• Sign in
  • Sign up 
  • Welcome
  • FAQ
  • Block Explorer 
  • Night Mode
  • Stolen Accounts Recovery 
  • Change Account Password 
  • Vote for Witnesses 
  • Hive Proposals 
  • OpenHive Chat 
  • Developer Portal 
  • Hive Whitepaper 
  • Privacy Policy
  • Terms of Service
logo
  • Posts
  • Proposals
  • Witnesses
  • Our dApps
LoginSign up

StellarLibrarian (54)Hivebuzz level badge

13 followers66 posts4 following56 HP
Blacklisted Users
Muted UsersFollowed BlacklistsFollowed Muted Lists

Joined July 2019 Active 3 years ago

  • Blog
  • Posts
  • Replies
  • Social
  • Notifications
  • Wallet
  • stellarlibrarian (54)in #cybersecurity • 4 years ago
    featured

    Ways to Ensure Browser Privacy and Security

    image from pexels.com Have you ever wondered how much of a threat your regular internet browser could be to your data privacy and security? When worrying about your apps that…
    $0.00
       0 1
    • stellarlibrarian (54)in #abandoned • 5 years ago
      featured

      McIntyre Iron Furnace Ruins

      The McIntyre Iron Furnace is an old steel blast furnace that operated from 1827 to 1857 by the Adirondack Iron Works company. It is located on Upper Works Road in Newcomb, NY…
      $0.00
         1 1
      • stellarlibrarian (54)in #longexposures • 5 years ago
        featured

        The White Mountain Streams

        Fresh mountain water flows through soil, stone, and earth, falling with the lands to the vast waters of the ocean. While the streams remain small, there is a lot to be…
        $1.59
        • Past Payouts $1.59
        • - Author $0.80
        • - Curators & beneficiaries $0.79
        • > steempress: $0.12
         59 0
      • stellarlibrarian (54)in #colorful • 5 years ago
        featured

        Flashing Lights

        Lights in the house, lights in the city, lights in the sky. But none are as bright as these crazy lights. So many lights to break through the darkness.
        $5.00
        • Past Payouts $5.00
        • - Author $2.52
        • - Curators & beneficiaries $2.48
        • > steempress: $0.38
         635 3
      • stellarlibrarian (54)in #astronomy • 5 years ago
        featured

        New England City Night

        $0.00
           1 0
        • stellarlibrarian (54)in #city • 5 years ago
          featured

          The Tunnel

          In the middle of the city, under the highway, is the long tunnel leading down town. Deep at night this tunnel goes quiet, leaving mysterious lights floating about. This…
          $0.00
             1 0
          • stellarlibrarian (54)in #cybersecurity • 5 years ago
            featured

            4 Tips to Protect yourself from Malware in the COVID Era

            The COVID-19 pandemic took the world by storm and has drastically changed how we do things. With more people now forced to work from home, the world is now facing a rise in a new…
            $0.00
               15 0
            • stellarlibrarian (54)in #blockchain • 5 years ago
              featured

              Cybersecurity for Cryptocurrencies: Top Tips to Get You Going

              Image from Pixabay.com Cryptocurrencies are a more secure way of transacting money but the anonymity behind their protocols has made it a hotbed for hackers and scammers. Most…
              $0.00
                 0 0
              • stellarlibrarian (54)in #cyberdefense • 5 years ago
                featured

                4 Reasons Cyber Security is a Key Concern for Everyone

                You’ll agree with me that the internet plays a crucial role in the lives of many people. It has become so powerful that it somehow impacts those who do not use it at all.…
                $0.00
                   2 0
                • stellarlibrarian (54)in #cybersecurity • 5 years ago
                  featured

                  Cheap Tech - Why your privacy is at risk, and how to see private (public) web cams.

