#Top 10 List of Week 01
How Secure is 256bit security
This video explain how secure is 256bit security (SHA256).
Will Quantum Computers break encryption?
This video not only answer the question on the title but also explain how encryption works with decent animation.
This video also explain how the quantum computer operates.
Symmetric vs Asymmetric Encryption
This blog explain the main difference between Symmetric and Asymmetric encryption and aslo explain which encryption method you should use.
Session Hijacking
This blog explain how does session hijacking works and how to prevent it.
List of Famous Cases Ramsomware Attacks
This article shows major ransomware attacks from 1989 to 2020
How to use gpg to encrypt and sign messages
This site shows how to encrypt and sing messages more detailed
Difference between SHA-1 SHA-2 SHA-256
This artice explains about hash, digital signature, and difference between SHA-1 SHA-2 and SHA-256
Computer Viruses vs Worms
This site explains about difference between virus and worm and its classification
Linux Permissions Beginner’s Guide
This site explains about permission in linux OS.
Have I been pwned
This site have a database that is someone with his/her email is a victim of data breach in a website.