0x4C3DDinCoinmonksDecoding Blockchain and Crypto: My Top FAQs Answered — Part IVQ) Exploring Coding Languages for Creating Custom Cryptocurrencies on BlockchainMay 11May 11
0x4C3DDinCoinmonksDecoding Blockchain and Crypto: My Top FAQs Answered — Part IIIQ) Addressing Privacy Concerns in Blockchain-Based Messaging AppsMay 11May 11
0x4C3DDinCoinmonksDecoding Blockchain and Crypto: My Top FAQs Answered — Part IIQ) Understanding Popular Blockchain Consensus MechanismsMay 11May 11
0x4C3DDinCoinmonksDecoding Blockchain and Crypto: My Top FAQs Answered — Part IEmbarking on the journey of understanding blockchain and cryptocurrency can be akin to entering a realm of intrigue and complexity. As I…May 11May 11
0x4C3DDHacked & Hijacked: My Rollercoaster Ride through Session Snafus!In the vast landscape of the internet, we often find ourselves immersed in the digital realm, clicking through websites and navigating…Jan 20Jan 20
0x4C3DDCORS 101: Understanding, Implementing, and TroubleshootingImagine the internet as a big neighbourhood. Websites are like houses, and each house has its own rules (like what furniture or food you…Jan 19Jan 19
0x4C3DDFollina’s Secret — A Critical Analysis of the MSDT Windows Zero-DayImagine this: you open a seemingly harmless Word document, and within seconds, your computer becomes a silent pawn in a hacker’s game. This…Jan 13Jan 13
0x4C3DDFrom Paths to Payloads: File Vulnerabilities in Web ArchitectureImagine the internet as a bustling city: stores filled with valuable goods, people strolling around exchanging information, and bustling…Jan 12Jan 12
0x4C3DDSecuring NoSQL Databases: A Comprehensive GuideSource: no-sql-databases.png (902×528) (scnsoft.com)Nov 13, 2023Nov 13, 2023
0x4C3DDThe Sneaky Side Door: A Deep Dive into Insecure Direct Object References (IDOR) in Web ApplicationsSource: idor.jpg (2000×1249) (securityzines.com)Nov 13, 2023Nov 13, 2023