Module Zero
Objective By the end of this module, you would have achieved: Introduce yourself, what you want/need to learn, and what you would like to build (your dream… Read more
Objective By the end of this module, you would have achieved: Introduce yourself, what you want/need to learn, and what you would like to build (your dream… Read more
In 2018 I took an attempt to build an open course on how to create applications from scratch. The goal was to talk about every… Read more
I started a YouTube channel called “Ace That Career” in 2017 with Mikhail to discuss various career related topics for technologists, such as interview techniques,… Read more
Imagine that. Not a pretty image for sure. Now imagine that you have tons of confidential data on the computer. For example, your credit card… Read more
Now we have some basic understanding of how encryption, passwords are all related, we are almost ready to deal with how to choose encryption tools…. Read more
We might have gone over the “shift” rules too quickly – let’s take a closer look to ensure we understand them. A shift rule means… Read more
Previously, we’ve discussed that the best password is completely random, and very long. But it would be hard to remember, so it isn’t best for… Read more
The best password is basically completely random, and it is very, very long. This way it won’t show up in any dictionary. However, there are… Read more
Is your password one of the following? password 123456 12345678 abc128 qwerty monkey Common password is one of the biggest problem of the whole password-based… Read more
Previously we look at the different types of password rules in the wild today. Many of them are conflicting, and not all of them are… Read more