- 07 Dec 2019 »
This just happened two days ago, when I decided to log in my server to see if everything is okay after a very busy month. Since I set up this server just for my subject project, the configuration o...
A Simple Record of SSH Brute Force
- 05 Nov 2019 »
In the past few weeks, I have been working on a subject project. In this project, we attempt to monitor and analysis Tor exit relays by detecting the malicious exit relays and looking ...
Tor Network: Malicious Exit Relay and DNS Resolution
- 22 Sep 2019 »
Why It Matters
It is not doubted that Blockchain technologies are taking the world by storm. Some of the most remarkable public blockchains, such like Bitcoin and Ethereum, the former establishes ...
Brief Overview on Measurement of Blockchain
- 12 Sep 2019 »
Emm…I was heading to talk about this little topic(you sure it is a little topic??) few weeks ago, but you know, procrastination. Actually I happened to write an assignment in Python for scann...
About Concurrency In Python
- 03 Sep 2019 »
Examining How the Great Firewall Discovers Hidden Circumvention Servers
Roya Ensafi , David Fifield , Philipp Winter , Nick Feamster , Nicholas Weaver , Vern Paxson, Examining How the Great Firewa...
Paper Review - Examining How the Great Firewall Discovers Hidden Circumvention Servers