Iliya Garakh, CTO

Iliya Garakh, CTO

How secure is WebSocket?

What is WebSocket?The WebSocket API is a cutting-edge technology that allows the opening of bidirectional interactive communication sessions between a user's browser and server. You can use this API to send messages to a server and obtain event-driven responses instead of polling the service. WebSocket is a stateful protocol
—4 min read

WPS – What is it, and how does it work?

If you’ve ever set up a wireless router on your own, you’ve probably heard of WPS. You might come across this term in the router’s configuration menus or see it on the backside of your router — but do you know what WPS actually means and how it
—4 min read

CAPTCHA — How does it actually work?

Upon entering your account on a website or in an app, you might be asked to enter a word or a number combination from a strange-looking picture. They are usually distorted and sometimes it can take a few seconds to determine the symbols on the picture. This security step is
—4 min read

What is the most private internet browser in 2022?

When we look at the statistics, the number of cybercrimes increases year on year. Hackers have invented a wide range of tools that can crack your password or get your access information with ease. But there are also other ways of violating your privacy. Every click you make is tracked
—5 min read

The brute force attack: definition and examples

What is a brute force attack?Among a myriad of different cyberattacks, the brute force attack seems to be the most common and primitive way of hacking. This technique involves guessing login information through trial-and-error, where hackers try all conceivable combinations in the hope of guessing correctly. The term “brute
—4 min read

What is a firewall and how does it work?

Hacking attacks are often pretty minor and can include things such as personal data theft for the purpose of extortion. These attacks usually fail, but can sometimes be really devastating when the subject is a business or government organisation; we’re talking huge monetary losses. There are a huge variety
—4 min read

How to check if you’ve been hacked & the next steps

Almost every user of the internet faces hacking at least once. Cybercriminals have invented a wide range of techniques that aim to crack your password or harvest the credentials and personal data including financial and banking details that are stored on your computer. The timely detection of break-ins may save
—4 min read

Password-cracking techniques used by hackers

Which words pop into your head when creating a password for your new account on a website or on a social network? Safety? Privacy? Well, there’s some bad news for you here — in our digital world, hackers are clued-up on hacking any kind of password that you can think
—5 min read

How SHA-256 works

If you've heard of ‘SHA’ in various forms but aren't sure what it stands for or why it's essential — you’re in luck! We'll attempt to shed some light on the family of cryptographic hash algorithms today. But, before we get into SHA, let's go over what a hash function
—5 min read

How secure are iOS and Android, really?

According to a survey conducted in February 2021, 46% of participants stated that on average, they spent five to six hours on their phone on a daily basis. That means for almost half of you, a quarter of your life’s security will be dictated by your choice of mobile
—5 min read

What is a VPN?

Why do you actually need a VPN?Virtual Private Networks (VPNs) encrypt your data and hide your online activity from third parties, allowing you to surf the web anonymously. Web servers collect information about your computer's IP address and other information about your browsing history when you visit a website
—4 min read

How to recover your Facebook account

Are you having trouble remembering your passwords or accessing your account? Perhaps you’re stressing out that you may have been hacked? Well, in any case, restoring your Facebook account utilising reliable Facebook account recovery solutions shall be covered by this article, so buckle up! In order to regain access
—4 min read

I forgot my GMail password!

Of course, losing access to your Google or Gmail account is going to be upsetting. If you've forgotten your password, or if someone has hacked into your account and changed it, Google provides a list of actions that you may take to regain access to your account. Indeed, they may
—5 min read

Comparison of instant messaging protocols

Since the dawn of the internet, the world of chat programs has seen drastic transformations. Given that not that much time has passed since the creation of the first chat app — CompuServe's CB Simulator — the rate of progress and development is quite astounding. Chat protocols and frameworks are the subject
—4 min read

What is quantum cryptography?

If the concept of ‘quantum cryptography' sounds complicated to you, you're right. That’s why this ‘encryption tutorial for dummies’ shall demystify the concept and provide an explanation in layman’s terms. Quantum cryptography, which has been around for a few decades, is becoming more and more important to our
—4 min read

What is Web3?

I’d like you to reflect on your personal interactions when it comes to the internet. Consider the impact that the internet has had on society. Have these two things changed with time? Of course. Indeed, with more social media platforms and apps for mobile devices than ever before, we’
—4 min read

What is BitTorrent?

Most of us have heard of torrents, and have likely also used torrents to download movies, books, music, TV shows, games, and so on. But, you’ve probably still got one question that remains unanswered — what are they? BitTorrent is well-known as a technology for piracy, although its genius isn’
—4 min read

What is the IEEE 802.11 Standard and its security?

Despite the fact that Wi-Fi is a trademark owned by the Wi-Fi Alliance, an organization committed to certifying that Wi-Fi equipment fulfills the IEEE's set of 802.11 wireless standards, the name ‘Wi-Fi’ is associated with wireless access in general nowadays. These specifications, which include 802.11b (pronounced "Eight-O-Two-Eleven-Bee," omitting
—5 min read

What is End-to-end encryption?

