by hellor00t | Aug 13, 2017 | roadmap
Overview This lesson will not re-invent the wheel by teaching another linux file structure lesson. There are many other articles that already discuss that topic in detail. What this lesson hopes to accomplish is give the reader an understanding of why it is important...
by ArtificialAmateur | Jun 3, 2017 | hacking, roadmap
Basics A cryptographic hash function is a mathematical algorithm that takes in data of arbitrary size and converts it to a string of a fixed size, which is designed to also be a one-way function, that is, a function which is infeasible to invert. See Fig 1. The idea...
by ArtificialAmateur | Jun 3, 2017 | hacking, Hardware, roadmap, security, technology
Basics The GPU is the graphics processing unit, sometimes referred to as graphics card or visual processing unit (VPU). Commonly used for processing imagery, it is used to handle resource intensive computations that may overload your standard Central Processing Unit...
by ArtificialAmateur | Jun 3, 2017 | hacking, roadmap
Password Safeguards Password Strength Password strength or complexity is the goal of having a good password and making it strong against brute-force attacks. ab where a is the possible symbols and b is the length. If you have a 4 letter password containing only [0-9]...