Hands-on IAM User Security TechniquesLearn the practical steps for utilizing IAM to secure your AWS account.Nov 24, 2022Nov 24, 2022
Asymmetric Encryption using Niftron-SDK UtilitiesAsymmetric encryption is something you use hundreds of times each day but seldom (if ever) notice. Although the underlying concepts are…Nov 22, 2022Nov 22, 2022
What is SBT and How to create an SBT?Tokenization is one of the key features of Blockchain. You can tokenize any physical or digital items and convert them into single or…Nov 21, 2022Nov 21, 2022
Using AWS SES to send custom, templated and bulk-templated emailsWhat Is Amazon SES?Nov 15, 2022Nov 15, 2022
Future of rewards, gift cards, loyalty tokens on web 3.0 & metaverseLoyalty programs have been around for a long time, but they have not been able to keep up with the world’s evolving needs. The traditional…Oct 18, 2022Oct 18, 2022
Symmetric Encryption using Niftron-Sdk UtilitiesThe most widely used symmetric encryption algorithm is AES (Advanced Encryption Standard). AES is used in a variety of applications…Oct 13, 2022Oct 13, 2022
Attacks on Smart Contract — Chapter 2So what is a Denial of Service attack aka DoS attack? Well, it is an attack that is performed to prevent your smart contract from…Mar 9, 2022Mar 9, 2022
Attacks on Smart Contract — Chapter 1Not all your smart contract’s function is accessed by wallet address aka users, sometimes the contract’s function can be accessed by other…Feb 12, 20221Feb 12, 20221
Niftron’s Experience at the Wyoming Blockchain Stampede Conference 2020Niftron took part in the Wyoming Blockchain Stampede 2020 which happened in the United States on September 23rd. Due to the Current…Dec 21, 2020Dec 21, 2020