SHA256 online hash function
If you’ve read my previous list in Week 01, you know I love interactivity and practice as it is proven to be a more effective way to learn rather than just memorizing. This tool converts your input into SHA256 encription with live auto updates. One of the interesting new things that I’ve learned from this website is that the length of the encrypted message doesn’t change. Not only that, you can also change to other different hash functions such as SHA512 and SHA384.
Difference between Private key and Public key
For some, this might sound as something mysterious, but it’s actually not. GeeksforGeeks is notorious for it’s widespread and detailed information around computer science topics. This article is concise, explains the difference between a private
and public
key. In short, private key, as it is named, should not be exposed to the public. It is symmetrical because it is the secret key which you can encrypt and decrypt messages, where as the public key is assymmetrical, meaning that you can encrypt a message but not decrypt it. For more information on asymmetric encryption, please check out my next article up on the list.
What is Asymmetric Encryption? Understand with Simple Examples
My way of learning is top-bottom, meaning I like to learn something by doing it first, then learning what I just did in a more detailed way. Elon musk explained it best where he describes using tools to solve a problem, rather than learning each tools in such a detailed manner, but not really having that connection with the tool and problem. Following the previous article, we’re now going to go on a deeper dive about asymmetric encryption
, which is how public and private keys work.
I love this article as it is light on the theoretical side, has great explanations, plus has illustrations if that’s how you like to learn.
101 Bash Commands and Tips for Beginners to Experts
If there is a buku rumus jitu
such as one for preparing SBMPTN exams, this is the one, but for bash commands. It is a bit lengthy, but that’s it’s strong point and it is not meant for a single sitting read. This article is also structured very well, starting out with single commands and explaining while giving code examples starting ranging from commands such as touch
to making environment variables. The juicy part of the article is at the section of bash scripts
, where you get to see all these different commands come together as you get a little more confident in reading, and possibly make one of your own .sh file for your daily needs.
How to customize .bashrc to configure command prompt?
As the command prompt that we’ll be using every time we use the VirtualBox on debian guest, it is a great idea to know more on how bash
, the command prompt, works. I love stackexchange
/ stackoverflow
articles as it is amati, tiru, modifikasi
at it’s finest. This thread has many solutions that you can copy and paste onto you .bashrc
file to make your Operating Systems experience a little more exciting. You can add aliases
to reduce boilerplate on commands you typically have to type verbosely on a regular basis. You can also change the promp text color, for example from the hacker-looking green into pink (which I personally love). Also to finish it off, dont forget to run source .bashrc
for the changes to take effect.
SHA-1 checksums
Now back to non interview OS topics. If you’re confused when sir does a SHA1 cheksum
, then you’re not alone. This link is very very short, which I love because it’s concise but also explains it with examples, things even long articles sometimes do not have. From my understanding, SHA-1 sums provide an assurance that the document you’ve just donwloaded is, in fact, the original AND unmodified document. Simply write sha1sum -b <filename>
to compare the result with the published value.
Tom Scott
video. This video is related with this week’s topic, Security
, specifically the Moonpig Bug
. Essentially, when you login, you’ll get a token which can identify that you are, indeed, the person who just logged in. Except, the engineer’s did a big oopsie where the token is the user’s customer ID. Sure, you might think that finding a specific user id might be hard as it is usually uuid
type, except that the engineers did another oopsie, making the user id sequential. This means i can simply get any user id by just playing with random numbers! This all amde it possible for anyone to log in as anyone, as long as they can guess their user id, which is a simple range of number guess between 0 and the number of users that have registered on that site.