Phishing or no phishing?

A phishing kit comprises of the tools that an attacker would need to set up a ghost server. Typically, a phishing kit is a clone of a legitimate website that...

How Nutanix Works?

In the era of enterprise cloud, modern enterprise datacenter must support virtualization with high availability and live VM migration. The traditional storage area networks (SAN) or network attached storage (NAS)...

Data deduplication: A modern approach to cloud-based data storage

There was a time when tape backups were used to store enterprise-level data. Many enterprises had used that backup technology and remained in the business. With the advent and the...

Surf web via a secure DNS server

There are a number of ways to safely browse the internet. One could use a proxy server, TOR proxy, VPN, or use an operating system that uses those principles. TAILS...

Smart Publishing is a way to move forward

Internet of things (IoT) can be referred to a number of interconnected things. We are now part of a vicious web that spins all across the globe. Today, IoT is...

A contract that will outsmart you

To understand a smart contract, let us first dive into the basics of a contract. A legal contract must suffice some criteria such as of being offered, mutually consented, legal,...