Blog & Articles

Thoughts, reflections and analysis on programming

Proof-of-work: PoW

Proof of Work (PoW) explained in simple words

Resources to deepen the world of Blockchain

When you start studying a technology, one of the first things you tend to do is to document yourself, collect addresses, follow webinars, participate ...

How I "hacked" my bank

Home banking APPs should be safe: "should be". Unfortunately, this is not the case. Today I'll explain how I "hacked" my bank's APP. This article will...

How to use Ethereum in Java

There are many ways to work with Ethereum. The one you will find most described involves installing a client capable of locally aligning the Blockchai...

What are PoW and Timestamp

When we talk about Blockchain we often encounter the concept of Proof of Work (PoW), but what is a PoW? And when we talk about Timestamp what are we r...

How to implement Blockchain technology in Java

The best way to understand how something works is to try to build it. For this reason, my travel diary on the implementation of Blockchain technology ...

What to ask a client to evaluate a project at the first meeting

I am often asked to evaluate a project, whether it is an APP, a website, a management system or an architecture, there are often aspects that are not ...

How does a Google Gmail account hacking work?

Lately I have been reported a new Google account hacking technique. Through a suitably forged email, a fake Google address is masked. Today I also rec...

Let's start programming with Node.js

A self-respecting professional must have the courage to "leave the old road for the new", this year I decided to study everything that gravitates arou...