What is BlockChain & Cryptocurrency – a simple explanation from bottom to top

What is BlockChain? In case you are too overwhelmed by all the hype around BlockChain & Bitcoin and want to understand it from a ground level. You are at the right place. Let’s start with the basics.

Every entity in this universe can be represented by numbers.

Be it the details involving sub-atomic particles of an element, or energy and gravitational forces, stars, planets; or for that matter, even humans.

The DNA is nothing but a set of codes made up of four chemical bases.

Time and again, people have thought of creating a universal system to assign a unique value to each of these entities in the universe. But the question is how do we come up with such a system that could provide a unique fingerprint to not only every transaction happening on this planet but also to things beyond humans.

The answer lies in an upcoming technology that has the potential to be a general purpose technology of our decade to fill the gap that we as humanity are suffering. The gap of trust.

Many people say that BlockChain in 2017s is what web was in the 1990s.

Is it true? Let’s leave that question to be answered by time. For now, let’s focus on understanding what BlockChain really is by starting from scratch.

SHA-256 Hash

Talking about cryptography, you must be knowing about the famous mathematician, cryptographer, scientist Alan Turing who played a great role in World War II by breaking Nazi Enigma machine that helped Allied forces get coded messages transmitted by Nazi High command for Nazi Army.

SHA-256 is one such (deterministic) cryptographic hash functions that take an input data (of any type) and returns a fixed length (256 bit / 64 characters long hexadecimal code) that serves as a unique fingerprint for the input data.

For example,

Input — Blank
SHA256 Hash- e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Input — “hello world”
SHA256 Hash-b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9

Input — White paper on Bitcoin by Satoshi Nakamoto (creator of Bitcoin)
SHA256 Hash- dcbf274c34af14943917906e767259f7e01c05ceae4eebea39af3fd0bf32bbbd

You can use any SHA256 hash calculator for this purpose. Check — http://www.xorbin.com/tools/sha256-hash-calculator

A pretty good use of SHA256 cryptography is this famous tweet


How would this work?
John Kerry would have run the (controversial) file he had through SHA256 Algorithm to generate Hash Key.
If the hash matches with the one posted by Wiki-Leaks, he would know that the file with the WikiLeaks is authentic and it is not some false claims.


This is how a Block looks like

Data consists of all the transactions that have occurred in the particular time frame depending on the protocol the BlockChain is working on (10 mins in case of Bitcoin).

Nonce — It is an arbitrary number whose value is set so that the hash of the block (input — data + nonce) will contain a run of leading zeros (say 0000e3st4… or 000000r3jg7…) depending on the difficulty of the network protocol (higher the difficulty, more the number of leading zeros).

Let’s try to understand the concept of Nonce with a hypothetical example. Consider input data as “hello world”.

Concept of Nonce

The initial difficulty of finding a valid hash is low (starting with 0). The iteration to find the correct nonce starts with 1 and keeps on going until we get the hash value starting with 0 for 243rd iteration.

Now, the difficulty is re-adjusted to find the hash starting with ‘00’. This is achieved at iteration 1389.

Again the difficulty is re-adjusted to find the hash starting with ‘000’. This iteration goes on. Now, if the goal is to find hash starting with 4 leading zeros, then we have to iterate up to Nonce = 18014 to find first such occurrence.

Difficulty level of Bitcoin

This is the concept of mining in BlockChain. (Explained later in detail)

It is important to understand that the Hash value is unique for the combination of a nonce and input data.


Having understood what is a Block, now let’s see what is a BlockChain. In simple terms, BlockChain is a Chain of Block.


SHA256 Hash of Blocks = SHA256 (Block # + Nonce + Data (Coinbase & Transaction Lists) + Previous Block Hash + Time-Stamp)

You’ll notice that each block points to the previous block using field previous hash. That’s how the blocks are linked to form a chain.

Distributed Ledger

You must have heard — “BlockChain is a distributed ledger”. That’s because the same chain of blocks is maintained at each participating node. As shown in the above diagram, the two Nodes A & B could be located anywhere on the planet; but, they’ll always be in consensus on the blocks. This is true for a BlockChain network as big as Bitcoin or Ethereum.

Now, let’s assume there were (say) 100 nodes maintaining the ledger (the chain of blocks). Out of these 100 nodes, 10 of them shut down and connect back to the network after some time. Once back, they need to pick an active chain. However, due to technological constraints (as these nodes can be anywhere around the globe), the nodes might pick different versions of the chain as the active chain.

