Login
Discover
Waves
Decks
Plus
Login
Signup
StellarLibrarian
@stellarlibrarian
54
Followers
13
Following
4
Resource Credits
Available
Used
Created
July 26, 2019
RSS Feed
Subscribe
Blog
Blog
Posts
Comments
Communities
Wallet
stellarlibrarian
cybersecurity
2021-01-26 10:31
Ways to Ensure Browser Privacy and Security
image from pexels.com Have you ever wondered how much of a threat your regular internet browser could be to your data privacy and security? When worrying about your apps that could get hacked, we won’t
$ 0.000
0
1
stellarlibrarian
abandoned
2020-11-28 03:00
McIntyre Iron Furnace Ruins
The McIntyre Iron Furnace is an old steel blast furnace that operated from 1827 to 1857 by the Adirondack Iron Works company. It is located on Upper Works Road in Newcomb, NY, just south of New York's
$ 0.000
1
1
stellarlibrarian
longexposures
2020-11-27 23:03
The White Mountain Streams
Fresh mountain water flows through soil, stone, and earth, falling with the lands to the vast waters of the ocean. While the streams remain small, there is a lot to be captured. The water flows no matter
$ 1.587
59
stellarlibrarian
colorful
2020-11-27 06:23
Flashing Lights
Lights in the house, lights in the city, lights in the sky. But none are as bright as these crazy lights. So many lights to break through the darkness.
$ 5.001
635
3
stellarlibrarian
astronomy
2020-11-27 05:36
New England City Night
$ 0.000
1
stellarlibrarian
city
2020-11-27 05:20
The Tunnel
In the middle of the city, under the highway, is the long tunnel leading down town. Deep at night this tunnel goes quiet, leaving mysterious lights floating about. This project was for New Hampshire Institute
$ 0.000
1
stellarlibrarian
cybersecurity
2020-11-16 13:57
4 Tips to Protect yourself from Malware in the COVID Era
The COVID-19 pandemic took the world by storm and has drastically changed how we do things. With more people now forced to work from home, the world is now facing a rise in a new crop of problems. One
$ 0.000
15
stellarlibrarian
blockchain
2020-11-02 22:07
Cybersecurity for Cryptocurrencies: Top Tips to Get You Going
Image from Pixabay.com Cryptocurrencies are a more secure way of transacting money but the anonymity behind their protocols has made it a hotbed for hackers and scammers. Most of the coins on the crypto
$ 0.000
0
stellarlibrarian
cyberdefense
2020-10-19 17:21
4 Reasons Cyber Security is a Key Concern for Everyone
You’ll agree with me that the internet plays a crucial role in the lives of many people. It has become so powerful that it somehow impacts those who do not use it at all. Mailing, shopping, communicating,
$ 0.000
2
stellarlibrarian
cybersecurity
2020-10-05 14:57
Cheap Tech - Why your privacy is at risk, and how to see private (public) web cams.
Introduction Everything has its pros and cons, before deciding something, we have to go through its pros and cons to make a valuable decision. If we neglect the pros and cons of a product we are going
$ 3.976
528
1
stellarlibrarian
cyberinvestigations
2020-09-28 12:02
Open-source intelligence tools - Stay private and get informed
Introduction What does your neighbor do for a living? Was that guy that cut you off on the high way a criminal? Who was emailing me spam? Open-source intelligence means collecting information through various
$ 3.951
567
1
stellarlibrarian
guide
2020-09-14 14:18
Understanding Virtual Marketing - How to be seen.
Introduction Marketing is advertising publicity and sales technique. Once you start a business, now the next step is to tell people your services' robust marketing approach leads to good profit. Marketing
$ 4.349
539
2
stellarlibrarian
crypto
2020-09-08 11:32
What are Crypto Coins? Bananas? Fake money?
Introduction Technology can be hacked, bitcoin is for scams, and virtual money is just virtual money, right? Not necessarily. A cryptocurrency is a form of digital currency that uses the concept of
$ 0.041
4
stellarlibrarian
cloud
2020-09-08 10:21
Cloud Security Basics
Cloud security, comprises of a lot of strategies, controls, methodology, and advancements that work together to ensure cloud-based frameworks, information, and foundation. These security measures are designed
$ 0.028
2
stellarlibrarian
blockchain
2020-08-24 13:31
What is Cryptocurrency?
Introduction Cryptocurrency is a simple, common name that refers to all (while not having one principal place of command) cryptocurrencies like Bitcoin, Ethereum, and many others. Cryptocurrency makes
$ 0.000
8
1
stellarlibrarian
crypto
2020-08-10 10:08
How do Crypto Currency Exchanges work?
A cryptocurrency exchange is essentially a stage for coordinating purchasers and merchants. They work similarly as trading for different resources, for example, stocks. Individuals will, in general, call
$ 0.032
3
stellarlibrarian
blockchain
2020-05-18 09:36
Protect your crypto accounts from attackers
With cryptocurrencies, there is no centralized authority responsible for the security of your funds, while the dangers are abundant. Your wallet can be hacked, and your PC can be captured by a virus designed
$ 0.000
0
stellarlibrarian
guide
2020-05-04 10:13
Log Analysis
In the technical milieu, a log is a continuously produced and time-stepped report of occurrences identified and reported in reaction to specific events. All frameworks and applications produce log records
$ 0.000
0
stellarlibrarian
cloud
2020-04-20 08:39
Cloud security
Cloud security, otherwise called cloud processing security, comprises of a lot of strategies, controls, methodology, and advancements that work together to ensure cloud-based frameworks, information, and
$ 0.000
0
stellarlibrarian
cyber
2020-04-06 19:42
Intrusion Detection (IDS)
IDS is a system that monitors network traffic for suspicious action and alerts you when such advancement is perceived. This is a thing application that scans your network or system for harmful exercises
$ 4.636
519