Tag Archives: Network-security

RC4 is a symmetric stream cipher and variable key length algorithm. This symmetric key algorithm is used identically for encryption and decryption such that the… Read More
An SSL certificate is a Digital certificate that can be used for authentication of a website, and we can create a secured connection between client… Read More
Digital Signature : As the name sounds are the new alternative to sign a document digitally. It ensures that the message is sent by the… Read More
Secure Shell : Secure Shell is designed to be very simple and cost-effective for secure network communications. SSH Client and server applications are widely available… Read More
Race condition occurs when multiple threads read and write the same variable i.e. they have access to some shared data and they try to change… Read More
1. Lightweight Directory Access Protocol (LDAP) : LDAP stands for Lightweight Directory Access Protocol. It is a protocol that’s used for locating anyone to locate… Read More
The past few years have been filled with shocks for the IT industry. The wave of global ransomware attacks that struck from 2017 to 2019… Read More
Privacy, Data Privacy, Digital Privacy, Social Media Privacy, privacy from trackers, privacy from government, All these things have became very important these days. One of… Read More
Spam is generally the unwanted bulk emails that come up from unsolicited sources. Spams are basically sent in huge numbers for commercial advertising. In this… Read More
Cyber Security is procedure and strategy associated with ensuring touchy information, PC frameworks, systems, and programming applications from digital assaults. Cyber assaults are general phrasing… Read More
In stream cipher, one byte is encrypted at a time while in block cipher ~128 bits are encrypted at a time. Initially, a key(k) will… Read More
Block ciphers are built in the Feistel cipher structure. Block cipher has a specific number of rounds and keys for generating ciphertext. For defining the… Read More
The growing demand for the CyberSecurity domain in the tech world has increased the need for cybersecurity professionals in the industry, giving rise to various… Read More
1. Worms : Worms is similar to virus but it does not modify the program. It replicate itself more and more to cause slow down… Read More
1. Virus : A virus is a malicious executable code attached to another executable file which can be harmless or can modify or delete data.… Read More