Cryptography
The BotnetA botnet is a growing network of Internet-connected malicious devices (computers, laptops, tablets, routers and mobile phones), which have been infected with “malware” which act as bots. Botnets can be used to perform distributed denial-of-service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software. The word “botnet” is a portmanteau of the words “robot” and “network”. The term is usually used with a negative or malicious connotation
3 Minutes
Jan 6, 2025
LastMod: Jan 6, 2025
488 Words
A botnet is a growing network of Internet-connected malicious devices (computers, laptops, tablets, routers and mobile phones), which have been infected with “malware” which act as bots. Botnets can be used to perform distributed denial-of-service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software. The word “botnet” is a portmanteau of the words “robot” and “network”. The term is usually used with a negative or malicious connotation
The BotnetA botnet is a growing network of Internet-connected malicious devices (computers, laptops, tablets, routers and mobile phones), which have been infected with “malware” which act as bots. Botnets can be used to perform distributed denial-of-service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software. The word “botnet” is a portmanteau of the words “robot” and “network”. The term is usually used with a negative or malicious connotation
3 Minutes
Jan 6, 2025
LastMod: Jan 6, 2025
488 Words
A botnet is a growing network of Internet-connected malicious devices (computers, laptops, tablets, routers and mobile phones), which have been infected with “malware” which act as bots. Botnets can be used to perform distributed denial-of-service attacks, steal data, send spam, and allow the attacker to access the device and its connection. The owner can control the botnet using command and control software. The word “botnet” is a portmanteau of the words “robot” and “network”. The term is usually used with a negative or malicious connotation
Block Crawler BotsNOTE: This article is still work in progress as I haven’t had the time to experiment with a few ideas to see which one works best.
6 Minutes
Jan 3, 2025
LastMod: Jan 3, 2025
1199 Words
NOTE: This article is still work in progress as I haven’t had the time to experiment with a few ideas to see which one works best.
Block Crawler BotsNOTE: This article is still work in progress as I haven’t had the time to experiment with a few ideas to see which one works best.
6 Minutes
Jan 3, 2025
LastMod: Jan 3, 2025
1199 Words
NOTE: This article is still work in progress as I haven’t had the time to experiment with a few ideas to see which one works best.
Blockchain and Cryptography made simple for Businesses signature for documents and imagesA glimpse of using modern technology to provide adequate solutions to
business needs. The document signature system was built with blockchain technology.
It provides the ability to upload documents, get them signed
cryptographically and have them verified within the system for
integrity.
1 Minutes
Apr 10, 2023
LastMod: Apr 10, 2023
193 Words
A glimpse of using modern technology to provide adequate solutions to business needs. The document signature system was built with blockchain technology. It provides the ability to upload documents, get them signed cryptographically and have them verified within the system for integrity.
Blockchain and Cryptography made simple for Businesses signature for documents and imagesA glimpse of using modern technology to provide adequate solutions to
business needs. The document signature system was built with blockchain technology.
It provides the ability to upload documents, get them signed
cryptographically and have them verified within the system for
integrity.
1 Minutes
Apr 10, 2023
LastMod: Apr 10, 2023
193 Words
A glimpse of using modern technology to provide adequate solutions to business needs. The document signature system was built with blockchain technology. It provides the ability to upload documents, get them signed cryptographically and have them verified within the system for integrity.