Close

Encryption/Decryption

Encryption is the process of converting data into a form that is unreadable by unauthorized parties. This is done by using a mathematical algorithm to scramble the data, and then using a key to unscramble it. The key is a piece of information that is known only to the sender and receiver of the encrypted data.

Decryption is the process of converting encrypted data back into its original form. This is done by using the same mathematical algorithm and key that were used to encrypt the data.

AWS CloudTrail: Enhancing Visibility and Security in the Cloud

AWS CloudTrail: Enhancing Visibility and Security in the Cloud

In the ever-evolving landscape of cloud computing, businesses increasingly rely on cloud services to drive agility, scalability, and cost-efficiency. With such a rapid shift, maintaining robust security and compliance becomes paramount. Enter AWS CloudTrail, a powerful service offered by Amazon Web Services (AWS) that provides detailed monitoring and auditing capabilities […]

Devamını Oku

RSA Key Generation, Signatures, and Encryption using OpenSSL | Encryption Decryption using openSSL

RSA Key Generation, Signatures, and Encryption using OpenSSL | Encryption Decryption using openSSL

Demonstration of using OpenSSL to create RSA public/private key pair, sign and encrypt messages using those keys, and then decrypt and verify the received messages. Commands used: OpenSSL. Encryption And Decryption Encryption is converting data into an unreadable form by unauthorized parties. This is done by using a mathematical algorithm […]

Devamını Oku

Demystifying Practical Cryptography: Python and MySQL in Focus

Demystifying Practical Cryptography: Python and MySQL in Focus

Theoretical Foundations of Cryptography: From MD5 to SHA-2 Understanding CryptographyCryptography is the art of secure communication. It involves transforming data to prevent unauthorized access. Over the years, various algorithms have emerged. Let’s delve into a few popular ones. MD5: An OverviewMessage Digest Algorithm 5 (MD5) was once a favorite. It […]

Devamını Oku

AWS Redshift: Unearthing the Data Treasure Trove

AWS Redshift: Unearthing the Data Treasure Trove

In the vast expanse of cloud computing, AWS (Amazon Web Services) Redshift stands tall as a majestic fortress, guarding a treasure trove of data insights. As we embark on an adventurous quest to discover the wonders of this powerful data warehouse service, let the drums of creativity beat in harmony […]

Devamını Oku

Create & sign SSL/TLS certificates with OpenSSL

OpenSSL

In this video, we will learn how to generate an SSL/TLS certificate signing request (CSR) and have it signed by a Certificate Authority (CA). We won’t submit the CSR to a real CA for this tutorial. Instead, we will play both the certificate authority and the certificate applicant. We will […]

Devamını Oku

Dive into the World of Graph Databases with AWS Neptune: A Beginner’s Guide to Powerful and Flexible Data Management in the Cloud

Dive into the World of Graph Databases with AWS Neptune: A Beginner's Guide to Powerful and Flexible Data Management in the Cloud

AWS Neptune AWS Neptune is a fully managed graph database service provided by Amazon Web Services (AWS). It is designed to store and process highly connected data, such as social network data, recommendation engines, fraud detection, and knowledge graphs. AWS Neptune is built on a purpose-built, graph-native storage engine and […]

Devamını Oku

What Is Cloudflare?

What Is Cloudflare?

Cloudflare is a web performance and security company that provides a content delivery network (CDN), distributed domain name server (DNS) services, and various security solutions for protecting websites and web applications. The Cloudflare CDN helps to speed up websites and applications by caching their content on a global network of […]

Devamını Oku

SHA-1 has broken in practice

We have broken SHA-1 in practice.

We have broken SHA-1 in practice. This industry cryptographic hash function standard is used for digital signatures and file integrity verification and protects a wide spectrum of digital assets, including credit card transactions, electronic documents, open-source software repositories, and software updates. It is now practically possible to craft two colliding […]

Devamını Oku