top of page
Search
The Tech Platform
Nov 3, 2023
Prevent cross-site scripting attacks in my Web Application
In today's interconnected digital landscape, web application security is of paramount importance. Cross-site scripting (XSS) attacks, a...
The Tech Platform
Oct 3, 2023
A Guide to BitLocker Recovery Key
BitLocker is a valuable encryption feature in Windows operating systems that helps protect your data by encrypting the entire disk drive....
The Tech Platform
Sep 6, 2023
New Era in Computing: Introduction to Windows 365
A new way of using computers has arrived, thanks to Windows 365. Picture this: You can use Windows, the familiar system you trust, from...
Manpreet Singh
Aug 21, 2023
Linux vs Unix: A Comparative Overview
In operating systems, the comparison between Linux and Unix sparks discussions that delve into their similarities, disparities, and the...
The Tech Platform
Oct 5, 2021
ERC 4337: account abstraction without Ethereum protocol changes
Account abstraction has for a long time been a dream of the Ethereum developer community. Instead of EVM code just being used to...
The Tech Platform
Jul 10, 2021
Malware - what are the different types of Malware. Learn how to detect them
Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses,...
bottom of page