However, the protocol ensures that the consensus is reached quickly and the longest chain (one with the most “work”) is picked as the active chain. This chain is replicated at each node.

BlockChain is immutable
Let’s understand how.

BlockChain Immutable – any change in data changes the whole chain

Say, a hacker changed the data in Block # 2 in Node A. This would result in changing of the Hash of the block, which would change the previous hash of the next Block (Block # 3). This would further result in the change of Hash of Block # 3.

The new hash would be not valid as they do not satisfy the required Proof of Work (of getting a target hash value with leading 4 zeros).

Now the hacker would require to mine (compute new Nonce) for each block to validate the hash of all the subsequent blocks.

However, by the time the hacker mines the subsequent blocks in Node A, the chain maintained at other nodes in the network ( in this case Node B) would become longer (more “work” means more blocks) thus would by-default render the chain maintained at Node A useless (as explained in the above section of Distributed Ledger).

BlockChain Immutable – Even if a hacker makes any changes and then again mine for Nonce to correct Hash of subsequent blocks, the chain at other nodes becomes longer

Data in the Block

By now, you would have a fair idea of what a BlockChain is. However, we still need to understand how the transactions are stored in the block.

The data is stored in the format of Coinbase and Transactions of Tokens. In the below illustrated example, (say) VG is the miner who mines the Genesis block (First Block) and gets 25 tokens as the reward. This is the coinbase transaction where the person is allocated 25 tokens as a mining reward. This is how money (in form of crypto-tokens) enters the system of BlockChain.
It’s only after the tokens are allocated, can VG send transactions to any other users.
This ensures the authenticity of transactions.

Coinbase & Transaction Data

How is a Block added?

In the last section, I explained the building blocks of BlockChain. Now let’s understand how a new block is added; or specifically, what is mining?

Mining in BlockChain

Updation of Ledger
  1. Collect all the list of valid transactions from the transaction pool. Build a block containing the transactions as data. Ensure the size of the block doesn’t exceed 1MB.
  2. Calculate Hash of the block by applying SHA256 Hash function —
    SHA256(Block # + Nonce + Data (Coinbase & Transaction Lists) + Previous Block Hash + Time-Stamp)
  3. Compare the calculated hash with the target hash and check if the calculated hash is less than the target. Example, if the target hash should have 4 leading zeros, a calculated hash (say) 0000e3b..is valid. Else, Nonce is incremented and this step is repeated with the updated hash (until the calculated hash is less than the target hash).
  4. Once, the miner finds the winning block (i.e. hash less than target hash), he updated all the nodes about the block. The nodes check (for a long check-list) the winning block and if more than 50% of the nodes agree, the block is added to the existing chain and the miner gets newly created tokens as mining reward.
  5. The ledger is updated for every node.
  6. With time, as nodes with more processing power join the network, the problem can be cracked faster. However, block creation time has to be 10 minutes (as per Bitcoin protocol). Thus the difficulty of the problem is increased for every 2016th block (approx 2 weeks). With increased difficulty, the number of leading zeros in target hash increases. This requires more computational power to find the right hash.

You can see live Bitcoin transactions (in crypto format)- https://blockchain.info/

BlockChain, as we understand, is an essentially a public ledger containing all the transactions. This ledger is maintained at each participating node. It’s like a shared universal truth.

What makes BlockChain Secure?

The question that should pop into our mind is if the ledger is public — What about the security of data?
There’s no reason to worry, as BlockChain uses the concept of Public-Private Keys to secure all the transaction. Let’s understand this with help of an example.

Public & Private keys are set of uniquely related cryptographic key (basically set of long random number)

Public & Private Key

Public Key is shared by everyone on a network; whereas, Private Key is kept as secret.

If anyone (even you) encrypt a file with your public key; only you can decrypt it with your private key.
If you encrypt a file with your private key, then anyone can decrypt it with your public key.

When your friend send you bitcoins (or any cryptocoins) over BlockChain, they are sending you hashed version of your Public Key, which is basically your address.
But it is signed by your friend using their Private Key so that you know that it has come from your friend (and also so to ensure no can alter the transaction).

But, the next question that should pop into your mind is how would you access the transaction if you don’t have your friend’s private key?

Let’s understand this situation and the solution with an easy example.

Say, M want to send a message to his wife W over BlockChain.

