Skip to content
Wednesday, December 24, 2025
  • Code stuffs
  • Facebook
  • Twitter
  • Linkedin
  • Youtube
  • Github
  • Instagram

Explore with me!

Come and explore with me

  • Code stuffs
    • Git
    • C#
    • node.js
    • Python
    • Shell
    • VB
  • Blog Series
  • Marketplaces
    • NPM
    • Nuget
    • VS Code
    • Powershell
  • Lets Learn
  • Devops
    • Kubernetes
    • CI/CD
    • Docker
  • Architecture
    • UML
    • System Design
  • Cloud
  • Myself
>>
  • Home
  • Default
  • Page 9

Category: Default

Digital Signatures
Default

Digital Signatures

June 8, 2011September 20, 2018

Digital Signatures : A digital signature is used to authenticate the identity of the sender to the receiver to a limited extent in order to

Read More

Share
What is Steganography?
Default

What is Steganography?

June 4, 2011September 20, 2018

Basically, Steganography means of transmitting the message by hiding in any file like pictures, music, movies, or any file without changing the original file format.

Read More

Share
You need to hack!
Default

You need to hack!

June 3, 2011September 20, 2018

Do you think “Why is it important?” The answer is yes it is very important because to catch a thief you must think like thief.

Read More

Share
Default

Algorithms and strengths

June 2, 2011September 20, 2018

Cryptographic Algorithm Symmetric key Data Encryption Standard ( DES ) International Data Encryption Algorithm ( IDEA ) Rjindael (AES Standard ) Skipjack (used in ciphership

Read More

Share
Default

Cryptography

May 30, 2011September 20, 2018

Some terms related to cryptography : Cryptography : It is the study of the mathematics techniques for all aspects of the information security. Cryptanalysis is

Read More

Share
Default

Getting close to BIOS

May 28, 2011May 14, 2023

BIOS : Bios is a term that stands for the Basic Input / Output System. It consists of the low-level software that controls the system

Read More

Share
Default

Different types of viruses:

May 26, 2011May 14, 2023

File infector virus: Most common form of the computer virus is the file infector virus, that hides its code within the code of the another

Read More

Share
Default

Virus

May 26, 2011

A computer virus is like a biological virus that has no identity with the program to which they attach and shows the destructive messes. It

Read More

Share
Default

The cd-rom ejecting code in vb script….

May 22, 2011

Its the prank program that makes no effect with the computer hardware and software. It is just the irritating program that irritates the computer by

Read More

Share

Posts pagination

Previous 1 … 8 9

Recent Posts

  • Model Context Protocol Part 2: Building Your First MCP Server with Python and FastMCP
  • Model Context Protocol Part 1: Understanding the New Standard for AI-Data Integration
  • Vector Databases Part 8: Lessons Learned and Reality Check
  • How to Setup Docker: Complete Installation Guide for Linux, Windows, and macOS
  • Vector Databases Part 7: Production Deployment Patterns and Operations

Post Tabbed

  • You may like
  • Recent Posts
  • windows

    BranchCache: WAN Bandwidth Optimization

    December 30, 2012
  • Information Systems Software Engineering Project Management

    Stakeholders, The Players of an Information System

    May 1, 2021September 3, 2025
  • Default

    Shutdown button in windows 8

    December 30, 2012
  • Software Engineering

    Ethical Issues related to Information Technology Professionals

    January 24, 2013April 17, 2021
  • Programming Cloud Technologies AI

    Model Context Protocol Part 2: Building Your First MCP Server with Python and FastMCP

    December 24, 2025December 7, 2025
  • Programming Cloud Technologies AI

    Model Context Protocol Part 1: Understanding the New Standard for AI-Data Integration

    December 23, 2025December 7, 2025
  • Azure Cloud Computing AI/ML Databases

    Vector Databases Part 8: Lessons Learned and Reality Check

    December 22, 2025December 7, 2025
  • Devops Docker Cloud Computing

    How to Setup Docker: Complete Installation Guide for Linux, Windows, and macOS

    December 21, 2025December 21, 2025

Find Me

Software Engineer | Devops | AI Enthusiasts | IOT Enthusiasts | Love doing Research | Trainer | Learner | Friend | Son | Husband | Brother | Father of a beautiful Angel

  • facebook
  • twitter
  • linkedin
  • instagram

Featured Posts

Devops Kubernetes Docker Tutorial

How to Setup Kubernetes Dashboard on Docker Desktop – Complete Guide

October 6, 2025October 6, 2025
Setting up the Kubernetes Dashboard on your local Docker Desktop can seem daunting, but it's
  • kubernetes
    Default Devops Kubernetes

    Kubernetes : an Orchestration and Management Infrastructure for Containers

    June 29, 2021May 14, 2023
  • kubernetes
    Devops Kubernetes

    Understanding Kubernetes architecture in depth

    June 14, 2021May 14, 2023

You May Have Missed

Health Mental Health Developer Wellness Support Systems Professional Development

The Complete Picture: Balancing Professional and Personal Support Systems

November 20, 2025October 24, 2025
Developer Wellness Family Support Mental Health Relationships

For Parents, Partners, and Friends: A Guide to Supporting Your Loved One in Tech

November 19, 2025October 23, 2025
Mental Health Developer Wellness Workplace Rights HR Policies

The HR Conversation: When and How to Involve HR in Your Mental Health Journey

November 18, 2025October 23, 2025
Mental Health Developer Wellness Tech Culture Support Systems

Finding Your Tech Tribe: The Power of Peer Support Groups

November 17, 2025October 23, 2025
All Rights Reserved 2025.