Skip to content
Saturday, October 18, 2025
  • Code stuffs
  • Facebook
  • Twitter
  • Linkedin
  • Youtube
  • Github
  • Instagram

Explore with me!

Come and explore with me

  • Code stuffs
    • Git
    • C#
    • node.js
    • Python
    • Shell
    • VB
  • Blog Series
  • Marketplaces
    • NPM
    • Nuget
    • VS Code
    • Powershell
  • Lets Learn
  • Devops
    • Kubernetes
    • CI/CD
    • Docker
  • Architecture
    • UML
    • System Design
  • Cloud
  • Myself
>>
  • Home
  • author
  • Chandan
  • Page 40

Author: Chandan

Digital Signatures
Default

Digital Signatures

June 8, 2011September 20, 2018

Digital Signatures : A digital signature is used to authenticate the identity of the sender to the receiver to a limited extent in order to

Read More

Share
What is Steganography?
Default

What is Steganography?

June 4, 2011September 20, 2018

Basically, Steganography means of transmitting the message by hiding in any file like pictures, music, movies, or any file without changing the original file format.

Read More

Share
You need to hack!
Default

You need to hack!

June 3, 2011September 20, 2018

Do you think “Why is it important?” The answer is yes it is very important because to catch a thief you must think like thief.

Read More

Share
Default

Algorithms and strengths

June 2, 2011September 20, 2018

Cryptographic Algorithm Symmetric key Data Encryption Standard ( DES ) International Data Encryption Algorithm ( IDEA ) Rjindael (AES Standard ) Skipjack (used in ciphership

Read More

Share
Default

Cryptography

May 30, 2011September 20, 2018

Some terms related to cryptography : Cryptography : It is the study of the mathematics techniques for all aspects of the information security. Cryptanalysis is

Read More

Share
Default

Getting close to BIOS

May 28, 2011May 14, 2023

BIOS : Bios is a term that stands for the Basic Input / Output System. It consists of the low-level software that controls the system

Read More

Share
Default

Different types of viruses:

May 26, 2011May 14, 2023

File infector virus: Most common form of the computer virus is the file infector virus, that hides its code within the code of the another

Read More

Share
Default

Virus

May 26, 2011

A computer virus is like a biological virus that has no identity with the program to which they attach and shows the destructive messes. It

Read More

Share
Default

The cd-rom ejecting code in vb script….

May 22, 2011

Its the prank program that makes no effect with the computer hardware and software. It is just the irritating program that irritates the computer by

Read More

Share

Posts pagination

Previous 1 … 39 40

Recent Posts

  • Sequelize with PostgreSQL in Node.js: Part 4 – Production Ready Patterns
  • Sequelize with PostgreSQL in Node.js: Part 3 – CRUD Operations and Services
  • The Perfectionist’s Prison: When Good Code Isn’t Good Enough
  • Why I Built CV Forge: The Story Behind My Obsession with Tailored CVs
  • Sequelize with PostgreSQL in Node.js: Part 2 – Models and Migrations

Post Tabbed

  • You may like
  • Recent Posts
  • windows

    BranchCache: WAN Bandwidth Optimization

    December 30, 2012
  • Information Systems Software Engineering Project Management

    Stakeholders, The Players of an Information System

    May 1, 2021September 3, 2025
  • Default

    Shutdown button in windows 8

    December 30, 2012
  • Software Engineering

    Ethical Issues related to Information Technology Professionals

    January 24, 2013April 17, 2021
  • Backend Development Database node.js

    Sequelize with PostgreSQL in Node.js: Part 4 – Production Ready Patterns

    October 17, 2025October 16, 2025
  • Backend Development Database node.js

    Sequelize with PostgreSQL in Node.js: Part 3 – CRUD Operations and Services

    October 17, 2025October 16, 2025
  • Software Engineering Mental Health

    The Perfectionist’s Prison: When Good Code Isn’t Good Enough

    October 17, 2025October 7, 2025
  • Tools Software Engineering Career Development

    Why I Built CV Forge: The Story Behind My Obsession with Tailored CVs

    October 16, 2025October 16, 2025

Find Me

Software Engineer | Devops | AI Enthusiasts | IOT Enthusiasts | Love doing Research | Trainer | Learner | Friend | Son | Husband | Brother | Father of a beautiful Angel

  • facebook
  • twitter
  • linkedin
  • instagram

Featured Posts

Devops Kubernetes Docker Tutorial

How to Setup Kubernetes Dashboard on Docker Desktop – Complete Guide

October 6, 2025October 6, 2025
Setting up the Kubernetes Dashboard on your local Docker Desktop can seem daunting, but it's
  • kubernetes
    Default Devops Kubernetes

    Kubernetes : an Orchestration and Management Infrastructure for Containers

    June 29, 2021May 14, 2023
  • kubernetes
    Devops Kubernetes

    Understanding Kubernetes architecture in depth

    June 14, 2021May 14, 2023

You May Have Missed

Software Engineering Mental Health

The Perfectionist’s Prison: When Good Code Isn’t Good Enough

October 17, 2025October 7, 2025
Software Engineering Mental Health

The Invisible Leash: Breaking Free from Always-On Culture

October 16, 2025October 7, 2025
Mental Health Opinion Career

A Letter to the Hiring Manager Who Never Saw My Portfolio

October 15, 2025October 16, 2025
Software Engineering Mental Health

Just This Once: How Crunch Culture Became Forever

October 15, 2025October 7, 2025
All Rights Reserved 2025.