Aastha ThakkerBlockchain Agreement: Understanding Consensus AlgorithmConsensus algorithms: Mechanisms which keep the blockchain world running smoothly.18h ago118h ago1
Aastha ThakkerDecoding QR Codes: Simple Scans, Big ImpactFrom scanning menus to making seamless payments, QR codes have become an integral part of our day-to-day lives.Aug 81Aug 81
Aastha ThakkerDetecting Linux Credential Access Attacks with WazuhWant to catch Linux credential hunters in action? This Wazuh guide shows how to set up smart defenses that’ll make attackers think twice.Aug 1Aug 1
Aastha ThakkerWazuh: What, Why, and Wow!Logs, the digital footprints of user and device activities, hold the key to early threat detection. Enter in the Wazuh world.Jul 25Jul 25
Aastha ThakkerSOC vs SOCMissed intrusion, a silent threat, a “true negative,” a bitter regret. Harmless ping, a wasted chase, a “false positive,” leaving no trace.Jul 181Jul 181
Aastha ThakkerSecurity Operations Center (SOC): Data GuardiansEver worry about hackers creeping into your system while you sleep? A SOC is your digital bodyguard, working 24/7 to stop cyber threats.Jul 111Jul 111
Aastha ThakkerinSystem WeaknessEfficiency to Exploits: Vulnerabilities in Ollama and Vanna AI AutomationAI fans, heads up! A recent vulnerability in Ollama and Vanna AI models has everyone talking. Wondering if your favorite AI is at risk?Jul 4Jul 4
Aastha ThakkerinStackademicBlockchain: Building the BlocksHey there, I’m back with more details on blockchain! In our previous blog, we covered the fundamentals: what blockchain is, its types, and…Jun 27Jun 27
Aastha ThakkerBlockchain BasicsWhen I first heard the word ‘blockchain’, what crossed my mind is a literal chain made of different blocks. Not wrong, but it’s more!!Jun 20Jun 20
Aastha ThakkerCloud Computing: Your data’s up there!Feeling lost in the cloud? This blog breaks down cloud computing basics. Check it out & share your cloud experiences below!Jun 13Jun 13