How Public & Private Key work for sending message
  1. M would encrypt the message with his Private key.
  2. M would further encrypt the resulting message with W’s public key.
  3. M receives the encrypted message and decrypts it with W’s Private Key.
  4. Since W knows the M’s public key, she decrypts the message using M’s Public Key.
  5. She receives the original message.

In this whole scenario, one has to make sure that he safeguards his private key. Else, if someone gets hold of your private key, they would be able to send your cryptocurrencies to themselves by verifying that transaction with your Private Key — in effect stealing from you!

Finally, the last attribute of BlockChain — Merkle Tree

We understand that the block that needs to be added to the chain should be less than 1 MB. How do we ensure that when there could be a huge number of transactions?

Answer — Merkle Tree.

The idea of Merkle tree is to allow you to verify the transactions included in a block, without adding each transaction in the block.

This is how it works. Let’s say there are 4 transactions that need to be added to a block.

  1. Rather than adding hash for all the 4 transactions, we first hash the leaves (transactions).
  2. We combine the hash of leaves and again run a hash function (on the combined hashed leaves) to create a first level branch
  3. We combine the hash of first level branch and then run hash function to get second level branch
  4. We go on until we get a single hash — the Root Hash

Merkel Tree | Source -https://bitcoinbook.aseemraj.me/cryptography/hashpointer.html

Thus, the Merkle tree creates a single value that proves the integrity of all of the transactions under it (without the need of adding all these transactions to the block).

Concept of Smart Contracts

These are IFTTT premise based programmable contract stored on BlockChain. Smart Contracts let you exchange money, property or shares based on a set of conditions (without the need of any central authority like Banks, Government Agency, Lawyer, Broker, etc). Ethereum brought the concept of Smart Contracts in BlockChain.

The smart contracts are revolutionary as it can create an autonomous decentralized system where we do not require to keep trust in a central authority to facilitate a contract.

Smart Contracts

The first real-world transaction using smart contracts was in September 2016. It was held by Barclays, Israeli tech start-up Wave and Irish dairy producer Ornua, which concluded an agreement on the supply of cheese and oil (for $100,000) to Seychelles Trading Company.

The process, which usually takes from seven to ten days, took about four hours without the need for any third-party verification.

Now, having understood how BlockChain works under the hood, lets now focus on the business implications of BlockChain.

To start with, we should understand that there are two types of BlockChain Implementation.

Public BlockChain — an Open & Anonymous (Trust-less) network in which anyone can participate. However, this kind of network would have limited value if there is no network effect.
Example Bitcoin, Etherium, etc.

Private BlockChain — a Trustful network formed by a consortium of Enterprise (to solve a particular use-case to generate shared value for themselves). The admission to this network is restricted.
Example, R3 CEV developing BlockChain solution for a consortium of Banks (using Corda), Colu, OpenChain, HyperLedger, Chain and many more.

Enterprise BlockChain Source – https://magnr.com/blog/technology/private-vs-public-blockchains-bitcoin

Private BlockChain built with public-based architecture
Ripple is built with a public-based architecture but is privately controlled through centralized ownership to facilitate foreign payments between participating banks. It greatly reduces the operational cost of foreign remittance by providing a trusted & controlled BlockChain network to facilitate transactions (using Consensus protocol rather than Proof of Work protocol).

What makes BlockChain revolutionary?

  • Decentralized & Open
  • Immutable
  • Secure
  • Auditable — Transactional verification without central authority
  • Protection against Single point of Failure

What can BlockChain do for Businesses?

  • Facilitate instant Multi-party transactions — the best examples are from banking & payments industry — Ripple
  • Eliminate Costly Intermediaries — We are seeing usage of BlockChain in various domains as Ad-Buying (AdChain, MadHive), Loyalty (Loyyal), Music (Ujomusic, Peertracks), Content Distribution (Publiq), Advertising (BasicAttentionToken)
  • Enable Decentralized Trust — Used in Retail (Open-Bazaar), Transportation (La’Zooz), Social Media (SocialX.network, Steem.io)
  • Compliance in Supply Chain — Counterfeit protection by Alibaba Taoprotect, Walmart BlockChain implementation for Pork Compliance, Diamond Compliance by Everledger
  • Security & Tamper-proof records — Examples are Identity management (Block Verify, Civic), Health Industry (BitHealth, Nautica)

Though it is early in the development of Blockchain, the potential for incorporating the technology into almost every industry is endless.

Sharing Economy (Airbnb, Uber, OLX, etc), Crowdfunding, Governance, Supply Chain Auditing, File & Data Storage, Prediction Markets, IP & Copyright Protection, AML & KYC, Banking & Financial Markets, Health Industry, Advertising & Marketing, Land Registration and what not!

