TOP 10 LIST OF WEEK 2
2. A security incident is an event that leads to a violation of an organization’s security policies and puts the data at risk of exposure. Cyberattacks are more varied than ever, you can learn more at this website about the key symptoms that signal a problem.
3. According to wikipedia a computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. Check this website to learn more about computer virus and types of computer virus.
4. According to Kaspersky, cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. Let’s learn more about cryptography here.
5. Altough by nature linux are more secure than windows, there are still some stuff you should do to assure the security of your device. Here are some steps that you could do to harden your linux OS.
6. What is GNU Privacy Guard? And how do you use it?
7. The sha1sum command computes the SHA-1 message digest of a file. This allows it be compared to a published message digest to check whether the file is unmodified from the original. Learn more about how to use sha1sum command.
9. You can watch this playlist at youtube to learn basic programming using C languange.