Ritik Kumar

🌜
🌞
Display pic

Ritik Kumar

Backend Engineer
Computer Network Enthusiast


DNS and Privacy

Ever felt like your internet journey is a little too exposed? As you surf anonymously, websites slyly snatch your public IP address, and your ISP lurks, peering into your every click. It’s the perfect stage for unwanted surveillance, with the potential to tweak your routing behaviour and block access to your favourite sites. Enter the unsung hero: DNS.

In this blog, we’re delving into the world of online invisibility. I’ll spill the beans on the latest tech tricks that can cloak your browsing habits from the prying eyes of ISPs, with a special focus on the wizardry of DNS. Ready to discover the secrets to a more private online experience? Let’s dive in!🚀🔍

Domain Name System

DNS is the phonebook of the Internet. It’s a global database of information about domain names. In simple terms, it helps convert medium.com into 104.17.31.52 which computer networks actually understands and can route your request to. read more...



Network Access Control

Dive into my CSN-502 presentation delivered on 31.10.2020, where we unravel the intricacies of Network Access Control, with a special focus on Wireless Protocols. If you’re keen to delve deeper, check out the references for more details. This serves as your quick intro to the topic; the ppt is attached below. 🚀💻

Network Access Control

You must have heard that open and coffee shop wifis are insecure, and one must proceed with cautions. Now think about large corporates or campus networks. There’s a ton of stuff involved here which are private within the network and must be protected via access control and prevented from eavesdropping. Remember, a network is not just used for connecting to the internet. A single malicious device or some malicious programs in some innocent device can bring massive troubles to the network providers. All other stuff related to secure access management applies here as well.

So broadly, it is the job of the Network Access Control System to proactively detect and authorize the devices and put certain access control in place. It should also provide a mechanism to deal with malicious programs and actors acting with bad faith from within or outside the network. read more...



Kishanganj-2020

Ever heard of the Kishanganj Vidhan Sabha seat? Probably not. But hey, let’s shed some light on the names vying for your vote in the Bihar Legislature election 2020. I get it; politics isn’t everyone’s cup of tea, but consider this your crash course in “Know Your Choice!” These nuggets are just bits and pieces from my internet scavenger hunt. I’m just here to spark your political curiosity! 🕵️‍♀️🗂️

read more...


Trust-TLS-SSL & HTTPS

In our last rendezvous with HTTP, we dove into its evolution for better performance. But here’s the plot twist — HTTP alone is about as secure as a paper umbrella in a storm. Yet, that little lock🔐 in the corner of your browser assures you of safety in the vast and sometimes treacherous realm of the internet. Trust me; my server’s access logs tell tales of the wild digital west!

So, what’s the secret sauce behind securing HTTP traffic? What’s the story behind that reassuring lock? How do we establish trust in this cyber jungle? And most importantly, is this Medium article genuinely what it claims to be?

Join me on this journey as we unravel the mysteries of HTTP security. I’ll be your guide, using real-world examples to break down complex concepts without drowning you in technical jargon. Let’s embark on a tech adventure where security meets simplicity! 🚀🔐🌐

read more...