Lessons From the Data Encryption Front Line: Understanding Common Threats
Common threats of data encryption based on best practices from IBM practitioners
Symetric vs Asymetric Encryption
A brief explanation about symetric vs asymetric encryption, its differences, and its example with illustratoins
Hackerrank C Language
These exercise helps me a lot to getting start with C language
Pointer in C
One of the differences between C and other languages that I have learned in last semesters (Python, Java) is the usage of pointers. This article helps me to understand it.
File Permissions in Linux/Unix
A brief explanation about file permissions in Linux, chmod command, etc
How NOT to Store Passwords?
Computerphile covers the common way of storing passoword, how the password could be possibily cracked, and how to “properly” store a password in a database
PGP vs. GPG: What’s the Difference?
I learned about GPG and PGP and also its implementation like OpenPGP.
How Does PKI Work?
Through this article I learned about PKI and its elements such as certificates, CA, etc
How to choose a secure password
A best practice from Norton of how we should set our password
Defining and Avoiding Common Social Engineering Threats
It is interesting that the most common “cyber attack” is caused by social engineering threats and how we can prevent it happens.