Welcome to the INNOKREA blog!

Your source of knowledge about technologies

The best practices in programming, a handful of code and the latest trends, tips and innovations in the IT world

Cryptography – good password and good practices

Cryptography – good password and good practices

About storing, saving and password policy.

Security

Cryptography – hash functions, hashes and passwords (part 2)

Cryptography – hash functions, hashes and passwords (part 2)

Passwords and their security on the Internet.

Security

Cryptography – hash functions and passwords (part 1)

Cryptography – hash functions and passwords (part 1)

Cryptography - discover the secrets of hash functions, hashes and passwords.

Security

Cryptography – randomness in cybersecurity

Cryptography – randomness in cybersecurity

What is randomness, how to properly estimate it, and how important is it in the field of cryptography.

Security

Cryptography – basic concepts and definitions

Cryptography – basic concepts and definitions

Discover encryption, decryption, and hashing while gaining professional knowledge from our cryptography series

Security

Authentication, Second Factor, and Session Hijacking

Authentication, Second Factor, and Session Hijacking

What is authentication, what is the second factor and what options do we have to confirm the user's identity

Security

Virtualization and containerization – good design principles

Virtualization and containerization – good design principles

Virtualization, its types and good design principles for containers.

Programming

Ransomware – What It Is and How It Can Impact Your Company? (part 2)

Ransomware – What It Is and How It Can Impact Your Company? (part 2)

Real cases of attacks and good defense practices in cyberspace

Security

Ransomware – What It Is and How It Can Impact Your Company? (part 1)

Ransomware – What It Is and How It Can Impact Your Company? (part 1)

Threats and good practices for counteracting ransomware

Security

Compilation vs. Interpretation (part 3)

Compilation vs. Interpretation (part 3)

Disadvantages of compiled languages and how interpreters respond to modern needs

Programming

Compilation vs. Interpretation (part 2)

Compilation vs. Interpretation (part 2)

File formats, and the low-level aspects related to assembly language and processor architecture

Programming

Compilation vs. Interpretation (part 1)

Compilation vs. Interpretation (part 1)

Understanding differences and similarities of code compilation and interpretation

Programming

Terraform – Infrastructure Management Automation (part 2)

Terraform – Infrastructure Management Automation (part 2)

The basics of managing state in Terraform and setting up a Github repository

Administration

Terraform – Infrastructure Management Automation (part 1)

Terraform – Infrastructure Management Automation (part 1)

Fundamentals of infrastructure automation with Terraform

Administration

Improve your online security with Innokrea – don’t let yourself be robbed (part 4)

Improve your online security with Innokrea – don’t let yourself be robbed (part 4)

The last episode of the cybersecurity series

Security