Hackaday Links: September 19, 2021

Hackaday Links Column Banner

Things might be getting a bit dicey out in Jezero crater for Ingenuity. The little helicopter that could is starting to have trouble dealing with the thinning Martian atmosphere, and …read more Continue reading Hackaday Links: September 19, 2021

How do I select a managed cybersecurity solution for my business?

Digital transformation has been around for a while, but last year it accelerated its pace significantly. As organizations suddenly shifted to an almost exclusively digital world, the need to protect digital assets grew even more. One way to tackle thes… Continue reading How do I select a managed cybersecurity solution for my business?

How do I select a DMARC solution for my business?

Domain-based Message Authentication, Reporting & Conformance (DMARC), is an email authentication, policy, and reporting protocol. It builds on the SPF and DKIM protocols to improve and monitor protection of the domain from fraudulent email. To sel… Continue reading How do I select a DMARC solution for my business?

Ease Me Into Cryptography Part 3: Asymmetric Ciphers

Welcome to Part 3! A quick recap of where we’ve been. In Part 1: Buzzwords and Hash Function we talked about some foundational cryptography vocab and were introduced to hash functions, how they’re used, and some drawbacks. In Part 2: Symmet… Continue reading Ease Me Into Cryptography Part 3: Asymmetric Ciphers

Ease Me Into Cryptography Part 2: Symmetric Ciphers

In the first article in this series on the basics of crypto, “Ease Me Into Cryptography Part 1: Buzzwords and Hash Function”, we learned some lingo and talked about the different aspects of hash functions. Remember that hash functions are one-way &#821… Continue reading Ease Me Into Cryptography Part 2: Symmetric Ciphers