Skip to main content

Project conclusion. Reflection

 During my first term at the DMUIC I have learnt a lot of new essential skills. The Computer Skills and Research module has helped me a lot, and in this post I am going to conclude what I have learnt during the work on the project and the blog.

Firstly, I have learnt how to find, filter and reference academic sources. Moreover, I have implemented this knowledge in my studying. Also, I learnt how to use university facilities such as library. It is a new and essential skill which I am glad to have.

Secondly, I have learnt how to manage the project. For example, there are a project plan and a Gannt Chart in my blog. These elements help to manage project well. Moreover, they provide me with the possibility to assess my work and to decide wether I am working efficiently or not.

Thirdly, I have learnt how to write research essays and how to find correct sources for referencing. These new skills were implemented in the research essay post. Moreover, I have learnt how to use some essential services, such as officetimeline.com and citethisforme.com, in order to create Gannt charts and keep the list of referenced sources. Furthermore, I have learnt how to create effective and good looking diagrams with draw.io.

The last but not the least, I have learnt how to make quantitative researches and create questionnaires. Moreover, I have learnt how to choose the topic for and how to write case studies.

To conclude, Computer Skills and Research module has given me a lot of essential skills for my future studying.




Comments

Popular posts from this blog

Software review: Hashcat

In the following blogpost the way I used software called hashcat in my project is described. The example of using this software for dictionary attack is demonstrated. In my work I used information provided by Tavarez (2020) .   According to Porup (2020) hashcat is one of the most popular password crackers all around the world. Moreover, hashcat is included in the list of basic tools in Kali linux – linux distribution widely used by cybersecurity specialists. I installed Kali linux virtual machine in order to use this program and to show the example of a dictionary attack (Author's screenshot) However, before looking at the examples of using hashcat on practise, it is useful to understand in which areas hashcat is using. In plain words, hashcat is a password guesser which includes a number of features and pre-installed functionalities for cracking passwords by penetrating brute-force and dictionary attacks. The way it works is not too sophisticated, it hashes considerable numbe...

Major project theme

Every person has heard about how important it is to have a well-built strong password. An essential number of people would agree that password hygiene is as important as the personal hygiene is, since violation of first may lead to much more serious consequences. However, the statistics show that 59% of users use their names and dates of birth as their passwords, 43% shared their passwords with other people and only 45% would change a password after a breach (O’Driscoll, 2020). The aim of this post is to show how to create strong passwords. It is necessary to know how passwords are cracked in order to properly understand what password can be referred as strong one. There are to ways to execute an attack: online and offline.  Online attack is done by trying different passwords one by one through a normal log in process. Usually, such attacks are unsuccessful since they are easy to detect and block if necessary (Burnett and Kleiman, 2006).  I think everybody encountered situatio...