In this video, I’m going to tell you what the BIG e-commerce companies around the world don’t want you to know. And that’s exactly why the giants of e-commerce HATE Google. If you’re about to buy a product — any kind of product — you need to watch this video. Because you’ll very likely save […]
Author Archives: Fernando Tamez
We’ve noticed that many people still share Wi-Fi passwords by saying them out loud or writing them on little pieces of paper. This is completely wrong—it’s a terrible practice. So next time someone asks for the Wi-Fi password, don’t say it or write it down. Instead, save this video because here I’ll show you how […]
Almost everyone has gone through this, or might go through it eventually — it’s almost inevitable. Nobody wants it to happen, but if your iPhone has already been stolen or lost, you know how it feels. The disappointment of losing your phone, plus the fear of your information being exposed. If you have an iPhone, […]
It is very important to understand this concept of how computers communicate because in cyberattacks there is one called “Man in the middle” which basically is what its name says. A hacker places themselves between your computer and a server to steal information. Computers communicate with each other using their respective IPs or also with […]
There are 3 main PILLARS within REDUX. State Actions Reducers The state of my application is described as an object. To change something in the state, it is necessary to send an action, which are also objects. They can be compared to breadcrumbs describing what happened. To combine the actions with the state to be […]
#1: IP The IP is basically the unique and unrepeatable address or number that identifies a computer. We have 2 types of IPs: public and private. Public IPs are provided by your internet provider. Private IPs are networks within your public IP. They are generally used for local networks such as your home or office […]
When we create an application, we can host everything on a single server. However, if the application grows, we will need to give it more power by adding more machines. This means the cost will keep rising without stopping. Likewise, if the application starts losing popularity, we will have to reduce the power we gave […]
When a device positions itself in the middle of a connection and acts as a mediator. It is a proxy if the device in the middle can inspect the traffic packets. Without the ability to inspect, it would not be a proxy but a gateway. Proxies almost always operate at layer 7 of the OSI […]
Virtual Private Network. Its purpose is to make the user feel as if they are connected to a different network. There are 3 types of VPNs Site-To-Site VPN Both the client and the server are network devices Commonly these are network devices like routers or firewalls Its common use is to connect company networks over […]
The way connections and nodes in a network are organized and connected to each other. The network configuration or topology is crucial to determine its performance. They are characterized as physical or logical topologies. Logical Topology refers to understanding how and why a network is organized the way it is and how data moves across […]