This is the section where I talk about how great I am, and why you should employ me.

To do this properly, I would list a plethora of three letter acronyms (TLAs) of all of the technologies I’ve googled and briefly read about on Wikipedia. I will probably even list how driven I am, what career I am “in pursuit of” and how I’m a “go-getter.”

I will spend more time limiting my resume to one page because some dinosaur told me that’s important, when that’s untrue for jobs that require talents.

I will conclude with my contact information, maybe a few links to pages I’ve built, a handful of code samples that I’ll be embarrassed by within a year, and a list of hobbies that doesn’t make me interesting “walks by the beach”, “guitar” etc… Good boilerplate.


Telltale Signs of Impending Password Breach

For most, password restrictions are an annoyance that prevents them from using easy to remember passwords, like “password” or “123456”. You can generally tell how a company handles your private information, and I’ll teach you a few tricks on determining which sites potentially store your password insecurely. Smart Password Complexity Requirements (none of these should …

What is a Password Hash?

What is encryption? Encryption is a reversible message obfuscation technique which applies keys or mathematical models against a string of text. The key here is that, with the proper password or key, you can retrieve the original contents of the message. Remember making up codes like “A=Z, B=Y, C=X” in school (this is a ROT13 …