avatar  

Basically, distributed ledger is the concept of sharing data evolution control in a common network. One of the most famous examples of this are BITCOINS, which works over a blockchain, a data base distributed between several participants (nodes) inside a ledger, which contains the updated status of each transaction between the nodes. These nodes are connected using a specific protocol.

The key of this system’s movement lays on Token, elements that contains information and are encrypted. This token could act as a currency, vote, message, or anything that can be fixed in Distributed Ledger system. Several startups saw in this...

avatar  

ネットワークの監視の学過ぎ問題の保証見つける だろう。ネットワークの監視はあまり難しくないです。あなたはLINUXとBRO要ろう。

BROはコマンドラインインターフェイスでそ。あなたのオペレーションシステムはLINUXですなら、ここにダウンロードください

https://www.bro.org/download/index.html

[…/bro/bin]にsudo[./broctl]実行ください。

あなたはこれ見えるすべき

Welcome to BroControl 1.7

Type "help" for help.

[BroControl] >

それはBROのインタフェースです。[start]書こうなら、[…/bro/logs]助けるます。[…/bro/logs]はネットワークの情報持つです! たとえば、[x509.log]は証明証もつです。あなたは止ま行きたいなら、[BroControl]に[stop]書いてください。

Also in Hatena, similar post in English here.

Originally written in: https://dev.to/terceranexus6/-1jj

avatar  

Friday was such an intense day regarding to security. First of all I started investigating for a class assignment about Distributed Ledger (as in Bitcoin system) applied to other things such as energy industry, communication and similar. A distributed ledger is a database held and updated independently by each participant (or node) in a large network. The lacking of central authority makes individual nodes process every transaction, and update the ledger again (for every node).

I found this deeply interesting and started investigating about Ethereum as its documentation provides a...

avatar  

As my second week in my security intensive study a huge opportunity appeared in my life! Casually, I’ve been asked to guide a group of students into Network monitoring and Forensic, which is already my favourite security module. I wanted to study in a wider range, as I already said in week one, but right now I should put most of my efforts in the group goals, also I’m excited with the opportunity of learning from these guys.

Anyway, I’d like to start this article with a brief explanation on “where to sniff”, where in a network should we...

avatar  

I’m very interested in cybersecurity and I’m studying it on my own alongside computer engineering. In order to improve this research, I decided to organize an intense studying sprint in cybersec, and jumping into “semi professional” projects, using Zerodium and similar. Before presenting a formal vulnerability to these pages, I want to prepare myself. I’m used to work with Network System Monitoring and similar, but I want to reach a wider action zone.

This week I started looking for resources, books, pages and inspiration. I read a couple of books, but they seemed quite for begginners (as they firstly speak...