                  Introduction Everything has its pros and cons, before deciding something, we have to go through its pros and cons to make a valuable decision. If we neglect the pros and cons of…
                  $3.98
                  • Past Payouts $3.98
                  • - Author $2.01
                  • - Curators & beneficiaries $1.97
                  • > steempress: $0.30
                   528 1
                • stellarlibrarian (54)in #cyberinvestigations • 5 years ago
                  featured

                  Open-source intelligence tools - Stay private and get informed

                  Introduction What does your neighbor do for a living? Was that guy that cut you off on the high way a criminal? Who was emailing me spam? Open-source intelligence means…
                  $3.95
                  • Past Payouts $3.95
                  • - Author $2.00
                  • - Curators & beneficiaries $1.95
                  • > steempress: $0.30
                   567 1
                • stellarlibrarian (54)in #guide • 5 years ago
                  featured

                  Understanding Virtual Marketing - How to be seen.

                  Introduction Marketing is advertising publicity and sales technique. Once you start a business, now the next step is to tell people your services' robust marketing approach…
                  $4.35
                  • Past Payouts $4.35
                  • - Author $2.20
                  • - Curators & beneficiaries $2.15
                  • > steempress: $0.33
                   539 2
                • stellarlibrarian (54)in #crypto • 5 years ago
                  featured

                  What are Crypto Coins? Bananas? Fake money?

                  Introduction Technology can be hacked, bitcoin is for scams, and virtual money is just virtual money, right? Not necessarily. A cryptocurrency is a form of digital currency that…
                  $0.04
                  • Past Payouts $0.04
                  • - Author $0.02
                  • - Curators & beneficiaries $0.02
                  • > steempress: $0.00
                   4 0
                • stellarlibrarian (54)in #cloud • 5 years ago
                  featured

                  Cloud Security Basics

                  Cloud security, comprises of a lot of strategies, controls, methodology, and advancements that work together to ensure cloud-based frameworks, information, and foundation. These…
                  $0.03
                  • Past Payouts $0.03
                  • - Author $0.01
                  • - Curators & beneficiaries $0.01
                  • > steempress: $0.00
                   2 0
                • stellarlibrarian (54)in #blockchain • 5 years ago
                  featured

                  What is Cryptocurrency?

                  Introduction Cryptocurrency is a simple, common name that refers to all (while not having one principal place of command) cryptocurrencies like Bitcoin, Ethereum, and many…
                  $0.00
                     8 1
                  • stellarlibrarian (54)in #crypto • 5 years ago
                    featured

                    How do Crypto Currency Exchanges work?

                    A cryptocurrency exchange is essentially a stage for coordinating purchasers and merchants. They work similarly as trading for different resources, for example, stocks.…
                    $0.03
                    • Past Payouts $0.03
                    • - Author $0.02
                    • - Curators & beneficiaries $0.02
                    • > steempress: $0.00
                     3 0
                  • stellarlibrarian (54)in #blockchain • 5 years ago
                    featured

                    Protect your crypto accounts from attackers

                    With cryptocurrencies, there is no centralized authority responsible for the security of your funds, while the dangers are abundant. Your wallet can be hacked, and your PC can be…
                    $0.00
                       0 0
                    • stellarlibrarian (54)in #guide • 5 years ago
                      featured

                      Log Analysis

                      In the technical milieu, a log is a continuously produced and time-stepped report of occurrences identified and reported in reaction to specific events. All frameworks and…
                      $0.00
                         0 0
                      • stellarlibrarian (54)in #cloud • 5 years ago
                        featured

                        Cloud security

                        Cloud security, otherwise called cloud processing security, comprises of a lot of strategies, controls, methodology, and advancements that work together to ensure cloud-based…
                        $0.00
                           0 0
                        • stellarlibrarian (54)in #cyber • 5 years ago
                          featured

                          Intrusion Detection (IDS)

                          IDS is a system that monitors network traffic for suspicious action and alerts you when such advancement is perceived. This is a thing application that scans your network or…
                          $4.64
                          • Past Payouts $4.64
                          • - Author $2.34
                          • - Curators & beneficiaries $2.30
                          • > steempress: $0.35
                           519 0