BlogHide Resteemsmrhacker1024 (25)in crypto • 6 years agoCrypto Markets Placid on 10th Anniversary of Bitcoin WhitepaperWednesday, Oct. 31: after a couple of days of mild losses, crypto markets have today stabilized, with most of the top twenty cryptocurrencies by market cap seeing slight fluctuations capped within a…mrhacker1024 (25)in xrp • 6 years agoRipple Grapples With Its $21 Billion 'Gorilla': Crypto Asset AdoptionThe organizers of Ripple's two-day Swell conference in San Francisco didn't beat around the bush when they named the final panel of the event "The 800-Pound Gorilla." The question of crypto asset…mrhacker1024 (25)in hack • 6 years agoPassword Brute Force Attacks Threaten Millions of App UsersIn September of 2014, private photos of a number of celebrities, including Kate Upton and Jennifer Lawrence, were leaked onto the image-based bulletin board 4chan. It was soon discovered that this…mrhacker1024 (25)in oneplus6 • 6 years agoHere's everything we think we know about the OnePlus 6T Share on Facebook Share on TwitterOnce upon a time ago, OnePlus used to release one flagship phone a year. But as the company has grown, it's moved to two. In 2016, we got the OnePlus 3 and then the 3T. Then in 2017, the OnePlus 5…mrhacker1024 (25)in bloackchain • 6 years agoWhat is blockchain? The most disruptive tech in decadesThe distributed ledger technology, better known as blockchain, has the potential to eliminate huge amounts of record-keeping, save money and disrupt IT in ways not seen since the internet…mrhacker1024 (25)in iot • 6 years agoInternet of Things (IoT)The Internet of Things is the concept of everyday objects – from industrial machines to wearable devices – using built-in sensors to gather data and take action on that data across a network. So…mrhacker1024 (25)in food • 6 years agoHealthy Eating!!( Healthy eating is not about strict dietary limitations, staying unrealistically thin, or depriving yourself of the foods you love. Rather, it’s about feeling great, having more energy, improving…mrhacker1024 (25)in word • 7 years agoMS Office Built-In Feature Could be Exploited to Create Self-Replicating MalwareEarlier this month a cybersecurity researcher shared details of a security loophole with The Hacker News that affects all versions of Microsoft Office, allowing malicious actors to create and spread…mrhacker1024 (25)in currency • 7 years agoWhat is cryptocurrency??? 21st-century unicorn – or the money of the future?This introduction explains the most important thing about cryptocurrencies. After you‘ve read it, you‘ll know more about it than most other humans. Today cryptocurrencies have become a global…mrhacker1024 (25)in ethical • 7 years ago2. Ethical Hacking − Hacker TypesHackers can be classified into different categories such as white hat, black hat, and grey hat, based on their intent of hacking a system. These different terms come from old Spaghetti Westerns…mrhacker1024 (25)in ethical • 7 years ago1. Ethical Hacking − OverviewHacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT…mrhacker1024 (25)in tecnology • 7 years agoHow technology is changing disaster relief.Consider the efforts of the United Kingdom’s Royal Air Force in distributing to refugees in Northern Iraq the following: water; food; and the technology needed to communicate -- power for mobile…