Hacking Organizations

Remember the question from Introduction, Who did it? Here comes the answer. These are some notable hacking organizations. Isn’t that strange? Actually Not!!. This doesn’t mean that they are only involved in hazardous activities. Some are with us and some for us, mean the same, but the perspective do not!! Some work as government agencies,corporations […]

Threats and Protection

We have already learnt what is a threat in earlier writings. If not visited yet, here are the detailed details!! “Prevention is better than cure!”, the elders’ sayings should not be passed over. Like Voldemort having horcruxes, bad always have several forms. Now we shall plunge into some of the types of threats, prevention and […]

Hashing in the Blockchain

In the previous post, I had explained the uses of cryptography in the blockchain. This post provides an overview of the use of hash functions in blockchains. The electronic coin is an essential feature of every blockchain, albeit the exchange of cryptocurrency may not be the use case. Blockchains can be used for other purposes […]