blog.umarsalim.com Open in urlscan Pro
172.67.215.181  Public Scan

Submitted URL: http://blog.umarsalim.com/
Effective URL: https://blog.umarsalim.com/
Submission: On May 16 via api from US — Scanned from DE

Form analysis 4 forms found in the DOM

GET https://blog.umarsalim.com/

<form role="search" method="get" class="form-search" action="https://blog.umarsalim.com/">
  <div class="input-group">
    <label class="screen-reader-text" for="s">Search for:</label>
    <input type="text" class="form-control search-query" placeholder="Search…" value="" name="s" title="Search for:">
    <span class="input-group-btn">
      <button type="submit" class="btn btn-default" name="submit" id="searchsubmit" value="Search"><span class="glyphicon glyphicon-search"></span></button>
    </span>
  </div>
</form>

POST #

<form action="#" method="post" accept-charset="utf-8" id="subscribe-blog-blog_subscription-3" data-blog="131198251" data-post_access_level="everybody">
  <div id="subscribe-text">
    <p>Enter your email address to subscribe to this blog and receive notifications of new posts by email.</p>
  </div>
  <p id="subscribe-email">
    <label id="jetpack-subscribe-label" class="screen-reader-text" for="subscribe-field-blog_subscription-3"> Email Address </label>
    <input type="email" name="email" required="required" value="" id="subscribe-field-blog_subscription-3" placeholder="Email Address">
  </p>
  <p id="subscribe-submit">
    <input type="hidden" name="action" value="subscribe">
    <input type="hidden" name="source" value="https://blog.umarsalim.com/">
    <input type="hidden" name="sub-type" value="widget">
    <input type="hidden" name="redirect_fragment" value="subscribe-blog-blog_subscription-3">
    <input type="hidden" id="_wpnonce" name="_wpnonce" value="d098ec48e7"><input type="hidden" name="_wp_http_referer" value="/"> <button type="submit" class="wp-block-button__link btn btn-default" name="jetpack_subscriptions_widget"> Subscribe
    </button>
  </p>
</form>

<form id="jp-carousel-comment-form">
  <label for="jp-carousel-comment-form-comment-field" class="screen-reader-text">Write a Comment...</label>
  <textarea name="comment" class="jp-carousel-comment-form-field jp-carousel-comment-form-textarea" id="jp-carousel-comment-form-comment-field" placeholder="Write a Comment..."></textarea>
  <div id="jp-carousel-comment-form-submit-and-info-wrapper">
    <div id="jp-carousel-comment-form-commenting-as">
      <fieldset>
        <label for="jp-carousel-comment-form-email-field">Email (Required)</label>
        <input type="text" name="email" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-email-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-author-field">Name (Required)</label>
        <input type="text" name="author" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-author-field">
      </fieldset>
      <fieldset>
        <label for="jp-carousel-comment-form-url-field">Website</label>
        <input type="text" name="url" class="jp-carousel-comment-form-field jp-carousel-comment-form-text-field" id="jp-carousel-comment-form-url-field">
      </fieldset>
    </div>
    <input type="submit" name="submit" class="jp-carousel-comment-form-button btn btn-default" id="jp-carousel-comment-form-button-submit" value="Post Comment">
  </div>
</form>

POST

<form method="post">
  <input type="submit" value="Close and accept" class="accept btn btn-default">
</form>

Text Content

Skip to main content


UMAR'S BLOG

Toggle navigation
 * Home
 * About
 * IdentityIQ
 * Cybersecurity


EXPLORING SCALABILITY SOLUTIONS FOR BLOCKCHAIN NETWORKS: AN OVERVIEW OF LAYER 1
AND LAYER 2

6th January 202317th December 2022 Umar Salim Leave a comment

Decentralised networks such as Bitcoin and Ethereum have the potential to
revolutionize many different industries thanks to their secure, transparent and
immutable properties allowing for a decentralised way to store data and transfer
value. The current limitations of these networks are the scalability and
performance challenges they face. The Bitcoin network can handle 7 transactions
[…]

Read More


GETTING STARTED: BLOCKCHAIN, WALLETS, DEFI AND UNISWAP

23rd December 202210th December 2022 Umar Salim Leave a comment

If you’re new to the world of blockchain and decentralised finance (DeFi) you
may be wondering how to get started. In this short article I will explain what
web3 and decentralised finance (DeFi) are, how to create a wallet, and some
popular providers you can use to access DeFi services. What is blockchain?
Blockchains are […]

Read More


ZERO KNOWLEDGE PROOFS IN DECENTRALISED NETWORKS

10th December 202210th December 2022 Umar Salim 1 Comment

Zero-knowledge proofs are an effective tool for improving the security and
privacy of decentralised networks. A zero-knowledge proof is a mathematical
technique that allows for one party (the prover) to prove to another party (the
verifier) that they know the value of a specific piece of information without
revealing the actual information. The most well-known […]

Read More


LIMITATIONS OF ANTI-VIRUS SOFTWARE: STUXNET, DUQU, FLAME AND RED OCTOBER

8th April 202119th June 2022 Umar Salim Leave a comment

This post will be a short technical comparison of the biggest advanced
persistent threats over the last 10 years; Stuxnet, Duqu, Flame and Red October.
Stuxnet Stuxnet was spotted as early as June 2009 and this was one of the first
major APT’s due to the impressive change in the complexity in comparison to
traditional […]

Read More


AN INTRODUCTION TO MULTI-LEVEL SECURITY CONFIDENTIALITY: CLARK-WILSON AND BREWER
NASH MODELS VS BELL-LAPADULA AND BIBA MODELS

3rd December 202019th June 2022 Umar Salim Leave a comment

The Biba Model was developed by Kenneth J. Biba and released in 1977 as a
security model which focuses on the integrity of data. This was intended for
non-military organisations where the integrity of data was more important than
the confidentiality of data. This model is built on the state machine concept
which focuses on […]

Read More


5 SECURE CODING PRACTICES FOR SOFTWARE ENGINEERS

2nd September 202019th June 2022 Umar Salim Leave a comment

Developers work towards solving specific issues and since programming is a skill
used in many industries, this means there are a lot of developers who are
designing and creating solutions/applications. A challenge faced by developers
when writing secure software is the vast amount of tutorials available on the
internet. These tutorials successfully demonstrate how to […]

Read More


POSTS NAVIGATION

1 2 … 4 Older posts


SEARCH

Search for:


CATEGORIES

 * Blockchain (3)
 * News (2)
 * Cybersecurity (6)
   * Articles (3)
   * IdentityIQ (2)
 * Server Related (6)
   * Web Hosting (3)
 * Programming (3)
   * PHP (2)
   * Shell (1)
 * Reviews (1)
 * Mobile (6)
 * General (3)


SUBSCRIBE TO BLOG VIA EMAIL

Enter your email address to subscribe to this blog and receive notifications of
new posts by email.

Email Address

Subscribe


RECENT COMMENTS

 * Exploring Scalability Solutions for Blockchain Networks: An Overview of Layer
   1 and Layer 2 – Umar's Blog on Zero Knowledge Proofs in Decentralised
   Networks
 * Ayaz on Creating an IdentityIQ Cluster
 * Umar Salim on Installing Sailpoint IdentityIQ 7.3


META

 * Log in
 * Entries feed
 * Comments feed
 * WordPress.org

sparkling Theme by Colorlib Powered by WordPress

 

Loading Comments...

 

Write a Comment...
Email (Required) Name (Required) Website


Privacy & Cookies: This site uses cookies. By continuing to use this website,
you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy