Skip to main content

Current software skills

 Hello! In this post I want to tell about my current software skills and plans for the future.

I started my IT journey from Paint. At the age of 4 when I wasn't able to read I could spend hours just sitting and drawing some shapes on the screen. It seemed to me as such a powerful tool. 

Then I started my school. Schools in Belarus don't require any IT skills. Some children can even see the mouse for first time at the age of 14. But I was lucky because I had a really cool English teacher who encouraged us to create something like small projects on the topic that we had during class. I always wanted to create something specific, therefore, I started to use computer for my projects. I learned Microsoft Office quite good.

I got interested in programming at the age of 12 and I learned Pascal ABC. Then I got a bit of knowledge in Java, Python, C++. Also I have some skills in using linux. I tried myself in 3d max,  I know a little of photoshop and I am able to create small videos in Adobe Premier Pro and Adobe After Effects.

I am open and ready for any knowledge and skills I can get during IYZ Computing in DMUIC. I hope I will expand my knowledge this year and become ready for Cyber Security course next year!

Comments

  1. You have a fair range of skills there Ilya, it will be interesting to see how you develop them over your foundation and which area of cyber security you explore in your project theme.

    ReplyDelete

Post a Comment

Popular posts from this blog

Software review: Hashcat

In the following blogpost the way I used software called hashcat in my project is described. The example of using this software for dictionary attack is demonstrated. In my work I used information provided by Tavarez (2020) .   According to Porup (2020) hashcat is one of the most popular password crackers all around the world. Moreover, hashcat is included in the list of basic tools in Kali linux – linux distribution widely used by cybersecurity specialists. I installed Kali linux virtual machine in order to use this program and to show the example of a dictionary attack (Author's screenshot) However, before looking at the examples of using hashcat on practise, it is useful to understand in which areas hashcat is using. In plain words, hashcat is a password guesser which includes a number of features and pre-installed functionalities for cracking passwords by penetrating brute-force and dictionary attacks. The way it works is not too sophisticated, it hashes considerable numbe...

Major project theme

Every person has heard about how important it is to have a well-built strong password. An essential number of people would agree that password hygiene is as important as the personal hygiene is, since violation of first may lead to much more serious consequences. However, the statistics show that 59% of users use their names and dates of birth as their passwords, 43% shared their passwords with other people and only 45% would change a password after a breach (O’Driscoll, 2020). The aim of this post is to show how to create strong passwords. It is necessary to know how passwords are cracked in order to properly understand what password can be referred as strong one. There are to ways to execute an attack: online and offline.  Online attack is done by trying different passwords one by one through a normal log in process. Usually, such attacks are unsuccessful since they are easy to detect and block if necessary (Burnett and Kleiman, 2006).  I think everybody encountered situatio...