Base64 Algorithm

Image
  Introduction              -----> Base64 encoding is used to c onvert binary data into a text-like format that allows it to be transported in environments that can handle only text safely.               -----> Base64 is sometimes also refered to as PEM , which stands for Privacy-enhanced Electronic Mail . There, Base64 was used to create printable text again after binary e-mail data that was generated during the e-mail encryption process.   How it works               Base64 encoding takes the original binary data and operates on it by dividing it into tokens of three bytes . A byte consists of eight bits, so Base64 takes 24bits in total. These 3 bytes are then converted into four printable characters from the ASCII standard.  The first step is to take the three bytes (24bit) of binary data and split it into f our numbers of six bits . Because the ASCII standard defines the use of seven bits, Base64 only uses 6 bits (corresponding to 2^6 = 64 characters) to ensur

Introduction To hacking

Introduction To hacking! 

What is hacking? 
           Hacking is the catch-all term for any type of misuse of a computer to break the security of another computing system to steal data, corrupt systems or files, commandeer the environment or disrupt data-related activities in any way.
In other word hacking is "Finding A New Way".
        
        Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Example of Hacking: Using password cracking algorithm to gain access to a system.

Legality of Ethical Hacking
      
                   Ethical Hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking.
 
What is Ethical Hacking?
 
Why Ethical Hacking is useful? | ICT Academy at IITK
 
      4 Ways that Ethical Hackers cover their tracks | EC-Council Official Blog
Ethical Hacking is identifying weakness in computer systems and/or computer networks and coming with countermeasures that protect the weaknesses.
 
Hacking Prevention 
 
          Download only phone apps from the legitimate marketplaces such as Google Play Store or in app store and Don't click unwanted link form the social media. Disable the unwanted permission to your apps that are installed on your android device or iPhone or in your pc.
 
In the next Blog i will explain about the type of hackers.

Comments

Popular posts from this blog

Base64 Algorithm

Linux termux 2.0

Operating System used by Hackers

Social