Skip to content
Tuesday, August 26, 2025
  • Code stuffs
  • Facebook
  • Twitter
  • Linkedin
  • Youtube
  • Github
  • Instagram

Explore with me!

Come and explore with me

  • Code stuffs
    • Git
    • C#
    • node.js
    • Python
    • Shell
    • VB
  • Blog Series
  • Lets Learn
  • Devops
    • Kubernetes
    • CI/CD
    • Docker
  • Cloud
  • Tweaks
  • Myself
  • Deployed
    • Azure Static Website
You are Here
  • Home
  • Default
  • Page 7

Category: Default

Default

Best library for socket programming

February 12, 2012September 20, 2018

Although there are lots of socket library for socket programming. But in general I try to prefer WS2_32.lib which is present in every IDE. Either

Read More

Server and Client
Default

Server and Client

February 11, 2012September 20, 2018

Basically if we talk about the Server and Client, most of us think that it is more complex terms. But in fact, it is easier

Read More

Socket Programming
Default

Socket Programming

February 9, 2012September 20, 2018

If i ask you what is socket programming? what would you reply….. think of it…. Is this a new type of programming language?  No, exactly

Read More

MSP Applicants Interaction Program – Day 3
Default

MSP Applicants Interaction Program – Day 3

August 11, 2011September 20, 2018

We firstly learnt to set video file as desktop background. This can be done by ‘Windows 7 DreamScene Activator’ application. To set a video as

Read More

The Amazing Windows Se7en
Default

The Amazing Windows Se7en

August 11, 2011September 20, 2018

Guys, which is your favorite operating system? If anyone asked me this very question a week before, I would rather say,(scratching my head) “Umm, actually

Read More

MSP:The Quest For Who You Are!
Default

MSP:The Quest For Who You Are!

August 6, 2011September 20, 2018

The MSP stood for Microsoft Student Partner. It is not that the acronym does not have a meaning now. It was there in my campus

Read More

Kerberos
Default

Kerberos

June 29, 2011September 20, 2018

The kerberos provides a secure, single-sign-on, trusted, third party mutual authentication service.  Kerberos is secure since it never transmits passwords over the network in clear.

Read More

Digital Signatures
Default

Digital Signatures

June 8, 2011September 20, 2018

Digital Signatures : A digital signature is used to authenticate the identity of the sender to the receiver to a limited extent in order to

Read More

What is Steganography?
Default

What is Steganography?

June 4, 2011September 20, 2018

Basically, Steganography means of transmitting the message by hiding in any file like pictures, music, movies, or any file without changing the original file format.

Read More

You need to hack!
Default

You need to hack!

June 3, 2011September 20, 2018

Do you think “Why is it important?” The answer is yes it is very important because to catch a thief you must think like thief.

Read More

Posts pagination

Previous 1 … 6 7 8 Next

Recent Posts

  • Zero-Trust Architecture with Azure AD: Part 7 – Enterprise Integration & Advanced Scenarios
  • Zero-Trust Architecture with Azure AD: Part 6 – Monitoring, Analytics & Continuous Improvement
  • Zero-Trust Architecture with Azure AD: Part 5 – Device Management & Compliance
  • Zero-Trust Architecture with Azure AD: Part 4 – Advanced Risk Management
  • Zero-Trust Architecture with Azure AD: Part 3 – Conditional Access Policies – Core Implementation

Post Tabbed

  • You may like
  • Recent Posts
  • windows

    BranchCache: WAN Bandwidth Optimization

    December 30, 2012
  • Software Engineering

    Stakeholders, The Players of an Information System

    May 1, 2021May 19, 2023
  • Default

    Shutdown button in windows 8

    December 30, 2012
  • Software Engineering

    Ethical Issues related to Information Technology Professionals

    January 24, 2013April 17, 2021
  • Azure Zero Trust Enterprise Integration Advanced Scenarios Privileged Access

    Zero-Trust Architecture with Azure AD: Part 7 – Enterprise Integration & Advanced Scenarios

    August 23, 2025August 23, 2025
  • Zero Trust Security Operations Azure Analytics Monitoring

    Zero-Trust Architecture with Azure AD: Part 6 – Monitoring, Analytics & Continuous Improvement

    August 23, 2025August 23, 2025
  • Azure Compliance Zero Trust Device Management Intune Endpoint Security

    Zero-Trust Architecture with Azure AD: Part 5 – Device Management & Compliance

    August 23, 2025August 23, 2025
  • Azure Cybersecurity Zero Trust Risk Management Identity Protection

    Zero-Trust Architecture with Azure AD: Part 4 – Advanced Risk Management

    August 23, 2025August 23, 2025

Find Me

Software Engineer | Devops | AI Enthusiasts | IOT Enthusiasts | Love doing Research | Trainer | Learner | Friend | Son | Husband | Brother | Father of a beautiful Angel

  • facebook
  • twitter
  • linkedin
  • instagram

Featured Posts

kubernetes
Default Devops Kubernetes

Kubernetes : an Orchestration and Management Infrastructure for Containers

June 29, 2021May 14, 2023
Introduction to Kubernetes Docker was responsible for introducing developers to the concept of container-based applications.
  • kubernetes
    Devops Kubernetes

    Understanding Kubernetes architecture in depth

    June 14, 2021May 14, 2023
  • kubernetes
    Default Kubernetes

    Understanding Pods in Kubernetes

    June 10, 2021May 14, 2023

You May Have Missed

c#
Default Code stuffs Tweaks C#

Runtime Compile C# Code

July 24, 2021July 5, 2022
c#
Tweaks C# Code stuffs

Lets Create a Null Checking Extension on C#

June 26, 2021May 14, 2023
c#
Tweaks C#

How to encrypt and decrypt using cryptography (AES)?

June 14, 2021July 8, 2022
Default Tweaks

How to auto-generate unique-identifier column in Sql?

May 25, 2021May 14, 2023
All Rights Reserved 2024.
Proudly powered by WordPress | Theme: Refined Magazine Pro by Candid Themes.