encryption1

5 Encryption Errors Developers Keep Making

If there is one technology that can alleviate the impact of security breaches, it’s encryption — but you have to do it right Encryption should be at the heart of every product or service that stores any kind of customer data. Several other security measures are necessary too, but when they …

StringConcat

String Vs StringBuilder

Most of the people use string everywhere in their code. Actually when doing string concatenation, do you know what exactly you are doing? It has a big drawback mainly in concatenation which can be overcome by StringBuilder. It will give a vast improvement in performance when you use concatenation of …

A Brief History of C++

A Brief History of C++

Nowadays computers are able to perform many different tasks, from simple mathematical operations to sophisticated animated simulations. But the computer does not create these tasks by itself; these are performed following a series of predefined instructions called computer languages. A computer language is a set of instructions and a series …

MitM

Man-in-the-Middle (MitM)

Intercepting and Redirecting Genuine Web Sites Traffic Man-it-the-Middle attack uses proxy servers, DNS poisoning and local Hosts file tampering to intercept and redirect end user traffic to fake sites. Fraudsters use MitM tactics to capture login credentials and other sensitive data and tamper with transactions in real-time. MitM attacks can be …

bigdata-larger-pane_0

Big Data Analytics

Big data analytics refers to the process of collecting, organizing and analyzing large sets of data (“big data”) to discover patterns and other useful information. Big data analytics will help organizations to better understand the information contained within the data and will also help identify the data that is most …

nobody-listens3

Side Channel Attacks on Cryptographic Software

When it comes to cryptographic software, side channels are an often-overlooked threat. A side channel is any observable side effect of computation that an attacker could measure and possibly influence. Crypto is especially vulnerable to side channel attacks because of its strict requirements for absolute secrecy. In the software world, side …

cookie_2

Cookies and Security

Cookies would seem to have all the security they need by virtue of the domain, path, andsecure options, but the nature of web pages complicates …

SoftwareArchitect

What I Do As A Software Architect

With thousands of factors to consider when designing and coding software, someone has to provide overall direction when teams are working on …

DMZ

DMZ (demilitarized zone)

In computer networks, a DMZ (demilitarized zone) is a computer host or small network inserted as a “neutral zone” between a company’s …

BFSGraph

Breadth First Search in C++

Breadth First Search in C++ – Algorithm and Source Code Basic Theory Breadth – first searches are performed by exploring all nodes …

hash-collision

Collision

Collision or clash is a situation that occurs when two distinct pieces of data have the same hash value, checksum, fingerprint, or cryptographic digest. Collisions are unavoidable whenever members of a …