Posts for: #Quora

How is the site WhiteHat Jr. for teaching coding for children?

This post is a part of migration of my content from Quora. This answer quickly amassed 1k+ upvotes (not common for a no-name user like me) and a lot of interesting comments, in probably less than a week. After that, it was shadow-collapsed by Quora (for no mentioned reason, indicating potential mass reporting), and I didn’t even know that for quite a lot of months. An email appeal to reinstate the answer was successful, but it was too late at that point.
Read more →

What is the difference between cryptography and steganography?

Source: https://www.slideshare.net/kinleay/cryptography-its-history-application-and-beyond Cryptography involves itself with encryption/decryption or hashing of the messages. It’s almost a mathematical field which has a profound practical impact on our lives. Generally, other guys must not be able to read your data, even if they get hold of it and know how it was encrypted.1 Some of the most noticeable everyday life examples: Most n00b example everyone comes across: Fb lbh svanyyl qrpelcgrq guvf! :-C If you didn’t know words are shifted by 13, this would be garbage for you.
Read more →

What is the maximum amount of damage you can inflict on the universe by altering one word in any one of Newton’s three laws of motion?

The holy second law is untouched till now (note: in the question thread), such is the power of the second law. It is in a way the basis of force as we perceive in daily life. Yeah, let’s play with the force itself. Here’s the second law. The rate of change of momentum of a body is directly proportional to the force applied, and this change in momentum takes place in the direction of the applied force.
Read more →

How can we improve Aadhaar’s security?

Warning! Not your average bitching answer. Well, let’s do a quick recap of what Aadhaar, an authentication system, does. The end-user/application supplies some data to the system, like Aadhaar number, name, age, DOB, etc. which is to be authenticated. The Aadhaar system compares this with its own record, and would like to verify with OTP and biometrics that the authentication request is indeed by the guy whose data is being processed.
Read more →

Conceptually, what is DDoS and darknet?

Essentially, without any pseudo-childish-hacking fuss, it simply goes like this: DDoS attack is like a mob attack on a shop or a riot. When that happens, the shop is shut down and curfew maybe imposed on the area. DDoS is a coordinated attack on a web server, overflowing it with huge amounts of requests and traffic that the poor server’s resources are forced to become unavailable. Darknet is just like an area of abandoned houses.
Read more →