Great book for anyone who wants to learn how cryptography works, and how to implement the knowledge using python

Im a big gan of cryptography and when it comes to transposition ciphers , substitution ciphers and the classic caesar cipher . you will find me hooked

That is why i got excited reading “Cracking codes with python” one of the best books that does both. …

Let’s make this story short. Specific strings on your wireless SSID can make your iPhone freeze. It reminds me how cross-site scripting can do harm if your web app doesn’t sanitize the input and treats it as a code
Here is a short video I made. See what happens when I connect to that SSID

You can capture (sniff) packets of any traffic that travels on your FortiGate firewall using the command line. Very similar to TCP Dump

Why do we need to do that?

It allows you to have a low-level view, up to the hexadecimal representation of the different packets

You will see, if packets travel the way they should, if they are dropped and where. It is one of the best diagnostic tools available

Base 64 is used everywhere. It is the most known and famous encoding scheme that is used to represent binary data and transform it into an ASCII representation. Why do we use it? What is the algorithm? And how does it actually work?

We use base 64 as a method to encode binary data into an ASCII representation.


We do so since many systems and networks just don’t represent binary data as it is supposed to be shown. So how does it actually work?

Let’s do it by example. Let’s take the word…

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store