I slept a lot, but it looks like the quality was not good.
Today I will take it easy.
I will try to create a virtual machine for my server recovery account. I still do not know how to manage it. As the cybersecurity teacher said, first of all I have to decide what I want to do.
Schneier's book is interesting, but I am afraid that since it was produced in 2018, it is a little bit old.
---------------- Simulation Summary ---------------- Generation: 77 Final Population: 27 alive cells Execution Time: 0.002 seconds Status: Oscillation ----------------------------------------------------
+---[RSA 3072]----+ | .. o.++o.o | | o.. +.*.+.. = | | .B.= Eo*.. o = | |. oO = +o+ . O | |o=+.* o.S.+ + +o.| |B=.+...ooo ....o=| |++ ...o.ooo o*o.| |+ .. o.*+oO+..| | . +*X*+*. | +------[MD5]------+