![]() ![]() 15-21 3/5 What is Asymmetric Encryption and How does it Work?.15-21 1/6 1984 and Governmental Surveillance.9-14 2/5 Vulnerability Scanning and Penetration Testing.9-14 1/5 James Bond in Specters Meltdown.Sick 3-8 Got the flu, found it tough to look at screens or handwrite.27-29 4/7 Intro to History of Cryptology.23-29 1/7 Wireless and Application attack vectors.16-22 3/5 Malware, Attack Vectors and Understanding Attackers.16-22 2/5 Vigenère cipher, or “Le Chiffre Indéchiffrable” The Indecipherable Cipher.16-22 1/5 Obfuscation, Caesar Shift and Polybius Square.9-15 2/4 Malwares different types over time.9-15 1/4 Mark Zuckerberg at Congress and Social Media Privacy. ![]() Program/WebApp Bug Vulnerabilities, 9/4/18. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |