Home
Bhaskar Ram
Cancel

Hyperledger Cactus Whitepaper

Hyperledger CactusWhitepaper Version 0.2 Photo by Pontus Wellgraf on Unsplash Contributors Contributors/Reviewers Email Hart Montgomery h...

Intel® 64 and IA-32 Architectures Optimization Reference Manual Code Samples

Intel® 64 and IA-32 Architectures Optimization Reference Manual Code Samples This repository contains buildable versions of the example source files in the Intel Optimization Manual available here...

Fintech Open Source Foundation (FINOS), Hyperledger Foundation, and The Digital Dollar Project Team Up to Drive Open Development and Collaboration for CBDCs

Announcing Open Digital Currency Initiative Central Bank Digital Currency (CBDC) has the power to transform economies — connecting people, governments, businesses, and organizations locally and gl...

Building a Cellphone IMSI Catcher (Stingray)

The IMSI number is held within the SIM card in the mobile phone and identifies the country, the carrier, and the user. With this information, the person sniffing this traffic can identify and locat...

Chrome Extensions may be dangerous

High Alert Chrome Google Chrome extensions can be used to track users’ activities on the web. Researcher, z0cc has developed a website that, by analyzing the Google Chrome extensions a user has ...

How to Crack Online Web Form Passwords with THC-Hydra & Burp Suite

I had introduced you to two essential tools for cracking online passwords—Tamper Data and THC-Hydra. Open THC-Hydra Step 1 So, let’s get started. Fire up Kali and open THC-Hydra from Application...

Performing Advanced MITM attacks using Xerosploit

Perform Advanced Man-in-the-Middle Attacks with Xerosploit A man-in-the-middle attack, or MitM attack, is when a hacker gets on a network and forces all nearby devices to connect to their machine ...

JS IPFS

Highlights switches to ESM only, upgrades to libp2p and brings lightweight PeerIds js-IPFS is rocketing forward with major improvements to its foundations along with many small bug fixes and pe...

CISA adds 41 flaws to its Known Exploited Vulnerabilities Catalog

US Critical Infrastructure Security Agency (CISA) adds 41 new vulnerabilities to its Known Exploited Vulnerabilities Catalog. CISA The Cybersecurity & Infrastructure Security Agency (CISA) h...

Webiste Trackers Stealing users Data

Trackers are Everywhere on the Internet Trackers Eye According to a recently conducted study, around 3% of the website trackers might be collecting people’s form inputs even before they hit the ...