BlogHide Resteemssh4rk (25)in security • 7 years agoAll You Need To Know About PasswordsChoosing and managing passwords is the fundamental security measure in client’s control. Even if the application and it’s server is impenetrable, it means absolutely nothing if your password can be…sh4rk (25)in hacking • 7 years agoSingle Computer DoS - Slow Loris attackUsually, hackers use a lot of computers (or toasters ) to take down a server by overwhelming it with traffic. However, the same goal can sometimes be achieved with a single computer. In this…sh4rk (25)in cryptocurrency • 7 years agoAbusing Bitcoin Blockchain for Fun and ProfitHackers don’t stop at ‘What is it used for?’ but always extend their curiosity to ‘What it can be used for?’ and that’s part of what differentiates hacker’s mindset from many others. With that in…sh4rk (25)in hacking • 7 years agoFundamental security flaws in USBUSB or Universal Serial Bus was not designed with security in mind. Windows, Linux and OS X basically trust anything plugged in USB port. If a hacker has a very short, but private time with your…sh4rk (25)in introduceyourself • 7 years agoH1, 7h3Я3Roaming the world wide web brought me to this place. Internet knows me as computer security enthusiast, researcher and author about the topic on My brain's favorite foods are hacking…