os211

W01 | W02 | W03 | W04 | W05 | W06 | W07 | W08 | W09 | W10 || Key | Rank | LOG | GitHub

W02’s Top 10 Pages

  1. The Difference Between SHA-1, SHA-2, and SHA-256 Hash Algorithms
    I started out knowing nothing about what SHA256 even is, but after a quick read of this blog article, I was able to understand what it is, how hashing algorithms work, what they’re used for, and I also learned a little bit about digital signatures and how it relates to security and protection of data.

  2. Privacy vs Security?
    In terms of web security and privacy, we need to know how both relates to each other. Simple and useful tips on how to keep yourself safe on the internet, are often those that could save you a fortune, like in the example on the page, your sensitive and valuable data can be sold and misused with criminal intent, that is, if you don’t keep your privacy and security in check.

  3. Data Breaches?
    Still in the topic of sensitive and valuable data, here’s a quick look on what a data breach is, methods of data breaching, the phases of a data breach, and the best practices for keeping your data safe. It also reports on how much big companies have suffered from a data breach, showing that you can’t always trust your data in big companies, you have to also take care of your own sake.

  4. C
    Out of all the c-language tutorial sites, I have found that this site by programiz.com provides the best looking, least painful layout to look at. Though it doesn’t have a live on-site program compiler, it explains how everything works through examples, which, isn’t such a bad way to explain c anyways. To be honest those on-site program compilers are mostly a gimmick, IMO anyways. Don’t need ‘em.

  5. Cyber Security course on some other uni
    I’ve found this playlist on the topic of Cyber Security. It’s from the MIT. Dunno where or what that is, but apparently they have opencoursewares on multiple other courses as well. Pretty nice. The lecturer seems excited.

  6. UNIX GPG Commands
    I know i have expressed my distate for long walls of text but in this case, I could just ctrl+f which command I needed. Plus, there’s also a quick example ono how to encrypt, decrypt, and generate key pairs albeit in the very bottom of the page. Still very useful for when I eventually need to look it up.

  7. Harvard’s CS50
    I have found another video course from some other university called ‘Harvard’. The lecturer is lecturing the class on the C-language. I’ve actually watched other CS50 lecture videos before; the lecturer, David J. Malan, is an awesome person, he teaches computer science in a way that keeps the students excited and interested in whatever topic he is lecturing. I suggest whoever has not tried CS50 to try and follow along. It’s pretty fun.

  8. Security for Operating Systems
    Briefly explains security measures for operating systems through authentication, one time passwords, and also briefly explains threats for programs and systems along with computer security classifications.

  9. What is an ACL?
    This is one of the topics briefly mentioned in the lecture slides, so I went ahead and looked it up. ACLs (Access Control List) are network traffic filters that can control incoming or outgoing traffic. The main idea of using an ACL is to provide security to your network. Without it, any traffic is either allowed to enter or exit, making it more vulnerable to unwanted and dangerous traffic. There you go.

  10. Trojan Horses?
    As a former pirate of the interwebs, I often mistakenly install viruses into my computer rather than whatever it is I was pirating. Back in the day, when I would open my antivirus software and scan my system, there’d be multiple infected files with a Trojan Horse virus on it. I never knew or rather, I never cared enough to google what a Trojan Horse virus is, but now I know better. Cool.


fin