I’m an adult and proud that I don’t read this nonsense anymore. But what is the book where there is a magic tree house ? just so that I don’t read it mistakenly
I’m an adult and proud that I don’t read this nonsense anymore. But what is the book where there is a magic tree house ? just so that I don’t read it mistakenly
but CD-R aren’t rewrite_able because of their physical property not because protected
deleted by creator
thank you! I think this is what needed to explore
It is not my level to edit these things, I’m just Linux newbie exploring the possibilities.
But I still can’t wrap my head over dd not being able to wipe a storage device out, despite being described as a “low level tool that can write zeroes to targets” in the discussion I viewed online.
I don’t know I got it from this post by the ByteByteGo Youtube Channel:
https://www.youtube.com/post/UgkxNpwmgzai2O_tUa-b5yeLzLjh_OHs4vDY
On the description for this video they state:
Animation tools: Adobe Illustrator and After Effects.
hmm, so this is not a constant thing among BIOSes and UEFIs
what about this answer ? Is it outdated ? According to it, UEFI could be mounted like a flash drive I understand ?
I’m satisfied with the answers and insights I got so far. But if you may add I’d be happy to know why factorization of prime numbers is so crucial in cryptography. I heard about this a lot before but don’t know anything. I know quite well about Prime number and theorems about them on math, but not their applications
Thank you! extremely helpful answer
so you can encrypt a message with my public key but you cannot decrypt it afterward ??
Oh! I remember these steps being explained on a youtube video before. So the point is that the padlock (that Adam received on the third paragraph) is like a program on my windows desktop, I can run it (here like Adam uses it to encrypt the date), I can copy it and send it to a friend, but I can’t read the code which is compiled through an unknown language (i.e even if snooper received the padlock he can’t figure out how to unlock it and decrypt the data)?
The situation is just an example, I’m not actually planning a revolution. just for demonstration purpose
this is very detailed answer thank you. however I face an ambiguity regarding this:
This is a mode of cryptography where each side generates two keys: a public half and a private half. Anything encrypted with the public half is only decryptable by the associated private half (and vice versa).
How can this private half be something that I know, Youtube knows but impossible for the snooper to our communication to know??
bro this is depressing. I think CLI projects are less likely to receive donations for some reason and more in danger
Arigato