Hash functions in cryptography takes a message of arbitary length and creates a message digest of fix length. Moreover, we have already seen about cryptography, let us know about hash functions. Firstly, a hash function H...
Category - Cyber Security
Brief note on bitcoin: The one who thinks to install money in the share market always have his mind on the really, can cryptocurrency’s bitcoin lead to growth. Bitcoin is not only the cryptocurrency there are others...
Information Security deals with protection of information against unauthorized access and adding various security measures. Moreover, there are various security objectives. Let’s take a look at them. Information...
Mobile Ad Hoc Network also known as wireless ad hoc network is a network design without any formal structure. Moreover, nodes connecting to the network make configuration dynamic without following pre define top down...
Healthcare has changed tremendously in the past few years, and the progress that’s being made seems straight from the pages of a sci-fic novel. Not too long ago, health records were kept in thick manila folders, and now many...
Suddenly thinking we can’t decide what it is, but the person who is well worse in these topic can decide whether to call it parasitic computing or hacking. These both are the two sides of the same form.one is formal and...
Cyber warfare is the use of digital attacks and cyber attacks against the nation causing significant harm to warfare. Moreover, it causes damage to vital computer systems. United States DOD states that use of computers to...
Distributed Firewalls are resident security software applications that can protect enterprise servers against unwant intrusion. Firstly, it will enforce a network domain security policy through policy language. Secondly, it...
JUST A START: How technology can prevent financial issue, how do it prevent data ,how do it prevent economy these are related to country development. on these bases only development of the country depends. Economy, GDP...
Blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. A blockchain is essentially a digital ledger of transactions that is duplicated and...