Skip to content
Thursday, December 18, 2025
  • Code stuffs
  • Facebook
  • Twitter
  • Linkedin
  • Youtube
  • Github
  • Instagram

Explore with me!

Come and explore with me

  • Code stuffs
    • Git
    • C#
    • node.js
    • Python
    • Shell
    • VB
  • Blog Series
  • Marketplaces
    • NPM
    • Nuget
    • VS Code
    • Powershell
  • Lets Learn
  • Devops
    • Kubernetes
    • CI/CD
    • Docker
  • Architecture
    • UML
    • System Design
  • Cloud
  • Myself
>>
  • Home
  • author
  • Chandan
  • Page 49

Author: Chandan

Kerberos
Default

Kerberos

June 29, 2011September 20, 2018

The kerberos provides a secure, single-sign-on, trusted, third party mutual authentication service.  Kerberos is secure since it never transmits passwords over the network in clear.

Read More

Share
Digital Signatures
Default

Digital Signatures

June 8, 2011September 20, 2018

Digital Signatures : A digital signature is used to authenticate the identity of the sender to the receiver to a limited extent in order to

Read More

Share
What is Steganography?
Default

What is Steganography?

June 4, 2011September 20, 2018

Basically, Steganography means of transmitting the message by hiding in any file like pictures, music, movies, or any file without changing the original file format.

Read More

Share
You need to hack!
Default

You need to hack!

June 3, 2011September 20, 2018

Do you think “Why is it important?” The answer is yes it is very important because to catch a thief you must think like thief.

Read More

Share
Default

Algorithms and strengths

June 2, 2011September 20, 2018

Cryptographic Algorithm Symmetric key Data Encryption Standard ( DES ) International Data Encryption Algorithm ( IDEA ) Rjindael (AES Standard ) Skipjack (used in ciphership

Read More

Share
Default

Cryptography

May 30, 2011September 20, 2018

Some terms related to cryptography : Cryptography : It is the study of the mathematics techniques for all aspects of the information security. Cryptanalysis is

Read More

Share
Default

Getting close to BIOS

May 28, 2011May 14, 2023

BIOS : Bios is a term that stands for the Basic Input / Output System. It consists of the low-level software that controls the system

Read More

Share
Default

Different types of viruses:

May 26, 2011May 14, 2023

File infector virus: Most common form of the computer virus is the file infector virus, that hides its code within the code of the another

Read More

Share
Default

Virus

May 26, 2011

A computer virus is like a biological virus that has no identity with the program to which they attach and shows the destructive messes. It

Read More

Share
Default

The cd-rom ejecting code in vb script….

May 22, 2011

Its the prank program that makes no effect with the computer hardware and software. It is just the irritating program that irritates the computer by

Read More

Share

Posts pagination

Previous 1 … 48 49

Recent Posts

  • Vector Databases: From Hype to Production Reality – Part 4: Building RAG Applications on Azure
  • Vector Databases: From Hype to Production Reality – Part 3: The Vector Database Landscape
  • Vector Databases: From Hype to Production Reality – Part 2: Architecture and Indexing Algorithms
  • TTS Forge: Build Your Custom Voice Cloning Pipeline with XTTS v2
  • Vector Databases: From Hype to Production Reality – Part 1: Understanding Vector Databases

Post Tabbed

  • You may like
  • Recent Posts
  • windows

    BranchCache: WAN Bandwidth Optimization

    December 30, 2012
  • Information Systems Software Engineering Project Management

    Stakeholders, The Players of an Information System

    May 1, 2021September 3, 2025
  • Default

    Shutdown button in windows 8

    December 30, 2012
  • Software Engineering

    Ethical Issues related to Information Technology Professionals

    January 24, 2013April 17, 2021
  • AI/ML Databases Azure Cloud Computing

    Vector Databases: From Hype to Production Reality – Part 4: Building RAG Applications on Azure

    December 18, 2025December 7, 2025
  • Azure Cloud Computing AI/ML Databases

    Vector Databases: From Hype to Production Reality – Part 3: The Vector Database Landscape

    December 17, 2025December 7, 2025
  • Azure Cloud Computing AI/ML Databases

    Vector Databases: From Hype to Production Reality – Part 2: Architecture and Indexing Algorithms

    December 16, 2025December 7, 2025
  • AI Machine Learning Python Open Source

    TTS Forge: Build Your Custom Voice Cloning Pipeline with XTTS v2

    December 15, 2025December 15, 2025

Find Me

Software Engineer | Devops | AI Enthusiasts | IOT Enthusiasts | Love doing Research | Trainer | Learner | Friend | Son | Husband | Brother | Father of a beautiful Angel

  • facebook
  • twitter
  • linkedin
  • instagram

Featured Posts

Devops Kubernetes Docker Tutorial

How to Setup Kubernetes Dashboard on Docker Desktop – Complete Guide

October 6, 2025October 6, 2025
Setting up the Kubernetes Dashboard on your local Docker Desktop can seem daunting, but it's
  • kubernetes
    Default Devops Kubernetes

    Kubernetes : an Orchestration and Management Infrastructure for Containers

    June 29, 2021May 14, 2023
  • kubernetes
    Devops Kubernetes

    Understanding Kubernetes architecture in depth

    June 14, 2021May 14, 2023

You May Have Missed

Health Mental Health Developer Wellness Support Systems Professional Development

The Complete Picture: Balancing Professional and Personal Support Systems

November 20, 2025October 24, 2025
Developer Wellness Family Support Mental Health Relationships

For Parents, Partners, and Friends: A Guide to Supporting Your Loved One in Tech

November 19, 2025October 23, 2025
Mental Health Developer Wellness Workplace Rights HR Policies

The HR Conversation: When and How to Involve HR in Your Mental Health Journey

November 18, 2025October 23, 2025
Mental Health Developer Wellness Tech Culture Support Systems

Finding Your Tech Tribe: The Power of Peer Support Groups

November 17, 2025October 23, 2025
All Rights Reserved 2025.