Home Tags Cryptography

Tag: cryptography

Skills You Need for Becoming an Ethereum Blockchain Developer

0
Ethereum is a popular blockchain platform, and offers quite a few lucrative job opportunities. This article will tell you what you need to be...

Understanding the Fundamentals of the Blockchain

0
Blockchain technology is a constantly evolving, secure and shared record-keeping system in which each user has a copy of the data, which can only...

Kerberos: The Trusted Watchdog of Distributed Computing

0
Kerberos is an open source authentication and single sign-on protocol widely used in the computing industry. This article gives a basic overview of the...

Blockchain: The future of Geospatial Applications

1
Blockchain can be regarded as the world’s leading software platform for digital assets. It is a continually growing list of records, called blocks, which...

Demystifying Blockchains

0
A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography to ensure data security. Data security is...

A Peek into the Top Password Managers

1
We use passwords to ensure security and the confidentiality of our data. One of the biggest modern day crimes is identity theft, which is...

An Introduction to Bitcoin: The Open Source Cryptographic Currency

0
Bitcoin is the new 'virtual currency' that has aroused the interest of millions of people, financial and banking institutions, and government agencies. As it...

Power Programming: Bitwise Tips and Tricks

5
If you are a seasoned programmer, these tips and tricks will seem very familiar, and are probably already part of your repertoire. If you...

Cyber Attacks Explained: Web Exploitation

2
Websites are no longer merely about having an "Internet presence" today, but are also used for commercial transactions and to transfer sensitive data. Such...

Cyber Attacks Explained: Packet Spoofing

4
Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service...