Skip to content

Commit 57d58c8

Browse files
fix: fixed link generation in rss feed
Dropped support for wiki links, refactored feed.xml.js
1 parent 4d831ad commit 57d58c8

27 files changed

+47
-113
lines changed

.gitignore

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,10 @@ terraform.rc
4242
/playwright/.cache/
4343
screenshots/
4444

45+
# RSS Feed
46+
/Utils/RSSfeed/test-results/
47+
/Utils/RSSfeed/playwright-report/
48+
4549
# Build artifacts
4650
*.egg-info/
4751
dist/

About the owner.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
**TLDR: Software Engineer**
44

5-
![[marcin_kwiatkowski2025.jpg]]
5+
![marcin_kwiatkowski2025](marcin_kwiatkowski2025.jpg)
66

77
Hi! I am Marcin Kwiatkowski!
88

Atlas/Engineering/Cybersecurity/Encryption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11

22
It's a process of making readable data unreadable.
33

4-
Encryption converts [[Plaintext]] into [[Ciphertext]]
4+
Encryption converts [Plaintext](Plaintext.md) into [Ciphertext](Ciphertext.md)
55

66
## Encryption process
77

Atlas/Engineering/Cybersecurity/Key definitions/Cipher.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Is an algorithm used for encrypting and decrypting data.
22

3-
It converts [[Plaintext]] into [[Ciphertext]].
3+
It converts [Plaintext](Plaintext.md) into [Ciphertext](Ciphertext.md).
44
Plaintext is readable for human data.
55

66
Ciphertext is encrypted and unreadable.

Atlas/Engineering/Cybersecurity/Key definitions/Ciphertext.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ Can be named also cryptogram.
22

33
Ciphertext is an encrypted version of plaintext.
44

5-
It's an output of the [[Encryption|Encryption]] algorithm.
5+
It's an output of the [encryption](Encryption.md) algorithm.
66
Ciphertext appears as unreadable string of characters.
77

88
Example: "5d41402abc4b2a76b9719d911017c592"

Atlas/Engineering/Cybersecurity/Key definitions/Monoalphabetic rotation ciphers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11

22
A type of substitution cipher.
33

4-
It shifts a letter in a [[Plaintext]] by a fixed number of position in the alphabet to produce the [[Ciphertext]]
4+
It shifts a letter in a [plaintext](Plaintext.md) by a fixed number of position in the alphabet to produce the [ciphertext](Ciphertext.md)
55

66
```mermaid
77
flowchart LR

Atlas/Engineering/Cybersecurity/Key definitions/Plaintext.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,6 @@ Data in the original and readable form.
22

33
It can be text, file, message and any other type of data that human can understand.
44

5-
Plaintext is an input to an [[Encryption]] algorithm.
5+
Plaintext is an input to an [encryption](Encryption.md) algorithm.
66

7-
# Cybersecurity #TerminologyDefinitions #Beginner
7+
#Cybersecurity #TerminologyDefinitions #Beginner

Atlas/Engineering/Cybersecurity/Key definitions/polyalphabetic substitution cipher.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
A cryptographic method that uses multiple substitution alphabets to encrypt plaintext.
22

3-
In [[Monoalphabetic rotation ciphers]] each letter in the [[Plaintext]] is always substituted with the same letter in [[Ciphertext]]
3+
In [monoalphabetic rotation ciphers](Monoalphabetic%20rotation%20ciphers.md) each letter in the [plaintext](Plaintext.md) is always substituted with the same letter in [ciphertext](Ciphertext.md)
44
In a polyalphabetic substitution cipher, substitution depends on the position of the letter and a key.
55

66
This makes polyalphabetic substitution ciphers more secure.

Atlas/Engineering/Cybersecurity/symmetric encryption/Data Encryption Standard (DES).md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,4 +20,4 @@ terms:
2020

2121
#Cybersecurity #TerminologyDefinitions #ConceptExplanation #Beginner
2222

23-
[^1]: [[Cryptography and network security principles and practice (fifth edition) by William Stallings]]
23+
[^1]: [Cryptography and network security principles and practice (fifth edition) by William Stallings](Cryptography%20and%20network%20security%20principles%20and%20practice%20(fifth%20edition)%20by%20William%20Stallings.md)

Blog/2025/Historical cryptography algorithms.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
date: 2025-03-28
33
title: Historical cryptography algorithms
44
---
5-
My first task on the [Cybersecurity learning roadmap](Cybersecurity%20learning%20roadmap.md) course at studies was about experimenting with historical cryptography algorithms.
5+
My first task on the cybersecuirty learning roadmap course at studies was about experimenting with historical cryptography algorithms.
66

77
I was sitting in the computer room, it was quite stuffy, and around me were 30 other students. It was the third class of the day. The lecturer came in, who looked like a rather strict gentleman. He explained to us briefly what the course would look like and what the rules were for passing.
88

@@ -54,7 +54,7 @@ Ok, so at this moment I can experiment with Cryptool and learn about crypto a bi
5454

5555
In the scope of task I had: *Cesar*, *Vigenere*, *Hill* and *XOR*. Let's take a closer look at them
5656

57-
### Caesar's [[Cipher]]
57+
### Caesar's cipher
5858

5959
It's one of the oldest and simplest [Encryption](Encryption.md) algorithm invented (or at least associated with) Julius Caesar.
6060

@@ -252,7 +252,7 @@ Uh, a lot of theory and it's not easy, is it? Let's try to see how it work in pr
252252

253253
## Tasks & Experiments
254254

255-
### 1. Compare plaintext [[Entropy]] values ​​for Polish, English and one other selected language
255+
### 1. Compare plaintext entropy values ​​for Polish, English and one other selected language
256256

257257
I used these texts:
258258

@@ -298,7 +298,7 @@ Because entropy is a a measure of unpredictability and polish had has the best s
298298

299299
Based on that, polish is a good language for cryptography use cases.
300300

301-
### 2. Compare the entropy values ​​of [[Plaintext]] and cryptogram depending on the algorithm (Caesar, Vigenere, Hill)
301+
### 2. Compare the entropy values ​​of pllaintext and cryptogram depending on the algorithm (Caesar, Vigenere, Hill)
302302

303303
I used my polish plaintext and encrypted it using these trhee algorithms.
304304

0 commit comments

Comments
 (0)