Shweta Prasadaudit-trails.hashnode.dev·Oct 3, 2024Audit TrailsWhat is an Audit Trail? An Audit Trail (also called Audit Log) helps companies or organizations to keep a detailed, chronological record of their transactions, user activity, or other financial data for tracking purposes. Maintaining a comprehensive ...Discussaudit logs
Subhanshu Mohan Guptablogs.subhanshumg.com·Sep 23, 2024Enhancing Linux DevSecOps with AI for Vulnerability Management and ComplianceWelcome to the second part of my Linux series, where we take a deep dive into AI-powered vulnerability management and compliance auditing. In the previous installment, we explored the fundamentals of securing Linux environments, but now it's time to ...Discuss·10 likes·27 readsAI powered DevOpscloud security
Heuristic Informaticsenterprisedigitaltransformation.hashnode.dev·Aug 21, 2024How Audit Vault Services Ensure Compliance with Industry RegulationsWith numerous databases, applications, and operating systems in use, auditing and monitoring user and administrator activities is essential for both security and compliance. This requires the continuous collection and analysis of vast amounts of acti...Discussauditing
Nirav Soniniravsoni.hashnode.dev·Jul 6, 2024How to Retrieve Client IP Address in .NET Core API behind Proxy(s)In this blog, let's go through how we extract Client IP addresses within a .NET Core Web API. Proxy servers, load balancers, and other network appliances often hide information about the request before it reaches the app: When HTTPS requests are pro...Discuss·5 likes·168 reads.net core
BROWN OFONIMEofonime1.hashnode.dev·Feb 23, 2024Reflecting and Reinventing: A Tech Woman's Guide to Auditing 2023 and Embracing 2024As the calendar turns and a new year dawns, it’s a perfect time for tech-savvy women to reflect on the past year's triumphs and tribulations, and chart a course for the year ahead. Let's dive into how to conduct a comprehensive audit of 2023, focusin...Discuss·1 likeTechwomen
Mo' Claudiuskodedmo.hashnode.dev·Feb 8, 2024Auditing in Rails with PaperTrailLet us go on a journey through the world of Rails together, where the saga of data tracking unfolds with the magic of the PaperTrail gem. This narrative isn't just about lines of code; it's about the art of capturing the essence of change within your...DiscussRuby on Rails
RivanorthProblog.rivanorth.com·Nov 7, 2023Common Vulnerability Causes $2.1M Loss for Onyx ProtocolThe decentralized finance (DeFi) sector was hit by the same vulnerability once again, read-only reentrancy, when Onyx Protocol, a Compound Finance fork, suffered a $2.1 million loss. This incident, marks yet another entry in a series of attacks lever...DiscussEthereum
Samson Ajulorsamsonajulor.com.ng·Nov 3, 2023UNISWAP V3 (Periphery) NonfungiblePositionManager CODE REVIEW DEEP DIVEThis is not an audit of v3. Interested in the Audit report? Click here!! PS: This will probably be outdated by the time you read this. Uniswap V3 periphery is made up of the following functions. NonFungiblePositionManager NonFungiblePositionDescrip...Discuss·103 readsuniswap
BuildBearbuildbear.hashnode.dev·Nov 1, 2023Must-Have Smart Contract Auditing Tools for Auditors and DevelopersOver 1 billion dollars were lost in 2023 due to smart contract vulnerabilities. Web3 security is crucial for blockchain adoption. Using appropriate security tools is essential for identifying vulnerabilities in the Smart Contracts. This article prese...Discussauditing
Ravi Kiran Betharavikiran-web3.hashnode.dev·Jun 23, 2023Cryptography in BlockchainEvery household has its mystical language among family members. They use this secret language to communicate among themselves without anyone noticing. For example, at a party at a friend's place, the father scratches his nose to indicate that it is t...DiscussSmart Contracts