Credits – The article is inspired by the session on “Cryptocurrency & BlockChain” by Prof. Bhagwan Chaudhary (conducted by Indian School of Business).

LIKE & SHARE if you found this article useful.
It gives me 🔋 to write knowing people find value in it.   

Share & Help others find the resource


  1. Needed to draft you a little remark in order to say thanks a lot over again about the lovely suggestions you have contributed at this time. It has been simply strangely generous of you to grant openly what most people would’ve offered for sale for an e book to earn some bucks for their own end, chiefly considering the fact that you could have tried it if you desired. These techniques additionally served like the easy way to fully grasp many people have similar desire really like my personal own to know a little more with regard to this issue. Certainly there are several more enjoyable sessions in the future for individuals that look into your site.

  2. Pingback: facebook auto post
  3. Wonderful put up, very informative. I wonder why the other experts of this sector don’t notice this. You must proceed your writing. I’m sure, you’ve a huge readers’ base already!|What’s Happening i am new to this, I stumbled upon this I have found It positively helpful and it has helped me out loads. I hope to give a contribution & assist other customers like its helped me. Great job.

  4. Terrific work! That is the kind of information that aree
    meant to be shared across the net. Disgrace on Google for no longer positioning this post higher!
    Come oon over and discuss with my website . Thank you

  5. I must thank you for the efforts you’ve put in penning thi
    site. I really hope to view thee same high-grade content from you later
    on as well. In truth, your creative writing abilities has encouraged me tto get my own website now

  6. Woah! I’m really digging the template/theme of this site.
    It’s simple, yet effective. A lot of times it’s very hard to get thaat “perfect balance”
    between usability and visual appeal. I must say
    you’ve done a great job with this. Additionally,
    the boog loads extremely quick for me on Opera. Excellent Blog!

  7. Thanks for your tips. One thing really noticed is that banks along with financial institutions understand the spending patterns of consumers plus understand that most of the people max out and about their own credit cards around the breaks. They smartly take advantage of that fact and then start flooding your current inbox in addition to snail-mail box along with hundreds of no-interest APR credit cards offers shortly when the holiday season ends. Knowing that in case you are like 98% of American general public, you’ll rush at the one opportunity to consolidate personal credit card debt and shift balances to 0 annual percentage rates credit cards.

  8. These days of austerity in addition to relative panic about having debt, many individuals balk against the idea of utilizing a credit card in order to make acquisition of merchandise or pay for any occasion, preferring, instead to rely on the actual tried and also trusted technique of making settlement – cash. However, if you possess cash there to make the purchase 100 %, then, paradoxically, that is the best time just to be able to use the cards for several motives.

  9. These days of austerity in addition to relative panic about getting debt, a lot of people balk resistant to the idea of using a credit card in order to make purchase of merchandise or even pay for a vacation, preferring, instead only to rely on the actual tried and also trusted approach to making settlement – cash. However, in case you have the cash there to make the purchase in full, then, paradoxically, this is the best time to use the card for several causes.

  10. Thank you, I’ve recently been searching for info approximately this topic for a while and yours is the best I have found out so far. But, what about the conclusion? Are you sure in regards to the source?|What i do not realize is actually how you’re not actually much more neatly-appreciated than you may be right now. You’re so intelligent.

  11. Hi there! This is myy first visit to your blog!
    We are a collection of volunteers and starting a new project in a commubity in the same niche.
    Your blog provided us beneficial information to work on. You
    havge done a outstanding job!

  12. Hi just wanted to give you a quick heads up and let you know a few off the pictures aren’t
    loadijg correctly. I’m not sure whyy bbut I think its a linking issue.
    I’ve tried it in two different internet browsers and both show the same outcome.

  13. Hi there, I found your website by the use of Google even as searching for a related subject, your website came up, it appears great. I’ve added to favourites|added to my bookmarks.

  14. Thanks for the suggestions you have contributed here. One more thing I would like to talk about is that computer system memory specifications generally increase along with other advancements in the technologies. For instance, when new generations of processor chips are made in the market, there is usually a matching increase in the scale demands of all computer system memory and also hard drive space. This is because the software operated by these processor chips will inevitably increase in power to benefit from the new technological know-how.

