JordanBroken SHA-1SHA-1 is a cryptographic has function standard that is commonly used in PDF’s that require a signature, and a wide spectrum of digital…Feb 22Feb 22
JordanCompare Cipher ToolsCipher Tool is a fun website that allows users to try simple cryptographic tools that decodes messages. For myself, this is a fun new type…Feb 21Feb 21
JordanUnified Endpoint Management TechnologiesWhile looking up and researching unified endpoint management technologies, I found it increasingly important to find solutions that…Feb 20Feb 20
JordanComputer Viruses — of multiple typesOver the last year and a half, this question has become more and more prevalent with the outbreak of the Corona Virus. While researching…Feb 19Feb 19
JordanFalse Positives and False NegativesFalse positives and false negatives, at the surface level, seem to be similar. When in fact, they are not. In regards to false positives…Feb 15Feb 15
JordanDatabase ProblemsCommon SQL problems have been a problem of mine through the last few weeks. It is fitting that we discuss this now. For the assignment I…Nov 8, 2022Nov 8, 2022