dark mode fix

This commit is contained in:
anarsec 2024-04-14 20:52:43 +00:00
parent 7daa9fe776
commit ec6fb8110b
No known key found for this signature in database
17 changed files with 122 additions and 48 deletions

View file

@ -4,6 +4,7 @@ sort_by = "date"
paginate_by = 5
+++
<br>
<div class="column is-8 is-offset-2">
> This glossary defines terms commonly used in AnarSec articles.
@ -21,7 +22,7 @@ An attacker who “simply” tries every possible key to access a service or dec
### Checksums / Fingerprints
Checksums are digital fingerprints: small-sized blocks of data derived from another block of digital data for the purpose of detecting any changes that may have been made. For example, when you download the [Noisy script](https://0xacab.org/anarsec/noisy), the SHA512 checksum will be: `ed3e1c4012d38300ed2160bddb6ef33d22ffb67036e8f86eb7a45b683b2cd2501e63b2b6a528635cbc098175690ef9cb49598fb6cfe9361c4390bf5cb731272c`. You can use [hash functions](https://open.oregonstate.education/defenddissent/chapter/cryptographic-hash/) like SHA512 to create fingerprints. Essentially, this mathematical operation converts the 0's and 1's of the file into a unique "fingerprint". Changing a single 1 or 0 results in a completely different fingerprint. It is often important to know if a file has changed, such as when downloading the image file for an operating system. Fingerprints are often used in cryptography (e.g. in certificates or to verify [public keys](/glossary/#public-key-cryptography) in general). GtkHash is a program that allows you to calculate checksums without using a command line interface.
Checksums are digital fingerprints: small-sized blocks of data derived from another block of digital data for the purpose of detecting any changes that may have been made. For example, when you download an operating system .iso file, a checksum is listed that looks like: `sha512: 9f923361887ac4b1455bc5ae51c06f2457c6d(continued...)`. You can use [hash functions](https://open.oregonstate.education/defenddissent/chapter/cryptographic-hash/) like SHA512 to create fingerprints. Essentially, this mathematical operation converts the 0's and 1's of the file into a unique "fingerprint". Changing a single 1 or 0 results in a completely different fingerprint. It is often important to know if a file has changed, such as when downloading the image file for an operating system. Fingerprints are often used in cryptography (e.g. in certificates or to verify [public keys](/glossary/#public-key-cryptography) in general). GtkHash is a program that allows you to calculate checksums without using a command line interface.
### Command Line Interface (CLI)
@ -248,3 +249,5 @@ Vulnerabilities are [exploitable](/glossary/#exploit) security flaws in software
### Zero-day exploit
A zero-day [exploit](/glossary/#exploit) is unknown to the public, the vendor, or other parties that would normally mitigate it. As a result, it is extremely powerful and highly valued. Governments can either develop their own zero-day exploits or purchase them from a [zero-day broker](https://www.wired.com/story/untold-history-americas-zero-day-market/).
</div>