All articles

Started to being written in 2017, SerHack Blog represents a solid but unique point of view in Computer Science field. From cryptocurrencies to information security, from reverse engineering to phishing: many topics are depicted using layman terms. What are you waiting for? Read one of any articles.
Note that part of articles are in Italian since it's my first language. Italian culture and classicism gave me an inspiration for this blog.

Olivetti 0.92.0 for SerHack

Monitoring Your Own Infrastructure Using Grafana, InfluxDB, and CollectD

– For some companies, infrastructure is the heart of its business. Specifically, I am referring to those companies which need to manage data and applications located on more than one server. It is essential for a company to monitor its infrastructure nodes, especially if the company does not have … Read Full Article

Monitoring Your Own Infrastructure Using Grafana, InfluxDB, and CollectD illustration

🇮🇹Il mito della privacy e della crittografia end-to-end in Zoom

– Zoom è un servizio per ospitare meeting senza bisogno di installare e configurare complicati applicativi: è una delle tante soluzioni per chi, in periodo di quarantena, vuole tenersi in contatto con amici e parenti. In questo ultimo periodo, sta avendo un successo dato dalla semplicità con cui è … Read Full Article

Il mito della privacy e della crittografia end-to-end in Zoom illustration

The Myth of Privacy and End-to-End Encryption in Zoom

– Zoom is a service to host meetings without the need to install and configure complicated applications: it is one of the many solutions for those who, during quarantine, want to keep in touch with friends and relatives. In this last period of lockdown, Zoom is becoming popular because of how simple … Read Full Article

The Myth of Privacy and End-to-End Encryption in Zoom illustration

Take off the Infrastructure of a Scammer: Cryptonder and Torowallet

– On a rainy autumn day, I was contacted like many users by a suspicious individual on Telegram. He insisted on asking for the help of the user who had to recover his wallet which contained several bitcoins. Our “friend”, hencereferred as “M.”, insisted that the user has to … Read Full Article

Take off the Infrastructure of a Scammer: Cryptonder and Torowallet illustration

Monero Windows and Linux CLI Compromised: The Analysis of Binaries

– As mentioned in the getmonero.org blog post, the binaries of Command Line Interface (CLI) of Monero were recently compromised. For readers who are unaware of Monero, it is a cryptocurrency which aims to protect the financial privacy of its users. It is based on well-known technologies such as ring … Read Full Article

Monero Windows and Linux CLI Compromised: The Analysis of Binaries illustration