Blog


What are Captcha and ReCaptcha?

Captcha and Recaptcha
With hacking attacks going to the next level, most websites have become more vigilant to shield every possible cyber-attack. Captcha is something that has been around for some time now and several top websites incorporate captcha. Captcha is a challenge-response test provided over the website. This is used to determine if the user is a human or an automated bot. Captcha was first formed in 1997 and was officially introduced in 2003 by John Langford, Nicholas Hopper, Luis von Ahn, and Manuel Blum.

What is phishing?

Phishing Attacks
Phishing attacks are something that is very common these days. While its evident that phishing attacks can have several repercussions, not many are aware in terms of what exactly gets classified as a phishing attack or is termed as phishing.

What is a web browser?

Web Browser
A Web browser also referred commonly as "browser" is a software which is used to access World Wide Web (www). The browser identifies individual URLs and displays the corresponding page on the user's device.


VyprVPN becomes the first VPN provider to be publicly audited as a No-Log VPN provider

Vypr VPN
It's easy for a VPN provider to claim they do not log your IP address or any other information when using their service, unfortunately when they do make these claims you have to take them on trust. However, with the recent high-profile cases of two leading VPN providers being caught lying about their no logging policy we've started to see some VPN providers take steps to have their services independently audited to prove they are in fact not logging.

What is a Web Bug (Beacon)?

Web Bug or Web Beacon
A web bug is also referred to as web beacon, pixel tag, clear GIF, invisible GIF. It is one of the techniques used in emails or web pages to check what the user has accessed. These are in most cases invisible and are used for web analytics. In most cases, web bug arrives in the form of an image and can be detected by the user only if the source code is checked. A web bug is small graphic and hence can work easily with low bandwidth or weak network connection.

How do you spy on someone's IP Address?

Spy IP Address
Most of us believe that our IP address can be tracked only by the Internet Service Provider. Did you know that there are multiple ways in which someone can spy on your IP address? Anybody knowing one of these techniques can easily reveal your IP address. To spy on your IP address, they do not need your permission. Spying on someone's IP address can be used to trace cyberbullying as well as bad intentions.


What is Web 3.0?

Web 3.0
The web has evolved several changes since its inception, starting from Web 1.0 which forms the most rudimentary form of a web. Next going on to more advanced forms of Web which were called as Web 2.0.

What is JSP?

JSP
JSP is also referred as Java server pages. It is a language used for web development and is similar to PHP or ASP. It is used extensively for dynamic web page generation. JSP was first released in 1999 by Sun Microsystems.

Privacy and Security issues with Big Data and Cloud

Privacy issues with Big Data and Cloud
Several organizations deal with a large amount of data on a daily basis. Such organizations constantly look for solutions to optimize the storage of such massive data. Along with storing another concern is analyzing a huge volume of data. This together with the scalability of infrastructure and a budget-friendly solution is something that organizations look for.


What is Dark Web?

Dark Web
Dark web forms a part of the Deep web which cannot be indexed by search engines. These are a collection of websites that are publicly visible but can hide the IP addresses. This makes tracking of such websites difficult. A search engine will never be able to find such websites.