Akashi
Top 10 List of Week 02
Anis Farhan --- Pati

Top 10 List of Week 02

  1. Cryptography
    This week OS class talks about Security and Protection, cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. This free learning course explains to us everything about cryptography, what is cryptography, the history of cryptography from Julius Caesar with his Julius Cipher until German at WW2 with the Enigma Code, and the methods used in cryptography.

  2. Virus vs Worms
    This article gives explanation about the difference between virus & worms, the primary difference is virus must be triggered whereas worms can self replicate and propagate independently. I’ve known the ‘virus’ term since using my first computer, but ‘worms’ is kinda new to me.

  3. How to HACK a password
    A 13-minutes video which explains about password hacking with Kali Linux and Hash Cat. This video sparks my interest very much, because as someone who got asked “Ey bro, could you hack my ex’s instagram password ?” so much since entered college, this video is a must to watch.

  4. What is social engineering ?
    As a common criminal method used nowadays to gain access over confidential information, it is important for us to understand what is social engineering & how to prevent it. I lost access to my Steam account in middle school, luckily I was able to claims it back. Since then, I’m always trying to make sure my property are safe.

  5. Google Safety Center
    In this app, Google explains to us how much they concerned about their customer’s security & privacy. This is a good website, as someone who uses many of Google Services this site provides relief.

  6. What is a Trojan Virus?
    A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users’ systems. As a kid I loved reading about myth and legend, and The Trojan Horse is one the memorable story for me personally.

  7. Common Hacking Techniques
    I first learned the importance of protection for program system in PPW class, and wanted to know more about hacking since then. This article by nordvpn explains briefly and clearly about the most commmon hacking techniques in 2021.

  8. Difference between SHA 1, SHA 2, SHA 256
    First heard of SHA during the Monday Zoom class, but unfortunately I didn’t really get it. Thanks to my friend I found this article. The article explains SHA 1, SHA 2, SHA 256 and their difference with details.

  9. How secure are fingerprint sensors ?
    Many of us, probably every single one of us has used the fingerprint sensors once in our life. But, is it really that safe ? The article explains very well why fingerprint sensors is one of the safest security method.

  10. What is Apple Face ID & how does it work ?
    The Face ID was released along with the Iphone X back in 2017, successfully shaken the whole world with this new technology. Many company has tried to imitate it, but to this very day Apple’s Face ID still considered the best by many. This website tells how Face ID works by explaining it parts by parts.


© 2021-2021 --- Anis Farhan --- File Revision: 0100---06-June-2021.