Thursday, August 13, 2020
Ethereum vs Bitcoin

The debate of Ethereum vs Bitcoin: Can the Ethereum Take the Throne?

Bitcoin has always been the leading cryptocurrency running the show for quite some time now until in the year 2014 when everything changed.  During that year, Ethereum was announced during the North American Bitcoin Conference and since then, it...
Privacy Policy

Privacy Policy – Sensitive Information that Collected by Websites and Mobile Applications

A privacy policy is a statement that discloses some of the ways a party gathers, uses, discloses, and manages a customer or client's data. While we install applications in mobile or sign up for social network or dating websites etc.We never read the...
Microsoft boycott SHA-1 Certificates

Microsoft boycott SHA-1 Certificates in Edge and Internet Explorer

The move from having SSL Certificates marked with the SHA-1 hashing algorithm to certificate signed with the SHA-256 set to start in November 2014 to meet refreshed federal and PCI compliance measures. Because of the ever show the necessity to...
Deep web

How To Access Deep Web Anonymously and know its Secretive and Mysterious Activities

What is Deep Web The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard search engines for any reason. The opposite term to the deep web is the surface...
CIA triangle

Blind spot in the Bermuda (CIA) Triangle – Security Challenge with Organisation Insider Threats

Inspection in detail is available for Packet’s behaviour, but unfortunately, there is no possibility or means to inspect a person’s Intention. ( CIA triangle ) The reason I selected this title “Blind spot in the Bermuda(CIA) triangle” is The reason...
ethicalhackersacademy