So the other day, I made a cryptography algorithm which was taken from a compression algorithm (which failed) I made. the trick was that you take a letter, convert it into ASCII then convert that ASCII code to binary and then replace 0 and 1 with specific keys. This would be genius. As I said it was taken from a compression algorithm, I made. I was talking about it in the community when someone points out that I recreated the Lempel-Zvich algorithm ( https://www.cs.duke.edu/csed/curious/compression/lzw.html ). I had no idea such an algorithm existed way before me. Is this sheer coincidence? How is that even possible. I went on .. My second algorithm was an array sorting one. Every programming Language has one in-built. The catch of this one was that you take the largest number from the array and keep on popping it off. In this way, the array is sure to be sorted at the end. This performed really good. My Third Algorithm was a clustering algorithm. In Artifici...
I was reading my messages today. A message pops - "You use weak passwords." I got freaked out at first. Then I went on. thinking it was a joke. *spoiler alert* BAD IDEA. Then I opened my github and ..... Thats my github Bio. . The hacker made a repo on my account - . So. Now i have another password. Try breaking that! What happened was that I had a file where there was my password. For an encryption project. The guy gets it. I get hacked. Be safe kids!
I am a Python programmer. I love it . everything is so easy. It is like a Ford Fiesta. It does the job. It is good for normal use. But then there is Java and c++. Not as easy. But it is elegant , beautiful. It is a mercedes. a bentley.
Comments
Post a Comment