Mo_Sa_1983 Profile Banner
Mo. S. Profile
Mo. S.

@Mo_Sa_1983

Followers
688
Following
973
Media
38
Statuses
137

Web Application Developer

South Africa
Joined April 2011
Don't wanna be here? Send us removal request.
@Mo_Sa_1983
Mo. S.
2 years
πŸ‘β€οΈ.
@Springboks
Springboks
2 years
It's over in Paris! What a game, we go again next week in the #RWC2023 final. Thanks for an amazing contest @EnglandRugby πŸ‡ΏπŸ‡¦πŸ€.#StrongerTogether #Springboks #RWC2023 #RSAvENG
Tweet media one
0
0
0
@Mo_Sa_1983
Mo. S.
2 years
This emphasises the need for ongoing research and efforts to improve transparency and explainability in order to fully understand and trust the outcomes generated by the programmes. #BlackBoxProgramming #TransparencyInAlgorithms #ExplainableAI #AlgorithmicOpacity.
0
0
0
@Mo_Sa_1983
Mo. S.
2 years
The internal mechanisms or decision-making processes of the programme can be like a black box, where the exact reasoning or logic behind the outcome remains unclear. #TechIndustryChallenges #EthicsInProgramming.
1
0
0
@Mo_Sa_1983
Mo. S.
2 years
When programmers create software or algorithms, they may sometimes observe correct outcomes, but they might not have a complete understanding of how the system arrived at those results.
1
0
0
@Mo_Sa_1983
Mo. S.
2 years
What is the "black box" aspect of the programming industry?."Black box" refers to aspects of certain systems or processes, such as AI algorithms, where the internal workings or decision-making processes are not fully understood or transparent.
Tweet media one
1
0
1
@Mo_Sa_1983
Mo. S.
2 years
By using try-catch blocks, we can anticipate potential errors, such as dividing by zero or accessing invalid data, and handle them. We can display error messages, log information for debugging, or take specific actions to recover from the error.
1
0
0
@Mo_Sa_1983
Mo. S.
2 years
The "catch" block specifies the type of error that can be handled. If the error is of the specified type, the code contained within the "catch" block is executed. It enables us to handle the error situation gracefully.
1
0
0
@Mo_Sa_1983
Mo. S.
2 years
The "try" block: We use a "try" block to enclose a section of our code. This is where we put code that could result in an error or exception. When an exception occurs within the "try" block, the programme flow is immediately redirected to the corresponding "catch" block.
1
0
0
@Mo_Sa_1983
Mo. S.
2 years
Try-Catch Blocks for Error Handling.While running our code, errors or unexpected situations may occur. We can use a try-catch block to handle these situations gracefully and prevent our programme from crashing. #ErrorHandling #ExceptionHandling #TryCatchBlock #CodeErrors
Tweet media one
1
0
0
@Mo_Sa_1983
Mo. S.
2 years
Illegal activities:.Drug trafficking and sales, Weapons trading, Hacking and cybercrime, Fraud and identity theft.
0
0
0
@Mo_Sa_1983
Mo. S.
2 years
Legal activities examples .Anonymous communication and whistleblowing, Secure and private browsing, Accessing content that may be censored or blocked in certain countries, Research and journalism in sensitive areas.
1
0
0
@Mo_Sa_1983
Mo. S.
2 years
The dark web is also used for legitimate purposes such as anonymous communication, secure browsing, and protecting privacy.
1
0
0
@Mo_Sa_1983
Mo. S.
2 years
This makes it difficult to track or regulate its use, making it a haven for illegal activities such as drug trafficking, weapons trading, child pornography, and other criminal activities.
1
0
0
@Mo_Sa_1983
Mo. S.
2 years
Dark web . It refers to a part of the internet that is not indexed by search engines and requires special software, such as the Tor browser, to access. #DarkWeb #DeepWeb #TorBrowser #OnlinePrivacy #CyberSecurity #IllegalActivities #AnonymousCommunication #HiddenInternet.
1
0
0
@Mo_Sa_1983
Mo. S.
2 years
The salted hash technique makes it more difficult for attackers to crack passwords by using precomputed tables, as the same password will result in different hash values depending on the unique salt value used.
0
0
0
@Mo_Sa_1983
Mo. S.
2 years
This technique is commonly used to protect passwords stored in databases or other systems, and it is considered a best practice for password security.
1
0
0
@Mo_Sa_1983
Mo. S.
2 years
Salted hash.It refers to the process of adding a random salt value to a password before it is hashed. #security #Salted_hash #cryptography #attackers #hacking #hacking.
1
0
0
@Mo_Sa_1983
Mo. S.
2 years
Both methods are important for ensuring the security of software systems and can be used in combination to provide multiple layers of protection for sensitive data.
0
0
0