A Brief History of C++

A Brief History of C++

Nowadays computers are able to perform many different tasks, from simple mathematical operations to sophisticated animated simulations. But the computer does not create these tasks by itself; these are performed following a series of predefined instructions called computer languages. A computer language is a set of instructions and a series …

MitM

Man-in-the-Middle (MitM)

Intercepting and Redirecting Genuine Web Sites Traffic Man-it-the-Middle attack uses proxy servers, DNS poisoning and local Hosts file tampering to intercept and redirect end user traffic to fake sites. Fraudsters use MitM tactics to capture login credentials and other sensitive data and tamper with transactions in real-time. MitM attacks can be …

bigdata-larger-pane_0

Big Data Analytics

Big data analytics refers to the process of collecting, organizing and analyzing large sets of data (“big data”) to discover patterns and other useful information. Big data analytics will help organizations to better understand the information contained within the data and will also help identify the data that is most …

nobody-listens3

Side Channel Attacks on Cryptographic Software

When it comes to cryptographic software, side channels are an often-overlooked threat. A side channel is any observable side effect of computation that an attacker could measure and possibly influence. Crypto is especially vulnerable to side channel attacks because of its strict requirements for absolute secrecy. In the software world, side …

cookie_2

Cookies and Security

Cookies would seem to have all the security they need by virtue of the domain, path, andsecure options, but the nature of web pages complicates the matter significantly. User logins and session hijacking One of the most common uses for cookies is to track user login state. The mechanism is quite simple: you …

SoftwareArchitect

What I Do As A Software Architect

With thousands of factors to consider when designing and coding software, someone has to provide overall direction when teams are working on multiple apps for multiple clients. That code wrangler is the software architect, who guides projects from concepts to working products. To learn what it means to be a …

DMZ

DMZ (demilitarized zone)

In computer networks, a DMZ (demilitarized zone) is a computer host or small network inserted as a “neutral zone” between a company’s …

BFSGraph

Breadth First Search in C++

Breadth First Search in C++ – Algorithm and Source Code Basic Theory Breadth – first searches are performed by exploring all nodes …

hash-collision

Collision

Collision or clash is a situation that occurs when two distinct pieces of data have the same hash value, checksum, fingerprint, or cryptographic digest. Collisions are unavoidable whenever members of a …

Function in WHERE clause

Function in WHERE clause

  Introduction When we are using the function in the SELECT statement it returns data depends on the number of records retrieve …

vicheatsheet

Basic vi Commands

General Startup To use vi: vi filename To exit vi and save changes: ZZ or :wq or : x To exit vi …