Introduction To Cryptography

Cryptography

Cryptography is the science of providing security for information. It has been used historically as a means of providing secure communication between individuals, government agencies, and military forces. Today, cryptography is a cornerstone of the modern security technologies used to protect information and resources on both open and closed networks.

Read More

Password Cracking

is a process used to identify an unknown or a forgotten password. It can be used be crackers to gain an unauthorized access to resources. Password cracking uses two primary methods to identify passwords.

Read More

Google Operators

Google hacking is the term used when a hacker tries to find exploitable targets and sensitive data by using search engines. The Google Hacking Database (GHDB) is a database of queries that identify sensitive data. source

Read More

Introduction to c programming

C (programming language)

is a general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations. By design, C provides constructs that map efficiently to typical machine instructions, and therefore it has found lasting use in applications that had formerly been coded in assembly language, including operating systems, as well as various application software for computers ranging from supercomputers to embedded systems. [source]: https://en.wikipedia.org/wiki/C_(programming_language)

Read More

Hello World (C programming)

Welcome to C (an advice that you don’t have to read)

Working with C programming could be overwhelming for beginners. and that is because C is a low level programming language that requires a good understanding for the way that computers work, process and store data. I would personally recommend that you start with

Read More

The Difference Between Viruses, Worms and Trojans

Viruses, worms and trojans are all malware. A ‘Malware’ is a malicious software or script that infect your computer and comes in different forms, Although, they are all malware, they attack and spread differently and have different affects on your device. In this article i will focus mainly on the difference between viruses, worms and trojans.

Read More

Understanding AngularJS scope.$watch

$scope.$watch in angular is for listening for scope changes; for-example, if you have a contact form and want to show instance error message for the user when he/she enters invalid format, you will need to listen for the changes made on the form to check for the validity of the changes.

Read More