Skip to content

Category Archives: Blogathon

This article intends to make you all aware of the security and compliance aspects of Amazon DynamoDB. Amazon DynamoDB is another database service by AWS… Read More
In this article, we will look into some of the important concepts related to iterables in Dart.  1. Indexing with [ ] operator is invalid:… Read More
While writing a program a programmer needs to check for various conditions, if the condition is true then a particular block of statement/s are executed,… Read More
Microsoft Store is a very useful application for a windows user for adding new apps into the system.  In this article, we will look into… Read More
Matploptib is a low-level library of Python which is used for data visualization. It is easy to use and emulates MATLAB like graphs and visualization.… Read More
Seaborn is a library mostly used for statistical plotting in Python. It is built on top of Matplotlib and provides beautiful default styles and color… Read More
Overview :E-commerce is the evolution in technology, the buying and selling feature online not only have shown growth in the online business but also allows… Read More
In this article, let us know the major distinguishability between WAF(Web Application Firewall) and Firewall in a clean way.  Web Application Firewall(WAF) :A Web Application… Read More
Overview :It is the encrypted online content that is not indexed by conventional search engine. It is also called dark net. It is the part… Read More
Overview :Switch is a network device, which is configured to connect and maintain communication channel between various devices. Ethernet ports are present on a switch,… Read More
Machine Independent code optimization tries to make the intermediate code more efficient by transforming a section of code that doesn’t involve hardware components like CPU… Read More
In this article we will try to understand the details associated with the DMA (Direct Memory Access) like what exactly DMA is or how it… Read More
What is hashing?Hashing is the process of converting any kind of data (usually passwords or installer files) into a fixed-length string. There are multiple types… Read More
In this article, we will learn about DDoS mitigation and how it attacks. DDoS mitigation refers to the process of securing and protecting a server… Read More
DNS Amplification Attack :In this article, we will learn about the DNS Amplification Attack and how it can be prevented. A DNS (domain name system)… Read More