Skip to content
Saturday, February 14, 2026
  • Code stuffs
  • Facebook
  • Twitter
  • Linkedin
  • Youtube
  • Github
  • Instagram

Explore with me!

Come and explore with me

  • Code stuffs
    • Git
    • C#
    • node.js
    • Python
    • Shell
    • VB
  • Blog Series
  • Marketplaces
    • NPM
    • Nuget
    • VS Code
    • Powershell
  • Lets Learn
  • Devops
    • Kubernetes
    • CI/CD
    • Docker
  • Architecture
    • UML
    • System Design
  • Cloud
  • Myself
>>
  • Home
  • Default
  • Page 9

Category: Default

Kerberos
Default

Kerberos

June 29, 2011September 20, 2018

The kerberos provides a secure, single-sign-on, trusted, third party mutual authentication service.  Kerberos is secure since it never transmits passwords over the network in clear.

Read More

Share
Digital Signatures
Default

Digital Signatures

June 8, 2011September 20, 2018

Digital Signatures : A digital signature is used to authenticate the identity of the sender to the receiver to a limited extent in order to

Read More

Share
What is Steganography?
Default

What is Steganography?

June 4, 2011September 20, 2018

Basically, Steganography means of transmitting the message by hiding in any file like pictures, music, movies, or any file without changing the original file format.

Read More

Share
You need to hack!
Default

You need to hack!

June 3, 2011September 20, 2018

Do you think “Why is it important?” The answer is yes it is very important because to catch a thief you must think like thief.

Read More

Share
Default

Algorithms and strengths

June 2, 2011September 20, 2018

Cryptographic Algorithm Symmetric key Data Encryption Standard ( DES ) International Data Encryption Algorithm ( IDEA ) Rjindael (AES Standard ) Skipjack (used in ciphership

Read More

Share
Default

Cryptography

May 30, 2011September 20, 2018

Some terms related to cryptography : Cryptography : It is the study of the mathematics techniques for all aspects of the information security. Cryptanalysis is

Read More

Share
Default

Getting close to BIOS

May 28, 2011May 14, 2023

BIOS : Bios is a term that stands for the Basic Input / Output System. It consists of the low-level software that controls the system

Read More

Share
Default

Different types of viruses:

May 26, 2011May 14, 2023

File infector virus: Most common form of the computer virus is the file infector virus, that hides its code within the code of the another

Read More

Share
Default

Virus

May 26, 2011

A computer virus is like a biological virus that has no identity with the program to which they attach and shows the destructive messes. It

Read More

Share
Default

The cd-rom ejecting code in vb script….

May 22, 2011

Its the prank program that makes no effect with the computer hardware and software. It is just the irritating program that irritates the computer by

Read More

Share

Posts pagination

Previous 1 … 8 9

Recent Posts

  • Azure AI Foundry Agentic AI: Enterprise Business Automation Revolution (Part 1 of 8)
  • Real-World Case Studies: Enterprise AI Agents Delivering Production ROI
  • Security and Threat Mitigation for Enterprise AI Agents
  • Integration with Existing Enterprise Systems for AI Agents
  • Monitoring, Observability and Governance Frameworks for Enterprise AI Agents

Post Tabbed

  • You may like
  • Recent Posts
  • windows

    BranchCache: WAN Bandwidth Optimization

    December 30, 2012
  • Information Systems Software Engineering Project Management

    Stakeholders, The Players of an Information System

    May 1, 2021September 3, 2025
  • Default

    Shutdown button in windows 8

    December 30, 2012
  • Software Engineering

    Ethical Issues related to Information Technology Professionals

    January 24, 2013April 17, 2021
  • Business Automation AI Azure Enterprise Architecture

    Azure AI Foundry Agentic AI: Enterprise Business Automation Revolution (Part 1 of 8)

    February 14, 2026February 8, 2026
  • AI Case Studies Enterprise Technology Agentic AI

    Real-World Case Studies: Enterprise AI Agents Delivering Production ROI

    February 13, 2026February 5, 2026
  • Enterprise Technology Agentic AI AI Cybersecurity Security

    Security and Threat Mitigation for Enterprise AI Agents

    February 12, 2026February 5, 2026
  • AI Enterprise Technology Agentic AI System Integration

    Integration with Existing Enterprise Systems for AI Agents

    February 11, 2026February 5, 2026

Find Me

Software Engineer | Devops | AI Enthusiasts | IOT Enthusiasts | Love doing Research | Trainer | Learner | Friend | Son | Husband | Brother | Father of a beautiful Angel

  • facebook
  • twitter
  • linkedin
  • instagram

Featured Posts

Enterprise Technology AI Agentic AI Devops Kubernetes

Production Deployment Strategies for AI Agents at Scale

February 9, 2026February 5, 2026
Building autonomous AI agents in development environments represents only half the challenge. Production deployment demands
  • Tutorial Devops Kubernetes Docker

    How to Setup Kubernetes Dashboard on Docker Desktop – Complete Guide

    October 6, 2025October 6, 2025
  • kubernetes
    Default Devops Kubernetes

    Kubernetes : an Orchestration and Management Infrastructure for Containers

    June 29, 2021May 14, 2023

You May Have Missed

Health Mental Health Developer Wellness Support Systems Professional Development

The Complete Picture: Balancing Professional and Personal Support Systems

November 20, 2025October 24, 2025
Developer Wellness Family Support Mental Health Relationships

For Parents, Partners, and Friends: A Guide to Supporting Your Loved One in Tech

November 19, 2025October 23, 2025
Mental Health Developer Wellness Workplace Rights HR Policies

The HR Conversation: When and How to Involve HR in Your Mental Health Journey

November 18, 2025October 23, 2025
Mental Health Developer Wellness Tech Culture Support Systems

Finding Your Tech Tribe: The Power of Peer Support Groups

November 17, 2025October 23, 2025
All Rights Reserved 2025.