Everyone wants what's easiest, no matter the cost. Most people nowadays can be sneaky and slimy when trying to get what they desire most; people getting stepped on in the process doesn't matter. But sometimes, being sneaky isn't always a bad thing. In fact, it can be quite clever. For example, back in the day, the military used codes to get messages across without being intercepted. Two examples of codes used were cryptography and stenography. Cryptography were codes completely numbered and different, while stenography was a blatant message, but just hidden.
In IST 195 class we learned all about cryptography. In its basic form, it is the process of encoding and decoding information so that its contents can be hidden. It relies on algorithms that use “keys” to encrypt and decrypt the information. Asymmetric, or public key cryptography uses a system of two keys where one of the keys may be freely revealed.
While it is an intriguing process with plenty of uses on the web, it does not really have a place within my website. "Rent-a-cat" is fairly open and does not need to be encrypted or filled with any type of hidden message. The contents of the website remain open to all viewers who sign into the page, and there is no need for any type of block, or hidden code, within the site.