Cybersecurity Educational Demonstration

1. Password Hashing Concept

Try typing a password to see how it might be hashed using SHA-256. In a real system, this would happen on the server side using secure algorithms like bcrypt or Argon2.

Note: This uses the browser's crypto API to simulate hashing on the client side. In practice, never hash passwords in the browser for authentication.

2. IoT Traffic Sniffing Awareness

Many IoT devices like IP cameras send video using MJPEG over HTTP. If unencrypted, this traffic can be intercepted by attackers.

This shows how an MJPEG stream might appear. Without TLS, anyone on the network can read this.

3. Summary