  15. I’ve learned result-oriented things through your weblog. One other thing I’d really like to say is that newer pc os’s tend to allow a lot more memory for use, but they additionally demand more storage simply to work. If someone’s computer can’t handle a lot more memory and also the newest program requires that ram increase, it is usually the time to shop for a new PC. Thanks

  16. I have learned new things by your website. One other thing I would like to say is newer laptop or computer operating systems often allow far more memory to get used, but they additionally demand more memory simply to operate. If someone’s computer can’t handle more memory as well as the newest computer software requires that memory space increase, it may be the time to shop for a new Computer system. Thanks

  17. Learning a foreign language is not easy, but hopefully with our tips you will be able to successful master the foreign language you “OnlineNewsPakistan” News Website For Pakistan, covering Pakistan and world news with sports news, are studying or want to study. Our tips are based on the philosophy that “practice makes perfect”. That is to say, the more you practice the greater chance you have of mastering the foreign language. So without further adieu here is The Top 5 Tips for Learning a Foreign Language.

  18. Thanks for helping me to gain new concepts about pc’s. I also have the belief that certain of the best ways to keep your mobile computer in primary condition is to use a hard plastic-type case, or perhaps shell, that fits over the top of your computer. A majority of these protective gear are usually model specific since they are made to fit perfectly across the natural covering. You can buy all of them directly from owner, or via third party places if they are readily available for your notebook computer, however not every laptop will have a spend on the market. Once again, thanks for your points.

  19. One thing I’d really like to say is before purchasing more personal computer memory, have a look at the machine in to which it will be installed. If your machine is running Windows XP, for instance, a memory ceiling is 3.25GB. Setting up more than this would simply constitute a new waste. Be sure that one’s motherboard can handle the upgrade amount, as well. Interesting blog post.

  20. Thanks for giving your ideas right here. The other point is that any time a problem takes place with a laptop motherboard, people should not go ahead and take risk involving repairing it themselves for if it is not done correctly it can lead to irreparable damage to the complete laptop. It will always be safe to approach a dealer of a laptop with the repair of its motherboard. They have technicians who may have an experience in dealing with mobile computer motherboard challenges and can make right prognosis and undertake repairs.

  21. Things i have observed in terms of personal computer memory is always that there are technical specs such as SDRAM, DDR and the like, that must match up the requirements of the motherboard. If the computer’s motherboard is rather current while there are no main system issues, upgrading the memory space literally will take under a couple of hours. It’s among the list of easiest computer system upgrade types of procedures one can imagine. Thanks for giving your ideas.

  22. I have really learned some new things by means of your site. One other thing I’d prefer to say is that often newer pc operating systems have a tendency to allow extra memory to be played with, but they also demand more storage simply to run. If someone’s computer could not handle extra memory plus the newest program requires that memory increase, it may be the time to shop for a new Personal computer. Thanks

  23. A few things i have seen in terms of computer memory is always that there are specs such as SDRAM, DDR and so forth, that must match up the technical specs of the motherboard. If the pc’s motherboard is kind of current while there are no main system issues, modernizing the ram literally normally requires under a couple of hours. It’s one of many easiest laptop upgrade processes one can consider. Thanks for giving your ideas.

  24. Good blog post. A few things i would like to contribute is that laptop or computer memory must be purchased if the computer cannot cope with anything you do by using it. One can install two random access memory boards with 1GB each, for example, but not certainly one of 1GB and one having 2GB. One should look for the manufacturer’s documentation for one’s PC to be certain what type of storage is necessary.

  25. A few things i have seen in terms of personal computer memory is that often there are specs such as SDRAM, DDR and so on, that must go with the specifications of the motherboard. If the personal computer’s motherboard is kind of current and there are no operating system issues, changing the ram literally normally requires under an hour or so. It’s one of many easiest laptop upgrade methods one can think about. Thanks for expressing your ideas.

  26. Thanks for the points you have discussed here. Another thing I would like to express is that laptop memory demands generally increase along with other innovations in the engineering. For instance, when new generations of processors are made in the market, there is usually a related increase in the dimensions preferences of both the personal computer memory in addition to hard drive room. This is because the software operated by these cpus will inevitably increase in power to use the new technologies.

  27. Thanks for the guidelines you have shared here. Something else I would like to express is that laptop or computer memory needs generally rise along with other advances in the know-how. For instance, whenever new generations of cpus are made in the market, there is certainly usually a related increase in the size preferences of all computer memory along with hard drive room. This is because the program operated by these cpus will inevitably boost in power to use the new engineering.

