- 07 Dec 2019 »
A Simple Record of SSH Brute Force
This just happened two days ago, when I decided to log in my server to see if everything is okay after a very busy month. Since I set up this server just for my subject project, the configuration o...
- 05 Nov 2019 »
Tor Network: Malicious Exit Relay and DNS Resolution
Introduction
In the past few weeks, I have been working on a subject project. In this project, we attempt to monitor and analysis Tor exit relays by detecting the malicious exit relays and looking ...
- 22 Sep 2019 »
Brief Overview on Measurement of Blockchain
Why It Matters
It is not doubted that Blockchain technologies are taking the world by storm. Some of the most remarkable public blockchains, such like Bitcoin and Ethereum, the former establishes ...
- 12 Sep 2019 »
About Concurrency In Python
Why
Emm…I was heading to talk about this little topic(you sure it is a little topic??) few weeks ago, but you know, procrastination. Actually I happened to write an assignment in Python for scann...
- 03 Sep 2019 »
Paper Review - Examining How the Great Firewall Discovers Hidden Circumvention Servers
Examining How the Great Firewall Discovers Hidden Circumvention Servers
Roya Ensafi , David Fifield , Philipp Winter , Nick Feamster , Nicholas Weaver , Vern Paxson, Examining How the Great Firewa...