Cryptography – good password and good practices
About storing, saving and password policy.
The best practices in programming, a handful of code and the latest trends, tips and innovations in the IT world
Cryptography – hash functions, hashes and passwords (part 2)
Passwords and their security on the Internet.
Security
Cryptography – hash functions and passwords (part 1)
Cryptography - discover the secrets of hash functions, hashes and passwords.
Security
Cryptography – randomness in cybersecurity
What is randomness, how to properly estimate it, and how important is it in the field of cryptography.
Security
Cryptography – basic concepts and definitions
Discover encryption, decryption, and hashing while gaining professional knowledge from our cryptography series
Security
Authentication, Second Factor, and Session Hijacking
What is authentication, what is the second factor and what options do we have to confirm the user's identity
Security
Virtualization and containerization – good design principles
Virtualization, its types and good design principles for containers.
Programming
Ransomware – What It Is and How It Can Impact Your Company? (part 2)
Real cases of attacks and good defense practices in cyberspace
Security
Ransomware – What It Is and How It Can Impact Your Company? (part 1)
Threats and good practices for counteracting ransomware
Security
Compilation vs. Interpretation (part 3)
Disadvantages of compiled languages and how interpreters respond to modern needs
Programming
Compilation vs. Interpretation (part 2)
File formats, and the low-level aspects related to assembly language and processor architecture
Programming
Compilation vs. Interpretation (part 1)
Understanding differences and similarities of code compilation and interpretation
Programming
Terraform – Infrastructure Management Automation (part 2)
The basics of managing state in Terraform and setting up a Github repository
Administration
Terraform – Infrastructure Management Automation (part 1)
Fundamentals of infrastructure automation with Terraform
Administration
Improve your online security with Innokrea – don’t let yourself be robbed (part 4)
The last episode of the cybersecurity series
Security