blog.umarsalim.com
Open in
urlscan Pro
172.67.215.181
Public Scan
Submitted URL: http://blog.umarsalim.com/
Effective URL: https://blog.umarsalim.com/
Submission: On May 16 via api from US — Scanned from DE
Effective URL: https://blog.umarsalim.com/
Submission: On May 16 via api from US — Scanned from DE
Form analysis
4 forms found in the DOMGET https://blog.umarsalim.com/
<form role="search" method="get" class="form-search" action="https://blog.umarsalim.com/">
<div class="input-group">
<label class="screen-reader-text" for="s">Search for:</label>
<input type="text" class="form-control search-query" placeholder="Search…" value="" name="s" title="Search for:">
<span class="input-group-btn">
<button type="submit" class="btn btn-default" name="submit" id="searchsubmit" value="Search"><span class="glyphicon glyphicon-search"></span></button>
</span>
</div>
</form>
POST #
<form action="#" method="post" accept-charset="utf-8" id="subscribe-blog-blog_subscription-3" data-blog="131198251" data-post_access_level="everybody">
<div id="subscribe-text">
<p>Enter your email address to subscribe to this blog and receive notifications of new posts by email.</p>
</div>
<p id="subscribe-email">
<label id="jetpack-subscribe-label" class="screen-reader-text" for="subscribe-field-blog_subscription-3"> Email Address </label>
<input type="email" name="email" required="required" value="" id="subscribe-field-blog_subscription-3" placeholder="Email Address">
</p>
<p id="subscribe-submit">
<input type="hidden" name="action" value="subscribe">
<input type="hidden" name="source" value="https://blog.umarsalim.com/">
<input type="hidden" name="sub-type" value="widget">
<input type="hidden" name="redirect_fragment" value="subscribe-blog-blog_subscription-3">
<input type="hidden" id="_wpnonce" name="_wpnonce" value="d098ec48e7"><input type="hidden" name="_wp_http_referer" value="/"> <button type="submit" class="wp-block-button__link btn btn-default" name="jetpack_subscriptions_widget"> Subscribe
</button>
</p>
</form>
<form id="jp-carousel-comment-form">
<label for="jp-carousel-comment-form-comment-field" class="screen-reader-text">Write a Comment...</label>
<textarea name="comment" class="jp-carousel-comment-form-field jp-carousel-comment-form-textarea" id="jp-carousel-comment-form-comment-field" placeholder="Write a Comment..."></textarea>
<div id="jp-carousel-comment-form-submit-and-info-wrapper">
<div id="jp-carousel-comment-form-commenting-as">
<fieldset>
<label for="jp-carousel-comment-form-email-field">Email (Required)</label>
<input type="text" name="email" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-email-field">
</fieldset>
<fieldset>
<label for="jp-carousel-comment-form-author-field">Name (Required)</label>
<input type="text" name="author" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-author-field">
</fieldset>
<fieldset>
<label for="jp-carousel-comment-form-url-field">Website</label>
<input type="text" name="url" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-url-field">
</fieldset>
</div>
<input type="submit" name="submit" class="jp-carousel-comment-form-button btn btn-default" id="jp-carousel-comment-form-button-submit" value="Post Comment">
</div>
</form>
POST
<form method="post">
<input type="submit" value="Close and accept" class="accept btn btn-default">
</form>
Text Content
Skip to main content UMAR'S BLOG Toggle navigation * Home * About * IdentityIQ * Cybersecurity EXPLORING SCALABILITY SOLUTIONS FOR BLOCKCHAIN NETWORKS: AN OVERVIEW OF LAYER 1 AND LAYER 2 6th January 202317th December 2022 Umar Salim Leave a comment Decentralised networks such as Bitcoin and Ethereum have the potential to revolutionize many different industries thanks to their secure, transparent and immutable properties allowing for a decentralised way to store data and transfer value. The current limitations of these networks are the scalability and performance challenges they face. The Bitcoin network can handle 7 transactions […] Read More GETTING STARTED: BLOCKCHAIN, WALLETS, DEFI AND UNISWAP 23rd December 202210th December 2022 Umar Salim Leave a comment If you’re new to the world of blockchain and decentralised finance (DeFi) you may be wondering how to get started. In this short article I will explain what web3 and decentralised finance (DeFi) are, how to create a wallet, and some popular providers you can use to access DeFi services. What is blockchain? Blockchains are […] Read More ZERO KNOWLEDGE PROOFS IN DECENTRALISED NETWORKS 10th December 202210th December 2022 Umar Salim 1 Comment Zero-knowledge proofs are an effective tool for improving the security and privacy of decentralised networks. A zero-knowledge proof is a mathematical technique that allows for one party (the prover) to prove to another party (the verifier) that they know the value of a specific piece of information without revealing the actual information. The most well-known […] Read More LIMITATIONS OF ANTI-VIRUS SOFTWARE: STUXNET, DUQU, FLAME AND RED OCTOBER 8th April 202119th June 2022 Umar Salim Leave a comment This post will be a short technical comparison of the biggest advanced persistent threats over the last 10 years; Stuxnet, Duqu, Flame and Red October. Stuxnet Stuxnet was spotted as early as June 2009 and this was one of the first major APT’s due to the impressive change in the complexity in comparison to traditional […] Read More AN INTRODUCTION TO MULTI-LEVEL SECURITY CONFIDENTIALITY: CLARK-WILSON AND BREWER NASH MODELS VS BELL-LAPADULA AND BIBA MODELS 3rd December 202019th June 2022 Umar Salim Leave a comment The Biba Model was developed by Kenneth J. Biba and released in 1977 as a security model which focuses on the integrity of data. This was intended for non-military organisations where the integrity of data was more important than the confidentiality of data. This model is built on the state machine concept which focuses on […] Read More 5 SECURE CODING PRACTICES FOR SOFTWARE ENGINEERS 2nd September 202019th June 2022 Umar Salim Leave a comment Developers work towards solving specific issues and since programming is a skill used in many industries, this means there are a lot of developers who are designing and creating solutions/applications. A challenge faced by developers when writing secure software is the vast amount of tutorials available on the internet. These tutorials successfully demonstrate how to […] Read More POSTS NAVIGATION 1 2 … 4 Older posts SEARCH Search for: CATEGORIES * Blockchain (3) * News (2) * Cybersecurity (6) * Articles (3) * IdentityIQ (2) * Server Related (6) * Web Hosting (3) * Programming (3) * PHP (2) * Shell (1) * Reviews (1) * Mobile (6) * General (3) SUBSCRIBE TO BLOG VIA EMAIL Enter your email address to subscribe to this blog and receive notifications of new posts by email. Email Address Subscribe RECENT COMMENTS * Exploring Scalability Solutions for Blockchain Networks: An Overview of Layer 1 and Layer 2 – Umar's Blog on Zero Knowledge Proofs in Decentralised Networks * Ayaz on Creating an IdentityIQ Cluster * Umar Salim on Installing Sailpoint IdentityIQ 7.3 META * Log in * Entries feed * Comments feed * WordPress.org sparkling Theme by Colorlib Powered by WordPress Loading Comments... Write a Comment... Email (Required) Name (Required) Website Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use. To find out more, including how to control cookies, see here: Cookie Policy