Security Reference Tables
Quick reference data for security professionals, developers, and privacy-conscious users.
- Password Requirements by Website — Min length, character rules for popular sites
- Hash Algorithm Comparison — MD5, SHA-1, SHA-256, SHA-512
- ASCII Code Reference — Decimal, hex, and character for all 128 ASCII codes
- Special Characters for Passwords — Symbols and compatibility notes
- 2FA Methods Comparison — Security and convenience ratings
- Password Entropy Reference — Entropy by length and character set
- Common Password Patterns to Avoid — Patterns hackers exploit
- Password Manager Comparison — Features, pricing, and platform support
- Encryption Standards Comparison — AES, RSA, ChaCha20, and more
- Major Data Breaches Timeline — History of significant security incidents
- SSL Certificate Types — DV, OV, EV, and Wildcard compared
- Phishing Indicators Checklist — URL red flags and social engineering signs
- VPN Protocols Comparison — WireGuard, OpenVPN, IKEv2, and more
- OAuth vs SAML Comparison — Use cases and implementation differences
- Security Key Comparison — YubiKey, Google Titan, and FIDO2 devices