Understanding the Ways to Protect Your Online Privacy.

In this segment of Security articles, we are going to understand the ways and smart techniques required to protect your data privacy and other concepts related to it. With the expansion of personal computing devices, the sudden increase in social media and in the numbers of individuals connected to the Internet, privacy is currently more […]

Understanding the Role of Consensus Mechanisms in Blockchain.

In this segment of Blockchain articles, we are going to understand the role of Consensus in blockchain, it’s properties, and other concepts related to it. Consensus mechanisms permit the secure updating of a distributed shared state. Common methods used for achieving fault tolerance (defined below) in a distributed network system is to maintain or distribute […]

Understanding the Network Segmentation and Its Types.

In this segment, we are going to understand the role of Segmentation in networking, how it works and more other concepts. Segmentation is the way toward compartmentalizing a network system into smaller zones. This can take numerous structures, including physical, logical network systems, endpoints and many more. Network System Segmentation Both network system segmentation and […]

Understanding the Working of Viruses and Antiviruses.

In this segment, we are going to understand how viruses work, how antivirus detects viruses and more other concepts. Malicious Hackers need a program which carries a malicious payload that could hide  inside a non-malicious program and spread without depending on the victim running a particular program. These hackers discovered their answers in different computer […]

Understanding the Different Versions of HTTP and TLS.

Let’s follow the advancement of the HTTP and SSL protocols to their next forms. It was then brought to IETF, where it was received with moderately minor changes as HTTP/2. Then again, SSL experienced five corrections somewhere in the range of 1995 and 2008, when TLS 1.2 was adopted. TLS 1.2 managed the Web for […]

Understanding Rootkits and How do they work?

In this segment, we are going to discuss the Rootkits and how they work. Breaking into a computer is not simple, so once a Hacker gets in, his first objective is for the most part to ensure that he can get once more into that computer effectively whenever. The best to do this is to […]

Understanding The File Sharing Network and It’s Working.

In this article, we are going to talk about File Sharing Networks and also we will try to understand the working of different File Sharing Network Systems (Napster, Gnutella, BitTorrent). Everything started in 1999 when Shawn Fanning got tired of attempting to discover and download music records of the Internet. So he wrote a program […]

Understanding The File Sharing Network and It’s Working.

In this article, we are going to talk about File Sharing Networks and also we will try to understand the working of different FileSharing Network Systems (Napster, Gnutella, BitTorrent). Everything started in 1999 when Shawn Fanning got tired of attempting to discover and download music records of the Internet. So he wrote a program that […]

DoH (DNS Over HTTP) Quicky Explained.

If you are reading this, it means you are using the internet and heard about DNS, HTTP, IP, etc but apart from everything if we talk about Security and Privacy on the internet then I will say “Internet is Damn Big thing” to lose privacy easily.   There are lots of articles or videos on the […]

Understanding Wireguard, Installation and Configuration. Explained.

techRX wiregaurd

Those who want to set up a virtual private network (VPN) often struggle with a configuration that is not that simple. Wireguard promises that tunnel construction can also be easier and quicker. Introduction VPNs (Virtual Private Networks) are considered a secure number when it comes to connecting the home office to the company network, company […]

Ways To Prevent Identity Theft and Choose a Secure Password.

Identity fraud can overturn your life. It requires a huge amount of time and effort to fix the harm and the eventual outcomes can be felt for quite a long time or even years. Indeed, even the biggest organizations experience data breaches, suffering the loss of client passwords and individual data that would then be […]

Understanding the IPv6 Extension Headers and ICMP

This is (Seventh Article) in continuation of our last one article, a new series of networking articles. In this segment, we are going to discuss the IPv6 Extension Headers (in the previous article, we have talked about normal IPv6 Headers) and also, we will try to Understanding the IPv6 Extension Headers and ICMP. IPv6 Extension […]

What is Hypervisor and how many types we got here? lets find out.

In the last segment, we discussed what virtualmachines are and we talked about the idea of a Host. Likewise, we have clarified that there is Hardware, Software and a virtualization “layer”, which helps in creating and hosting the virtual machines. The virtual machines work within the Host, which is known as a Hypervisor. The hypervisor […]

The evaluation of mobile networks. (4G vs 5G).

At this time of digital world, if you are using a smartphone, there is a high possibility that you have come around the terms like LTE, 4G and the upcoming 5G. So, in this article,  we will go into details of these terms and understand in a better way. Introduction to History During the 1980s […]