End-to-end encryption has been introduced by many communication providers in recent years, notably WhatsApp and Zoom. Although those companies have tried to explain the concept to their user base several times, we believe they failed. Whilst it's clear that these platforms have increased security, most don’t know how or
—4 min read

Why Zero-Knowledge Encryption is the best

In this year of our lord, 2022, the term ‘Zero-Knowledge Encryption’ equates to best-in-class data insurance. We’ve already written an article named “What is Zero-Knowledge Proof?”, so we’re not going to look at definitions here, but rather, we’re going to explore the pros and cons of Zero-Knowledge
—4 min read

An Overview of ‘Let's Encrypt’

Many times, we’ve mentioned self-signed certificates and their most common use cases in our blog. After all, the main difference between a regular certificate and a self-signed one is that in the latter case, you act as the CA (Certificate Authority). But there are a variety of services that
—4 min read

7 ways to create self-signed certificates on Windows

Self-signed certificates are widely used in testing environments and they are excellent alternatives to purchasing and renewing yearly certifications. That is of course if you know how and, more importantly, when to use them. Remember, that A self-signed certificate is not signed by a publicly trusted Certificate Authority (CA). Self-signed
—4 min read

What is Zero-knowledge Proof?

It is rare for technologies to be born from ambitious philosophical concepts or mind games. But, when it comes to security and cryptography – everything is a riddle. One of such riddles is ‘How can you prove that you know a secret without giving it away?’. Or in other words, ‘how
—4 min read

What are SSL Vulnerabilities?

The Secure Sockets Layer (SSL) and the Transport Layer Security (TLS) cryptographic protocols have seen their share of flaws, like every other technology. In this article, we would like to list the most commonly-known vulnerabilities of these protocols. Most of them affect the outdated versions of these protocols (TLS 1.
—5 min read

SSL best practices to improve your security

Security, security, security… There is no way one can underestimate the importance of it when it comes to caring for private files and sensitive data. As long as the world of cybersecurity is privy to the constant conflict between hackers and programmers, fully protecting yourself and your business will forever
—4 min read

What OpenSSL is used for?

Most web servers across the internet and intranets alike use SSL certificates to secure connections. These certificates are traditionally generated by OpenSSL – a software library containing an open-source implementation of the SSL and TLS protocols. Basically, we’re looking at a core library, providing us with a variety of cryptographic
—7 min read

What is a Self-Signed Certificate?

The SSL/TLS protocol’s job is to ensure security through authentication. It was designed to encrypt data transmitted over open networks and, as a result, protect against interception and spoofing attacks. TLS also authenticates communicating parties, which leaves us with a pretty trusting environment. It goes without saying that
—4 min read

What is a Proxy Server and How Does it Work?

Stuck between a proxy and a hard placeLet’s imagine that you’re managing a small team, all of whom are coming back to work after a relaxing furlough period. Of course, you’re going to notice a drop in productivity; your team has become accustomed to browsing YouTube between
—5 min read

What is password hashing and salting?

Cryptography is both beautiful and terrifying. Perhaps a bit like your ex-wife. Despite this, it represents a vital component of day-to-day internet security; without it, our secrets kept in the digital world would be exposed to everyone, even your employer. I doubt you’d want information regarding your sexual preferences
—5 min read

What is Transport Layer Security (TLS) & how does it work?

Let's imagine that you decided to google ‘best sauces for Wagyu steak’. You went through several web pages, and then on page two of the search results, you get this notification from your Chrome browser: Something went wrong, that's for sure. What happened? Should you proceed to the page without
—6 min read

What is LDAP and how does LDAP authentication work?

Let’s imagine that somehow you’re in the driver’s seat of a start-up, and a successful one too. You’ve successfully passed several investment rounds and you’re well on your way to success. Now, big resources lead to big data and with big data, there’s a
—4 min read

What is PKI? A Public Key Infrastructure definitive guide

Imagine you’re a system administrator at Home Depot. Just as you’re about to head home, you notice that your network has just authorized the connection of a new air-conditioner. Nothing too peculiar, right? The next morning, you wake up to find that terabytes of data including logins, passwords
—5 min read

Why do I need a password manager?

If you’re reading about password managers for the first time, you’re probably wondering why such a tool exists. Well, to help you out, we’ve compiled a ‘top three’ for password-related company pains. Moreover, we’ll illustrate how a password manager, like Passwork, can help you and your
—3 min read

Application design: Data-driven vs Domain-driven

Information technology is developing by leaps and bounds. There are new devices, platforms, operating systems, and a growing range of problems, which need to be solved by developers. But, it’s not so bad—new development tools, IDEs, new programming languages, methodologies, etc., rush to help programmers. The list of
—7 min read

Market segmentation

Positioning is an important aspectPositioning is so important that, if this stage is skipped, all other efforts of promotion of the product could be ruined. Good positioning should be short, clear, and understandable. Therefore, it is often described in one sentence or is made to fit in a tweet. Positioning
—3 min read

What is Growth Hacking

After initializing their first releases or MVP (first minimal product-release), startups are faced with the challenge of promoting and marketing on the Internet. If they do this through Yandex or Google AdWords, a single click designed to attract customers can cost $1 or more, and the cost of publishing a
—3 min read

29 best useful services to protect your business

1. PureVPNPureVPN, which is one of the best VPN apps for Android devices, operates a self-managed VPN network that currently stands at 750+ Servers in 141 Countries & promises the fastest speed possible. Since we own our network, there are no third-parties involved and NO logs of your activities. 2.
—7 min read

8 things you should consider before selecting a corporate password manager

A couple of guesses... your mother's maiden name, your date of birth, your pet's name. And Bam! It's stolen. Password theft has become increasingly common. While the most infamous one was the 2014 Russian hacker incident when someone stole more than 1.2 billion passwords, it’s not the only
—6 min read