Vulnerability Scanning

vulnerability-scanning

Vulnerability scanner software or packages are applications that inspects and logs information about the potential threats, security holes and systems connected on the network. Vulnerability scanning is used as the first step to secure a network or a computer in the network. These tests are passive tests unlike penetration tests. Passive tests are those tests … Read more

Bitcoin Part 1

bitcoin

Bitcoin is a digital currency that came in existence in 2008. Although other digital currencies existed prior to bitcoin, it was the first currency to become success. Since then, the digital currency market is flooded with a lot of variations of cryptocurrencies. At the time of writing this article, there are roughly 3000 cryptocurrencies in … Read more

How to ensure privacy protection online? Using VPN

privacy protection using vpn

The global internetwork of computers systems popularly known as internet enables us to access any information we seek within just few clicks. All devices connected to internet use an IP address to identify itself and this IP address is the reason why the information that we search reach us correctly. It helps in routing of … Read more