Poodlebleed.com LogoPoodlebleed.com

Information Technology Studies

Studies (Page 1)

Cryptographic Hashing Study - MD5, SHA, CRC32

Last modified: 29th Aug 2022

To understand what a hash is we need to understand how it works and the various types that are available. Hashes are a string of characters that are created through a cryptographic algorithm.

Study of the Key Reinstallation Attacks (KRACK) Vulnerability

Last modified: 29th Aug 2022

This study's objective is to investigate the Key Reinstallation Attacks (KRACK) vulnerability related with Wireless Fidelity (Wi-Fi) networks and the Wi-Fi Protected Access 2 (WPA2) protocol

Advantages and Disadvantages of Cloud Computing

Last modified: 29th Aug 2022

This study analyzes cloud computing and its advantages and disadvantages in an effort to aid organisations in making informed decisions about whether to use it or not.

Presidential Administration Policies to Fight Cybercrime

Last modified: 28th Aug 2022

The proliferation of cybercrime is increasingly becoming a critical management issue with the United States government identifying it as one of the most serious national and economic challenges facing the nation.