Close

SHA

SHA stands for Secure Hash Algorithm. SHA is a family of cryptographic hash functions that are used to verify the integrity of data.

Security in DevOps and AWS with AWS IAM

Security in DevOps and AWS with AWS IAM

Keep your systems and data secure. DevOps is a set of practices that combines software development (Dev) and IT operations (Ops). DevOps aims to shorten the systems development life cycle and provide continuous delivery with high quality. Security is an integral part of DevOps. By following security best practices, you […]

Devamını Oku

Cloud Kitchens, The New Age Restaurant Industry Boom

Cloud Kitchens, The New Age Restaurant Industry Boom

The Rise of Cloud Kitchens The restaurant industry is undergoing a significant transformation. In recent years, we have seen the rise of cloud kitchens, which are delivery-only restaurants that do not have a physical dining room. Cloud kitchens are becoming increasingly popular as they offer several advantages over traditional restaurants. […]

Devamını Oku

SHA-1 has broken in practice

We have broken SHA-1 in practice.

We have broken SHA-1 in practice. This industry cryptographic hash function standard is used for digital signatures and file integrity verification and protects a wide spectrum of digital assets, including credit card transactions, electronic documents, open-source software repositories, and software updates. It is now practically possible to craft two colliding […]

Devamını Oku

What is SHA? What is SHA used for?

cryptography

SHA stands for secure hashing algorithm. SHA is a modified version of MD5 and is used for hashing data and certificates. A hashing algorithm shortens the input data into a more diminutive form that cannot be understood using bitwise operations, modular additions, and compression functions. You may be wondering, can […]

Devamını Oku

Yüz Tanıma Sistemlerinin Yanıltılmasına Karşı Bir Yöntem

Yüz Tanıma Sistemlerinin Yanıltılmasına Karşı Bir Yöntem

YÜZ TANIMA SİSTEMLERİNİN YANILTILMASINA KARŞI BİR YÖNTEM: YÜZ VİDEOLARINDA NABIZ TESPİTİ İLE CANLILIK DOĞRULAMASI Günümüzde kimlik saptama amaçlı kullanılan biyometrik teknolojiler, güvenlik, erişim, kontrol, takip gibi alanlarda aktif olarak rol almaktadır. Bu teknolojilerden biri olan yüz tanıma sistemi, diğer biyometrik sistemlere göre temassızlık ve günlük hayatımıza yerleşmiş bulunan düşük maliyetli […]

Devamını Oku