by ArtificialAmateur | Jun 3, 2017 | hacking, roadmap
Basics A cryptographic hash function is a mathematical algorithm that takes in data of arbitrary size and converts it to a string of a fixed size, which is designed to also be a one-way function, that is, a function which is infeasible to invert. See Fig 1. The idea...
by ArtificialAmateur | Jun 3, 2017 | hacking, Hardware, roadmap, security, technology
Basics The GPU is the graphics processing unit, sometimes referred to as graphics card or visual processing unit (VPU). Commonly used for processing imagery, it is used to handle resource intensive computations that may overload your standard Central Processing Unit...
by ArtificialAmateur | Jun 3, 2017 | hacking, roadmap
Password Safeguards Password Strength Password strength or complexity is the goal of having a good password and making it strong against brute-force attacks. ab where a is the possible symbols and b is the length. If you have a 4 letter password containing only [0-9]...