permalink |
---|
/W02/ |
-
Lessons From the Data Encryption Front Line: Understanding Common Threats
Common threats of data encryption based on best practices from IBM practitioners -
Symetric vs Asymetric Encryption
A brief explanation about symetric vs asymetric encryption, its differences, and its example with illustratoins -
Hackerrank C Language
These exercise helps me a lot to getting start with C language -
Pointer in C
One of the differences between C and other languages that I have learned in last semesters (Python, Java) is the usage of pointers. This article helps me to understand it. -
File Permissions in Linux/Unix
A brief explanation about file permissions in Linux, chmod command, etc -
How NOT to Store Passwords?
Computerphile covers the common way of storing passoword, how the password could be possibily cracked, and how to "properly" store a password in a database -
PGP vs. GPG: What's the Difference?
I learned about GPG and PGP and also its implementation like OpenPGP. -
How Does PKI Work?
Through this article I learned about PKI and its elements such as certificates, CA, etc -
How to choose a secure password
A best practice from Norton of how we should set our password -
Defining and Avoiding Common Social Engineering Threats
It is interesting that the most common "cyber attack" is caused by social engineering threats and how we can prevent it happens.