All Articles - Page 2

Started to be written in 2017, SerHack Blog represents a solid but unique point of view in Computer Science field. From cryptocurrencies to information security, from reverse engineering to phishing: many topics are depicted using layman terms. What are you waiting for? Read one of any articles.

Olivetti 0.101.0 for SerHack

Analyzing the Mario Themed Malware

– If you were a child with a Nintendo DS like myself, growing up you will undoubtedly have played (for countless hours) video games from the Mario series. Appearing for the first time in Donkey Kong, Mario is the undisputed protagonist of the video game brand of the Nintendo development house ― from … See Full Article

Analyzing the Mario Themed Malware Illustration

How to Measure Execution Time of a Program

– Measuring the performance of a program means keeping track of the consumption of resources used by the program. See Full Article

How to Measure Execution Time of a Program Illustration

An Introduction to Cryptocurrency Wallets: Which Wallet Type Suits You Best?

– As the blockchain and digital asset ecosystem continues to blossom and produce revolutionary technologies that may potentially be the driving forces of the Fourth Industrial Revolution, newcomers to the space are considering what storage options are available for assets such as cryptocurrencies and … See Full Article

An Introduction to Cryptocurrency Wallets: Which Wallet Type Suits You Best? Illustration

A Beginner’s Guide to Getting Started with Bitcoin

– If you have heard about blockchain or cryptocurrency, then the term that initially comes to mind is Bitcoin. Launched 12 years ago, it was the late 2017 bull run that created a media frenzy that propelled Bitcoin into the mainstream and our modern day lexicon. See Full Article

A Beginner’s Guide to Getting Started with Bitcoin Illustration

How to Write a Technical Book

– For some people, publishing a book represents a dream, or lifelong goal, whereby they share a particular experience or subject matter expertise. See Full Article

How to Write a Technical Book Illustration

How to React to the Ledger Data Breach: 5 Recommendations

– If you think you are amongst the users affected by the latest Ledger data breach, it is important not to panic! Follow a few simple steps and you can check the extent of the damage and keep an eye on the security of your account. See Full Article

How to React to the Ledger Data Breach: 5 Recommendations Illustration

Convos: A Persistent Self-Hosted Web Client for IRC

– Throughout 2020, in large part due to the lockdown, many people have started to become familiar with internal communication tools. Microsoft Teams, Slack, Telegram, Mattermost, and a few others are the most widely used and recognizable of these tools, but there still seems to be some people using … See Full Article

Convos: A Persistent Self-Hosted Web Client for IRC Illustration

A Practical Analysis of the Ledger Phishing Email

– Attempts at phishing and social engineering attacks have increased exponentially as of late, especially towards users who are active in the cryptocurrency space. Recently, there has been much discussion about a cunning attempt by phishers against Ledger and its users. See Full Article

A Practical Analysis of the Ledger Phishing Email Illustration

Phishing: Persuading People through a Voice Synthesized by AI - Part 1

– I get between 10 to 20 emails per day and, usually, more than half of them are phishing attempts. Phishing attempts are a type of email scam that typically aims to obtain personal data of the victim, including username and password for email accounts and popular services (Gmail, Hotmail, mail.ru, … See Full Article

Phishing: Persuading People through a Voice Synthesized by AI - Part 1 Illustration

What is Stealth Address technology and Why Does Monero Use It?

Monero is based on the CryptoNote protocol and utilizes the most powerful cryptographic techniques in an effort to protect the privacy of the sender, recipient, and obfuscate the amount transacted. See Full Article

What is Stealth Address technology and Why Does Monero Use It? Illustration
All tags