Blockchain Fundamentals – Part 1 (Intuition) Here we talk about the basic building blocks of blockchain. We cover the following topics What is Blockchain? Hash Cryptography Immutable Ledgers Mining – Proof Of Work Distributed Blockchain – Private vs Decentralized Blockchain Consensus Protocol – Byzantine Fault Tolerance Problem Code Demo – […]
Category: Recent Articles
UBER – An Architecture Style for Mobile Apps
If you’re intrigued by the word UBER and assuming that this article is about either the company UBER or its mobile app. Unfortunately it’s not :-). So then what is it all about? I’d like to introduce you to an architecture style mind you not an architecture pattern neither a software design pattern. […]
Software Architect – Declassified
Software architect role is the vaguely addressed topic or at least its detail. In most organization this is one of the not so well defined role. Presumably ends up with either a best developer in the team. Team lead, Manager who was a mediocre developer and now doesn’t wants to […]
Protocol Oriented Programming aka POP
Object oriented programming was the classic strategy to write modular code for decades. Imagine you’re developing a photo sharing app. You can take a picture, add special effects, or share it with your friends. A common approach to creating this type of application is by using object oriented design, encapsulating all […]
Deep Dark Web – The Internet which you don’t know
I was so intrigued to write this post just because of the hacking spree which got unleashed over the last week(WannaCry Ransomware). Very few people got a hang of the WannaCry ransomware cyber attack that took the world by storm. It’s means & mechanism which enables this kind of havoc. […]
How does Man In The Middle attack happens?
Man In the Middle attack can be performed with different tools and different mechanism. Here in this post i would like to highlight 2 attack vectors which are as follows: Rogue Cell Towers (Also known as StingRay in Cyber Forensics) IP Spoofing in a WiFi Network (Using Cain N Abel) […]
Is SSL connection secure?
Mobile applications frequently do not protect network traffic. They may use SSL/TLS during authentication but not elsewhere. This inconsistency leads to the risk of exposing data and session IDs to interception. The use of transport security does not mean the app has implemented it correctly. The diagram below illustrates how […]
Why Auto Correct, Auto Complete is hazardous for mobile apps dealing with sensitive data.
About 80% of the apps out there today are insecure and can be compromised easily, this is what recent studies have shown. Why this complacency? Are the businesses not serious about it. The answer is everyone today from a startup to an enterprise is more conservative about data security. Still […]