Rumble review

Image
What Is Rumble? Rumble has been a buzzword around North America, around 20% of U.S citizens have heard of the upcoming video platform. As a direct competitor to Youtube and many other platforms, Rumble is particularly interesting.  Founded in 2013  Chris Pavlovski  developed a video sharing platform, to compete with Youtube.  Chris noticed google was leaving out independent content creators, so he founded Rumble.  A quote from Rumbles about us page states "  We are for people with something to say and something to share, who believe in authentic expression, and want to control the value of their own creations." Focused on the individual creator and their creators earnings which we will discuss further. Along with the Video Platform Rumble offers other services such as, cloud services, and webhosting, in fact Rumbles cloud services hosts Truth Social another leading platform. During 2020 and in the years to come Rumble has seen a huge boost in viewers, subs...

Secrets To A Secure Password

Making secure passwords



Think of passwords as secret handshakes between you and your favorite online platforms. When you create an account, the system doesn't just scribble down your password like a grocery list; it transforms it into a secret code using a special algorithm called a hash function.


Imagine this hash function as a magical blender that takes your password (or any data) and churns out a fixed-size, seemingly random string of characters – your password's alter ego. This new string is what the system stores in its vault.


Salt, the Spice of Security:


Adding a pinch of salt to your password is like seasoning your favorite dish. In the world of cybersecurity, it's a randomly generated value unique to each user. So, before tossing your password into the hash-function blender, a bit of salt gets mixed in. This ensures that even if two users have the same password, their hashed versions will be distinct, adding an extra layer of complexity for would-be hackers.


The Art of Authentication Ballet:


Picture this: you're at the entrance of a super-secret club, and you need to perform a precise dance routine to prove you're an insider. That dance routine is the authentication process. When you log in, the system takes the password you entered, performs the hash dance, and checks if the resulting hash matches the one stored in its VIP list. If the moves match, you're granted access to the exclusive digital party.


 Policies, the Bouncers of Cybersecurity:


Every exclusive club has rules, right? Password policies are like the bouncers ensuring that only the toughest, most complex passwords make it past the velvet rope. They demand a minimum length, a mix of uppercase and lowercase letters, numbers, and maybe even a special character or two. It's not just about keeping out the riff-raff; it's about making sure your password is a VIP in the world of security.



Encryption, the Cloak of Invisibility:


Imagine your password is a letter traveling through the internet. Encryption is like wrapping that letter in an invisible cloak. It ensures that even if someone intercepts your letter mid-air, all they'll see is gibberish. This is crucial during the login process, especially when you're accessing sensitive information – you want your password to be as stealthy as a ninja in the night.


Two-Factor Authentication (2FA), the Sidekick:


Batman has Robin, and your password can have a sidekick too! Enter Two-Factor Authentication (2FA). It's like having a trusty sidekick who, in addition to your password, requires another piece of evidence – maybe a secret code sent to your phone. This dynamic duo ensures that even if a villain gets hold of your password, they still need the sidekick's approval to gain access. Beware if the device used for 2FA and has been broken it is insanely hard to access the account again.



 The Symphony of Security:


Passwords are not just strings of characters; they're the notes in the symphony of security. From the hashing ballet to the seasoning of salt, the authentication dance, the strict policies, the invisible cloak of encryption, and the trusty sidekick of 2FA – they all come together to create a harmonious melody that protects your digital identity in the vast, sometimes chaotic, world of cyberspace.



Best tools for password managements and safety :


Invented by the same creators of Nord VPN, Nord pass is a great tool for managing your passwords and keeping them safe, along with those it allows you to automatically sign in- Cool right!? Get Nord Pass here and protect yourself now !!


Another great tool we love to use is Roboform password manager a super reliable and affordable password manger, Check out Roboform password manager here.



Sources


https://en.wikipedia.org/wiki/Cryptography


https://www.roboform.com/lp



Comments

Popular posts from this blog

Rumble review

5 Essential Tips for Beginner Bloggers