CodeX
Published in

CodeX

Learning about Encryption, Encoding, and Hashing

Photo by Markus Spiske on Unsplash

BASIC INTRODUCTION

We no longer live in the 90s when the internet was just accessible to people. With the amount of information that is available and the sheer number of tools available to aid exploitation of vulnerabilities, it is necessary to implement proper security controls.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Security Lit Limited

Security Lit Limited

669 Followers

We envision a world that is free of cybercrimes and security risks. Driven by our core values- Ethics, Integrity and Collaboration