Cyberbullying — What, Why and How“Do you know why people like violence?… Humans find violence deeply satisfying. But remove the satisfaction, and the act becomes… hollow.”Dec 23, 2023Dec 23, 2023
VPN — Privacy on the Surface WebPrivacy is a Human Right (UNHRC). But the Internet provides very little to enforce this basic Human need. Thus, VPN.Aug 22, 2022Aug 22, 2022
Multi-factor Authentication | Setup 2-Factor AuthenticationLearn how to setup 2FA for your account and the different nuances of Type 2 Authentication.Jul 28, 2022Jul 28, 2022
Multi-factor Authentication | Are Passwords Enough?If you have logged in anywhere on the internet, you probably have done so using an “Username” and “Password”. Passwords have been around…Jul 22, 20221Jul 22, 20221
Single Sign On | SAML vs OAuthIf you have ever been confused by Jargons such as Single Sign On(SSO), Federated Identity, OAuth, SAML, this article is for you.Apr 23, 2022Apr 23, 2022
Load Balancer Bottleneck, DNS Round Robin and Baker StreetLets put our Load Balancers to test, if the survive the era of Cloud and IoT.Apr 17, 2022Apr 17, 2022
Load BalancerThe previous article explores the different ways a Server or Router can be overburdened. Load Balancers to our Rescue.Apr 4, 2022Apr 4, 2022
DoS, DDoS & Order 66 of the InternetWhen you hear terms like “Server is Down”, or see that annoying loading screen on browsers, here’s what probably has happened…Mar 26, 2022Mar 26, 2022
De-Militarized Zone — Network’s Living RoomWe got a Living Room for our House? Why not for our Network?Mar 11, 2022Mar 11, 2022
Age of Extreme AI | Where did we go Wrong?AI has always been Hungry for Data and Processing. We fed the Data. Where did we go Wrong with Processing?Mar 8, 2022Mar 8, 2022