os211

Top 10 List of Week 02

  1. Security vs Protection
    This website dives deep into differences between security and protection within several aspects like policy, handles, mechanism, etc. Key differences and conclusion also helps giving understanding of this topic.

  2. Is Linux security better
    A hot topic to cover. After reading this I conclude that windows is obviously the biggest target for an attack considering it’s the most popular OS, but Linux has the potential to be the most secure but requires a “power user”.

  3. Linux File Permissions
    Some tips and infos about permissions for people using Linux. It’s always pretty handy to know.

  4. Symmetric vs Asymmetric Encryption
    This cryptography basic really matters in term of how global network works safely. This is a thorough explanation of it.

  5. What is Firewall
    To answer my curiousity of what Firewall is as I’ve been hearing this term for a long time but haven’t really understood what it is.

  6. Hash Algorithms Explained
    A very informative read explaining in details Hash Algorithms including SHA-1, SHA-2, and SHA-256. Some key points to take are it’s irreversible and unique, there are bit differences between them, and quite complicated mathematics behind it.

  7. What is special about C/C++?
    A forum thread answering this question. I think this is a reasonable question to ask knowing programming has come a long way since years ago with such rapid improvement but still C/C++ has not been deprecated.

  8. Password Tips
    Good password is one of the simplest thing you can do to save yourself from any risk of being breached. These practical password ideas can inspire you to be a better user.

  9. Safe Web Browsing
    Not many people realize how fragile it is surfing through web without knowing what threat could they come up to. Some info like this should help raise awareness to prevent any harmful act online.

  10. Cybersecurity in Quantum Computing
    Very interesting topic to learn for the future. Quantum computing is still years to come but knowing how it works and affects security might be the biggest most interesting challenge. Based on this article, huge improvement is expected from utilization of quantum computing professionally.