Category Cyber-Security

The default category for posts.

Footprinting and Reconnaissance

Pegasus

Quickly mapping an organisations attack surface is an essential skill for network attackers (penetration testers, bug bounty hunters or Mr Robot) as well as those who are defending the network (network security folks, system administrators, blue teams etc). A detailed…

PROOF OF CONCEPT

What Is Proof Of Concept? The Blockchain Proof of Concept is a process of determining whether a Blockchain project idea can be feasible in a real-world situation — a common type of consensus algorithm for blockchain. This process is necessary…

PROOF OF WORK

What Is Proof Of Work? Proof of Work (commonly abbreviated to PoW) is a mechanism for preventing double-spends. Most major cryptocurrencies use this as their consensus algorithm. That’s just what we call a method for securing the cryptocurrency’s ledger. Proof…

SHIBA INU

What is Shiba Inu? Shiba Inu token is a decentralized cryptocurrency created in August 2020 by an anonymous person or group known as “Ryoshi”.It is named after the Shiba Inu (柴犬), a Japanese breed of dog originating in the Chūbu…

BLOCKCHAIN

What is Blockchain? It is a distributed database that is shared among the nodes of a computer network. As a database, it stores information electronically in digital format. Blockchains are best known for their crucial role in cryptocurrency systems, such…

Home
Editorials
Articles
Search