Open in app

Sign In

Write

Sign In

Maretti
Maretti

218 Followers

Home

About

Apr 8

So you want to get into cybersecurity? This is where you should start!

Beginner Cybersecurity Learning Guide — This article gives a full dive into everything you should learn to start a career in cybersecurity! CYBERSECURITY IS MORE THAN JUST HACKING Intro Welcome to this guide on getting started with cybersecurity. This domain is vast, so it’s important to focus your learning efforts. In this article, I’ll provide an…

Cybersecurity

7 min read

So you want to get into cybersecurity? This is where you should start!
So you want to get into cybersecurity? This is where you should start!
Cybersecurity

7 min read


Apr 6

My Experience Reply cyber security CTF 2022

(CTF) Reply cyber security challenge — The challenge The Reply Cybersecurity challenge is a 24-hour Capture The Flag competition held from October 14 to 15, 2022, where teams of up to 4 members participate. The competition includes challenges from 5 different categories: Coding, Web, Binary, Crypto, and Miscellaneous, which combines different categories into one. Experience I joined forces with…

Technology

1 min read

My Experience Reply cyber security CTF 2022
My Experience Reply cyber security CTF 2022
Technology

1 min read


Apr 6

My Experience Hack The Future — 2022

(Hackathon) Hack The Future — 2022 — The Hackathon Hack The Future is a hackathon organized by The Cronos Group, a consortium of technology companies in Belgium. The event was well-organized and had a professional atmosphere, with many companies from within the Cronos Group in attendance. Participants could choose to attend the event either online or in-person in Antwerp. Experience …

Tech

1 min read

My Experience Hack The Future — 2022
My Experience Hack The Future — 2022
Tech

1 min read


Apr 6

My Experience GitHub Galaxy — 2023

(Conference) GitHub Galaxy — 2023 — The Conference GitHub Galaxy was a four-day conference hosted by GitHub from March 28 to March 31. The conference featured sessions on a wide range of topics, including software development cycles, AI, security, and productivity. The event boasted a large number of speakers from various industries, including GitHub employees and senior developers…

Technology

2 min read

My Experience GitHub Galaxy — 2023
My Experience GitHub Galaxy — 2023
Technology

2 min read


Published in

System Weakness

·Mar 19

How to create a RAT payload using msfvenom

This article is written for educational purposes only Introduction Remote Access Trojans, or RATs, are a type of malware that allow an attacker to take control of a victim’s computer remotely. These types of attacks are often used by cybercriminals to steal sensitive data…

Penetration Testing

2 min read

How to create a RAT payload using msfvenom
How to create a RAT payload using msfvenom
Penetration Testing

2 min read


Published in

System Weakness

·Feb 26

An Introduction To Cryptography: Hashes — SHA

Cryptographic Hash Functions — Intro A hash function uses a variable-length block of input data and produces a fixed-size hash value as output. Hash functions are used in computers to determine if data has been changed or not. An example If you download a program from the internet some vendors provide the MD5 checksum hash…

Cryptography

3 min read

An Introduction To Cryptography: Hashes — SHA
An Introduction To Cryptography: Hashes — SHA
Cryptography

3 min read


Published in

InsiderFinance Wire

·Feb 19

How to create an automated crypto rebalancer bot in Python

Use Case Driven Paper — Crypto Rebalancer Script — Part 1 - The Introduction I will begin this paper by outlining our plans for creating a cryptocurrency portfolio rebalancer. Before I do so, I must explain what crypto rebalancing is and how it works. Crypto rebalancing explained Let's start with the basic scenario. As an investor, you have a cryptocurrency portfolio that holds 50% in Bitcoin and…

Cryptocurrency

20 min read

How to create a automated crypto rebalancer bot in Python
How to create a automated crypto rebalancer bot in Python
Cryptocurrency

20 min read


Feb 15

The Importance of Mental Health in the Tech Industry

Let’s talk about it! — Introduction The tech industry and mental health don’t cooperate well. A lot of tech workers are faced with mental issues caused by their job. This number could be as high as 90% according to the OSMI Mental Health in Tech Survey. In this article I will be providing my 2 cents…

Mental Health

4 min read

The Importance of Mental Health in the Tech Industry
The Importance of Mental Health in the Tech Industry
Mental Health

4 min read


Feb 13

5 Simple Steps to Boost Your Cybersecurity at Home

Stay Safe At Home — Introduction We use technology every day and a lot of us don’t pay attention to our online safety. In this article, I will discuss some small steps that can be taken to enhance your online security and keep you and your data safe. 5 Simple Steps to Boost Your Cybersecurity at Home

Cybersecurity

3 min read

5 Simple Steps to Boost Your Cybersecurity at Home
5 Simple Steps to Boost Your Cybersecurity at Home
Cybersecurity

3 min read


Published in

System Weakness

·Feb 6

An Introduction To Cryptography: asymmetric ciphers — RSA

Rivest-Shamir-Adleman — Intro Asymmetric is also referred to as public key cryptography. Because it makes use of 2 keys, a public key and a private key. In previous chapters we took a look at symmetric ciphers like DES and AES these are referred to as private key cryptography. In this chapter I will…

Cryptography

3 min read

An Introduction To Cryptography: asymmetric ciphers — RSA
An Introduction To Cryptography: asymmetric ciphers — RSA
Cryptography

3 min read

Maretti

Maretti

218 Followers

Cybersecurity student writing about technology and lifestyle

Following
  • R. Eric Kiser

    R. Eric Kiser

  • Immunefi

    Immunefi

  • InsiderFinance Team

    InsiderFinance Team

  • Medium Creators

    Medium Creators

  • DevGenius Team

    DevGenius Team

See all (14)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams