Chapter 6: Cybersecurity and Cryptocurrency

Password Strength

Password strength charts
View table

Explore how the alphabet size, password length, and tests per second affects brute force password cracking time

Sources

Deconstructing Phishing Campaigns Avoiding Phishing Scams 10 ways to Avoiding Phishing Scams Identifying phishing scams Hackers Data breaches 2019 Identity theft Cracking passwords Passwords - Haystack Password cracking techniques Password cracking - Wikipedia Password cracking techniques - ITPro Bitcoin prices, historical Dogecoin hack Mt. Gox Ethereum The_DAO ERC-20 Tokens Wet code vs dry code Public-key cryptography Diffie Hellman Key exchange Explaining Diffie Hellman key exchange Public Key overview Cornell - Diffie Hellman, public key cryptography