curse
Top 10 List of Week 02
Valentino Herdyan Permadi --- Bekasi

Top 10 List of Week 02

  1. Why you should use 2FA
    This is a way to increase the security of your account. Some website did not implement this feature and it makes a lot of its user account vulnerable. Most users doesnt use a strong password. Because of that, the password can easily bruteforced. 2FA adds a layer to an authentication. It can be a phone number or anything else that is unique to the user. And because this is unique only to the user. One Hacker cannot simply bruteforce their way to another user account.

  2. Why you need a password manager
    A short article explaning why should we use a password manager.

  3. How do password managers encrypt passwords
    The previous link explained about why we need a password manager. So now i am curious in how it works. This is question in quora asking about how does a password managers encrypt your password.

  4. “Don’t trust a password management system you design yourself!”
    Now that we know how password managers works, we can make our own password manager right? Unfortunately, no. Well, if you are an expert in this field then you probably can. But, it is not so easy as you might think. There are a lot of factor for it and this article shows what are those factors.

  5. Why we shouldnt use our own encrpytion system
    Sometimes, some of us doubted popular ecryption system that already exist out there and feel confident that we our own encryption system is secure. This thread answered why you should just use an open-source encryption system that is already out there.

  6. Should you allow your browser to save your password?
    An article that shows why you shouldnt allow your browser to save your password.

  7. ’;–have i been pwned?
    A website that lets you check if your email address is in a data breach. They tracked all known data breaches that occured and you can try input you email to know if your data is leaked based on your email address. Sometimes a data breach can be dangerous if your important stuff is leaked, for example: password, credit card details, etc. You can check which website that was leaked and what information that was leaked.

  8. donut.c
    I included this C program in the last top 10 but since the current week also talks about the C Language, i might as well included it in this week’s top 10.

  9. Block websites using hosts file in Windows
    Sometime when you want to block access to certain website, you can use this simple method. But please note that this only block the access from your computer.

  10. Pros and Cons of VPN
    When you ask how can you make your internet surfing safer, a lot people will answer with “get yourself a vpn”. This article shows you what are the pros and cons of using a VPN.

Bonus

You have reached the bottom line, here’s a clip of Towa-sama saying badonkers


© 2021-2021 --- Valentino Herdyan Permadi --- File Revision: 1.15---23-May-2021.