TOTP algorithm: by example
At some stage, you may have entered a 6-digit code from a 2FA app like Google Authenticator. But where did this code come from? The answer …
Deepfake, Is It Dangerous?
From the innocent fun of bringing the Mona Lisa to life, to fake sex tapes and corporate theft. Is the world safe whilst Deepfake technology is …
One or many?
Assuming that they add up to the same size, is it faster to copy one big file or many small files? If you have ever initiated …
The Padlock, HTTPS, and Online Safety
What does the padlock in the address bar represent? And why is it no longer green? HTTP Whether it be browsing social media, watching videos or …
Dissection of a computer
Computers are part of our everyday lives. From writing notes, to binging Netflix, your computer is one heck of a machine. But do you actually know …
Number of posts found: 20