Ethical hacking

  • Can’t give away the right to be hacked because it is very unlikely that you own everything URL, domain or even the platform 
  • Most common type of hack is through people or bots cracking weak passwords 
  • Hackers need password to something useful and need personal details 
  • Once on password is found they run it through all your other accounts  
  • You should have dozens of different passwords that are strong 
  • Creating a barrier so that information can be shared securely, secretly with a 256 bit  
  • Cesar cipher ancient form of encryption changes they letters so that there is a simply encrypted message 
  • Cesar cipher is simple but effective but back then if someone found how to crack it and it would always be cracked 
  • Enigma an important part of ww2 
  • 10-digit key is used cannot be cracked by a human because there are 10 billion combinations, but a computer could crack it in a few seconds 
  • 256-bit key encryption 
  • Symmetric encryption both the sender and the receiver have the key  
  • Asymmetric public key is used to make an encrypted message but only the private key can unencrypt the message this is the foundation of the internet’s security systems 
  • Https in the URL is good because it is more secure because it has SSL 
Design a site like this with WordPress.com
Get started