Posts

Facial Recognition With Python

Image

Man In the middle attack

Image
A man-in-the-middle attack (MitM) is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.Usually, this is automatically done throught SSL certificates checked by your browser against a given set of recognized certificate authorities).  If you get a security exception message such as this one you might be the victim of a man-in-the-middle attack and should not bypass the warning unless you have another trusted way of checking the certificate's fingerprint with the people running the service.But on top of that the certificate authorities model of trust on the Internet is susceptible to various methods of compromise.  For example, on March 15, 2011, Comodo, one of the major SSL certificates authorities, reported that a user account with a

My first time experience: C#/ Asp.net.core

Image
I am planning of deploy my API to my server and error happen. My source: using System; using System.Collections.Generic; using System.IO; using System.Linq; using System.Net; using System.Threading.Tasks; using Microsoft.AspNetCore; using Microsoft.AspNetCore.Hosting; using Microsoft.Extensions.Configuration; using Microsoft.Extensions.Logging; namespace johnTestBO     public class Program     {         public static void Main(string[] args)         {             CreateWebHostBuilder(args).Build().Run();         }         public static IWebHostBuilder CreateWebHostBuilder(string[] args) =>             WebHost.CreateDefaultBuilder(args)             //Open to loop back localhost             //  .UseKestrel(options =>             // {             //    options.Listen(IPAddress.Loopback, 5001);                    .UseStartup ();             // })     } } ``` The error after I run it in ssh and visual. ``` Exception has occurred: CLR/System.Net.Sockets.SocketException An unha

Cryptography: [Definition] Part II

Cryptography II Cryptography Consists of Two Branches: 1. Cryptography is the area of constructing cryptographic systems. 2. Cryptoanalysis is the are of breaking cryptographic systems. " Cryptography is a field of computer science and mathematics that focuses on techniques for secure communication between two parties."

Cryptography: [Caesar cipher ] Part I

Image
Cryptography K.R.G.X.B.W.O.Z.X.P.G (Cryptography) Cryptography is the science of the using secret codes. Terminology ----+---"Cryptanalyst" is someone who uses and studies secret code. Codes vs Ciphers. Codes are made to be understandable and publicly available. A cipher is a set of rules for converting between plaintext and ciphertext. For example; the Famous Caesar Cipher : Cipher Disk__ A..B..C..D..E..F..G..H..I..J..K..L..M..N..O..P..Q..R..S..T..U..V..W..X..Y..Z 0..1..2..3..4..5..6..7..8..9..10.11.12.13.14.15.16.17.18.19.20.21.22.23.24.25

Binary code

Computer operated by binary codes ( 0 and 1 : Bit OFF and ON); Binary code operated by decimal (base 10) }Positional notation}; Base 8 { 0 1 2 3 4 5 6 7 } Base 10 { 0 1 2 3 4 5 6 7 8 9 } Base 12 { 0 1 2 3 4 5 6 7 8 9 A B } Alphanumeric Base 36 { 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z } Alphanumeric Base 62 { 0 1 2 3 4 5 6 7 8 9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z a b c d e f g h i j k l m n o p q r s t u v w x y z } 8-bit systems : " 128 / 64 / 32 / 16 / 8 / 4 / 2 / 1 "