This document summarizes a research paper that proposes a method to defend against man-in-the-middle attacks by blocking unauthorized users from accessing a local file sharing network. It involves generating random secret keys, encrypting data using DES encryption, and having a database track and block the IP addresses of attackers to prevent future access. The proposed system architecture stores encrypted files locally and notifies the database to block systems that generate random keys without authorization.