  28. I have seen a lot of useful elements on your web site about personal computers. However, I have the view that netbooks are still not quite powerful more than enough to be a wise decision if you typically do things that require loads of power, like video editing. But for world-wide-web surfing, microsoft word processing, and many other typical computer work they are okay, provided you do not mind small screen size. Many thanks sharing your opinions.

  29. Thanks for expressing your ideas in this article. The other thing is that when a problem appears with a laptop motherboard, individuals should not consider the risk regarding repairing the item themselves because if it is not done right it can lead to permanent damage to the complete laptop. It is usually safe just to approach the dealer of any laptop for the repair of its motherboard. They have got technicians with an competence in dealing with laptop motherboard problems and can have the right diagnosis and conduct repairs.

  30. I have seen lots of useful factors on your web page about computers. However, I have got the judgment that laptops are still not quite powerful enough to be a option if you often do jobs that require a great deal of power, like video croping and editing. But for world-wide-web surfing, microsoft word processing, and majority of other common computer functions they are just great, provided you can’t mind small screen size. Appreciate sharing your ideas.

  31. When I initially commented I cliicked the “Notify me when new comments are added” checkbox and
    now each time a comment is added I gett several emails with the same comment.
    Is there any way you can remove mee from that service?
    Thank you!

  32. Thank you, I have recently been looking ffor information approximately
    this topic for a while and yours is the greatest I have came upon till now.
    However, wht concernig the boytom line? Are you sure in regards
    to the source?

  33. I’ve read some just right stuff here. Definitely value bookmarking for revisiting.
    I wonder how so much effort you place to make one of
    these excellent informative web site.

  34. Haave ʏoou ever thoughtt about adding a little bit more than just your articles?
    I mean, what you saүʏ is important and evеrything.
    But imagine if yoou added some great graphics or vidеo clips to give your posts more, “pop”!
    Your content is excellent but with images and clips, thius bblog could
    definitely be one of the very best iin its fіeld.
    Awesome blog!

  35. Cool! Interesting informations over here. It’s pretty worth enough for me. Personally, if all webmasters and bloggers made good content as you did, the web will be much more useful than ever before.| I couldn’t resist commenting. I have spent some time trying to find such informations. I’ll also share it with some friends interested in it. I have just bookmarked this web. Right now with the task done, I will find some World cup Webcams. Thanks!! Regards from Mundial 2018!

  36. Neat blog! Is your theme custom made or did you download it
    from somewhere? A thee like yours with a few simple tweeks would
    really make my blog jump out. Please let mme know where you got your design. Thanks a

  37. Hi, I do think this is an excellent site. I stumbledupon it 😉 I’m going to return yet again since I saved as a favorite it.
    Money and freedom is the best way to change, may you be rich
    and continue to help others.

  38. It is perfect time to make some plans for the future and it’s time to be happy.
    I have read this post and if I could I wish to suggest you
    few interesting things or suggestions. Perhaps you could
    write next articles referring to this article. I wish to read more things
    about it!

  39. I’ve been surfing on-line grester than 3 hours as of late, yet I by no
    means discovered any interestig article like yours.
    It’s lovely value enough for me. Personally, if all
    website owners and bloggers made excellent content material as you probably did, the net shall be much more helpful than ever

  40. Nicce blog here! Alsso your web site loads up very fast!
    What host are yyou using? Can I am getting your associate link in our host?
    I wwant my website loaded up as fast as yours lol

  41. Hello! I’ve been followinng your site for a long time now aand finally got
    the bravery too go ahead and give you a shout
    out from Kingwood Tx! Just wanted to menbtion keep up the excellent job!

  42. May I simply just say what a comfort to find an individual who truly knows what they are discussing on the net.
    You actually know how to bring an issue to light
    and make it important. More people must check this out and understand this side of your story.
    I was surprised you are not more popular because you most
    certainly have the gift.

  43. After I originally left a comment I seem to have clicked the -Notify
    me when new comments are added- checkbox and from now on whenever a comment is added
    I recieve four emails with the same comment. Is there an easy method you can remove me from that service?
    Many thanks!

  44. Every weekend i used to pay a visit this web page, for the reason that i want enjoyment,
    since this this web site conations really nice funny stuff too.

  45. Hey there! Do you use Twitter? I’d like to follow you if that would be okay.

    I’m definitely enjoying your blog and look forward to new updates.

  46. Everything is very open with a clear clarification of the issues.
    It was definitely informative. Your website is useful. Thanks
    for sharing!

Leave a Comment

Your email address will not be published.