Information Security
1. Introduction
○ Security by obscurity
§ Steganography
□ Hiding data inside another form of data, like using non-used bits in image to hide a message
§ Cool, but not practical.
§ Disadvantages
◊ Algorithm secrecy vs. key secrecy
○ Cryptography is everywhere and yet if done right, you can barely see it.
○ Go ... Show More
Nov 2024
EP92 - AskDeveloper Podcast - من السيرفر الى السحابة - حنجيب سيرة قواعد البيانات مع أحمد عياد
لو خطر في بالك قبل كده ليه عندنا كل قواعد البيانات دي, و ليه فيه منهم انواع مختلفة DBMS, NOSQL و غيرهم, طيب الناس اللي بتشتغل على الحاجات دي ايه التحديات اللي بيواجهوها, و ايه التخصص ده و ايه المتطلبات بتاعته.
Ahmed Ayad is a SQL Engineer by trade, a database guy by education an ... Show More
1h 21m
Sep 2024
🚨 BIG Crypto News! Mastercard Crypto Card & Cardano Joins Hbar, XRP, & Algorand
Crypto News: Mastercard partners with Mercuryo to launch a euro-denominated crypto debit card. Cardano joins an alliance with Ripple XRP, Hedera HBAR, & Algorand.<br /><br />💡Get the (Re)Thinking Crypto Book on Amazon - https://www.amazon.com/dp/B0D2525DYX <br /><br />Sponso ... Show More
15m 28s
Sep 2020
Al-Anfal ٱلْأَنْفَال
The Spoils [1] (Arabic: ٱلْأَنْفَال, al-ʾanfāl, aka "Earnings, Savings, Profits")[2] is the eighth chapter (sūrah) of the Quran, with 75 verses. Regarding the timing and contextual background of the revelation (Asbāb al-nuzūl), it is a "Medinan surah", completed after the Battl ... Show More
30m 38s