Home Tags Cryptography

Tag: cryptography

Blockchain: The future of Geospatial Applications

Blockchain can be regarded as the world’s leading software platform for digital assets. It is a continually growing list of records, called blocks, which...

Demystifying Blockchains

A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography to ensure data security. Data security is...
Advertisement

A Peek into the Top Password Managers

We use passwords to ensure security and the confidentiality of our data. One of the biggest modern day crimes is identity theft, which is...

An Introduction to Bitcoin: The Open Source Cryptographic Currency

Bitcoin is the new 'virtual currency' that has aroused the interest of millions of people, financial and banking institutions, and government agencies. As it...

Power Programming: Bitwise Tips and Tricks

If you are a seasoned programmer, these tips and tricks will seem very familiar, and are probably already part of your repertoire. If you...

Cyber Attacks Explained: Web Exploitation

Websites are no longer merely about having an "Internet presence" today, but are also used for commercial transactions and to transfer sensitive data. Such...
Advertisement

Cyber Attacks Explained: Packet Spoofing

Last month, we started this series to cover the important cyber attacks that impact critical IT infrastructure in organisations. The first was the denial-of-service...

Securing Database Servers

With the ever-expanding data requirements for Web applications, database administrators often configure security parameters at the OS and database layer. Unfortunately, administrators seldom consider...

Aircrack-ng: Wi-Fi Troubleshooting, Auditing and Cracking Made Easy

Wi-Fi technology has today become almost ubiquitous for wireless local area networks at offices, restaurants, homes, airports, hotels, etc. However, with increased Wi-Fi usage...

Cryptography and Steganography with Python

Steganography and cryptography have been widely used to hide sensitive information. This article offers a brief introduction to how both these methods can be...
Advertisement

Block title