ASCII established the foundation for text representation in computers.
Character ranges
- 0-31: Control characters (newline, tab, escape).
- 32-47: Punctuation and symbols (space, !, ", #, $, %, &).
- 48-57: Digits (0-9).
- 58-64: More punctuation (: ; < = > ? @).
- 65-90: Uppercase letters (A-Z).
- 91-96: Brackets and symbols ([ \ ] ^ _ `).
- 97-122: Lowercase letters (a-z).
- 123-127: More symbols ({ | } ~, DEL).
Extended ASCII
- 8-bit encoding (256 characters).
- Includes accented characters and symbols.
- Not standardized (many code pages exist).
Successors
- UTF-8: Backward compatible with ASCII, supports all Unicode.
- UTF-16: Used in Windows and Java.
- Latin-1 (ISO-8859-1): First 256 Unicode characters.
Common uses
- Text files and protocols.
- Programming language source code.
- Network communication.
- Command-line interfaces.
Related Articles
View all articlesPassword Policy Best Practices for Enterprise Security in 2026
Modern password policies have evolved beyond complexity requirements. Learn how to implement passwordless authentication, passkeys, and risk-based policies that improve both security and user experience.
Read article →SOC Alert Triage & Investigation Workflow | Complete Guide
Master the complete SOC alert triage lifecycle with this practical guide covering SIEM alert handling, context enrichment, threat intelligence correlation, MITRE ATT&CK mapping, and incident escalation. Learn industry frameworks from NIST, SANS, and real-world best practices to reduce MTTC by 90% and eliminate alert fatigue.
Read article →Data Breach Response & Notification Workflow | GDPR & HIPAA
Master the complete data breach response workflow from detection to recovery. This comprehensive guide covers GDPR 72-hour notification, HIPAA breach reporting, forensic investigation, regulatory compliance, and customer notification strategies with practical tools and legal frameworks.
Read article →Complete Guide to Unpacking and Deobfuscating Malware
Learn essential techniques for unpacking and deobfuscating malware, from entropy analysis and manual debugging to automated tools and bypassing anti-analysis protections.
Read article →