an example assume you want to send money to your friend who is in U.S. Now to send money it go through a bank in your country. Here now bank take fee for processing. Once the money reaches the bank in U.S. Now the friend’s bank will charge fee too. Now let assume it’s ok they take fee that’s not a problem. But bank store lots of personal data about their customer. Before the invention of Bitcoins. Many banks where been hacked during this period of time. Which is very dangerous for the people that use the bank because their privacy is at risk. So this how bitcoin was introduced. So, now let’s see what is Bitcoin? In laymen’s term: Bitcoin is a digital currency. That’s a concept that might be more complex than you realize , it isn’t simply an assigned value of money st...