Discover
Waves
Decks
Login
Discover
Waves
Decks
Buy perks
Login
Signup
54
stellarlibrarian
StellarLibrarian
Available
Used
Resource Credits
13 Followers
4 Following
July 26, 2019
RSS feed
Posts
Blog
Posts
Comments
Communities
Wallet
Mute
stellarlibrarian
cybersecurity
4y
Ways to Ensure Browser Privacy and Security
image from pexels.com Have you ever wondered how much of a threat your regular internet browser could be to your data privacy and security? When worrying about your apps that could get hacked, we won’t
$ 0.000
0
1
stellarlibrarian
abandoned
4y
McIntyre Iron Furnace Ruins
The McIntyre Iron Furnace is an old steel blast furnace that operated from 1827 to 1857 by the Adirondack Iron Works company. It is located on Upper Works Road in Newcomb, NY, just south of New York's
$ 0.000
1
1
stellarlibrarian
longexposures
4y
The White Mountain Streams
Fresh mountain water flows through soil, stone, and earth, falling with the lands to the vast waters of the ocean. While the streams remain small, there is a lot to be captured. The water flows no matter
$ 1.587
59
stellarlibrarian
colorful
4y
Flashing Lights
Lights in the house, lights in the city, lights in the sky. But none are as bright as these crazy lights. So many lights to break through the darkness.
$ 5.001
635
3
stellarlibrarian
astronomy
4y
New England City Night
$ 0.000
1
stellarlibrarian
city
4y
The Tunnel
In the middle of the city, under the highway, is the long tunnel leading down town. Deep at night this tunnel goes quiet, leaving mysterious lights floating about. This project was for New Hampshire Institute
$ 0.000
1
stellarlibrarian
cybersecurity
4y
4 Tips to Protect yourself from Malware in the COVID Era
The COVID-19 pandemic took the world by storm and has drastically changed how we do things. With more people now forced to work from home, the world is now facing a rise in a new crop of problems. One
$ 0.000
15
stellarlibrarian
blockchain
4y
Cybersecurity for Cryptocurrencies: Top Tips to Get You Going
Image from Pixabay.com Cryptocurrencies are a more secure way of transacting money but the anonymity behind their protocols has made it a hotbed for hackers and scammers. Most of the coins on the crypto
$ 0.000
0
stellarlibrarian
cyberdefense
4y
4 Reasons Cyber Security is a Key Concern for Everyone
You’ll agree with me that the internet plays a crucial role in the lives of many people. It has become so powerful that it somehow impacts those who do not use it at all. Mailing, shopping, communicating,
$ 0.000
2
stellarlibrarian
cybersecurity
4y
Cheap Tech - Why your privacy is at risk, and how to see private (public) web cams.
Introduction Everything has its pros and cons, before deciding something, we have to go through its pros and cons to make a valuable decision. If we neglect the pros and cons of a product we are going
$ 3.976
528
1
stellarlibrarian
cyberinvestigations
4y
Open-source intelligence tools - Stay private and get informed
Introduction What does your neighbor do for a living? Was that guy that cut you off on the high way a criminal? Who was emailing me spam? Open-source intelligence means collecting information through various
$ 3.951
567
1
stellarlibrarian
guide
4y
Understanding Virtual Marketing - How to be seen.
Introduction Marketing is advertising publicity and sales technique. Once you start a business, now the next step is to tell people your services' robust marketing approach leads to good profit. Marketing
$ 4.349
539
2
stellarlibrarian
crypto
4y
What are Crypto Coins? Bananas? Fake money?
Introduction Technology can be hacked, bitcoin is for scams, and virtual money is just virtual money, right? Not necessarily. A cryptocurrency is a form of digital currency that uses the concept of
$ 0.041
4
stellarlibrarian
cloud
4y
Cloud Security Basics
Cloud security, comprises of a lot of strategies, controls, methodology, and advancements that work together to ensure cloud-based frameworks, information, and foundation. These security measures are designed
$ 0.028
2
stellarlibrarian
blockchain
4y
What is Cryptocurrency?
Introduction Cryptocurrency is a simple, common name that refers to all (while not having one principal place of command) cryptocurrencies like Bitcoin, Ethereum, and many others. Cryptocurrency makes
$ 0.000
8
1
stellarlibrarian
crypto
4y
How do Crypto Currency Exchanges work?
A cryptocurrency exchange is essentially a stage for coordinating purchasers and merchants. They work similarly as trading for different resources, for example, stocks. Individuals will, in general, call
$ 0.032
3
stellarlibrarian
blockchain
4y
Protect your crypto accounts from attackers
With cryptocurrencies, there is no centralized authority responsible for the security of your funds, while the dangers are abundant. Your wallet can be hacked, and your PC can be captured by a virus designed
$ 0.000
0
stellarlibrarian
guide
4y
Log Analysis
In the technical milieu, a log is a continuously produced and time-stepped report of occurrences identified and reported in reaction to specific events. All frameworks and applications produce log records
$ 0.000
0
stellarlibrarian
cloud
5y
Cloud security
Cloud security, otherwise called cloud processing security, comprises of a lot of strategies, controls, methodology, and advancements that work together to ensure cloud-based frameworks, information, and
$ 0.000
0
stellarlibrarian
cyber
5y
Intrusion Detection (IDS)
IDS is a system that monitors network traffic for suspicious action and alerts you when such advancement is perceived. This is a thing application that scans your network or system for harmful exercises
$ 4.636
519
Center