Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles on Trending Technologies
Technical articles with clear explanations and examples
What are the ways that unscrupulous people use to access or abuse unprotected computers?
There are many creative ways that unscrupulous people use to access or abuse unprotected computers which are as follows −Remote login − When someone is able to connect to the computer and control it in some form. This can range from being able to view or access the document to actually running code on the computer.Application backdoors − Some programs have unique features that enable for remote access. Others include bugs that supports a backdoor, or hidden access that supports some level of control of the program.SMTP session hijacking − SMTP is the most common approach of sending e-mail over ...
Read MoreWhat is Firewalls in information security?
A firewall can be represented as a specific type of network security device or a software program that monitors and filters incoming and outgoing network traffic based on a represented group of security rules. It facilitates as a barrier between inside private networks and outside sources (such as the public Internet).The objective of a firewall is to enable non-threatening traffic and avoid malicious or unwanted data traffic for securing the computer from viruses and attacks. A firewall is a cybersecurity tool that filters network traffic and supports users block malicious software from accessing the web in infected computers.Firewalls can be ...
Read MoreWhat is Kerberos in information security?
Kerberos is a network authentication protocol designed to support powerful authentication for client/server applications using secret-key cryptography. Kerberos provides the largest level of security to network resources.Kerberos was produced by MIT as a solution to these network security issues. The Kerberos protocol uses powerful cryptography so that a user can prove its identity to a server (and vice versa) across an insecure network connection. After a client and server has used Kerberos to determine their identity, they can also encrypt all of their communications to provide privacy and data integrity as they go about their business.Kerberos is openly accessible from ...
Read MoreHow does the pandas series.ffill() method work?
The pandas series.ffill() method works equal to the series.fillna() with “method = ffill” function or we can say that the series.ffill() is a synonym for the forward fill method.The series.ffill() method replaces the Nan or NA values in the given series object using the forward fill method. The parameters for this method are inplace, axis, limit, and downcast.It does not have parameters like value and method. Because it takes the series element as a replacement value and fills the missing values using the forward fill method.Example 1In this following example, we have applied the ffill() method to the series object ...
Read MoreWhat are the keys used by PGP in information security?
PGP creates use of four types of keys including one-time session symmetric keys, Public keys, Private keys, and Passphrase based symmetric keys.Session key generation − Each session key is related to a single message and is used only for the goals of encryption and decrypting that message. Remind that message encryption/decryption is completed with a symmetric encryption algorithm. Considering that it is a 128 bit key that is needed, the random 128 bit numbers are created using CAST-128.The input to the random number generator include as 128-bit key (this is a random number using the keystroke input from the user) ...
Read MoreLargest BST in a Binary Tree in C++
In a binary tree, there are only two nodes (left and right) in each child node. Tree structures are simply representations of data. Binary Search Trees (BSTs) are special types of Binary Trees that meet these conditions −Compared to its parent, the left child node is smallerThe parent node of the right child is larger than the child nodeSuppose we're given a binary tree, and we are supposed to find out what's the largest binary search tree (BST) within it.In this task, we will create a function to find the largest BST in a binary tree. When the binary tree ...
Read MoreWhat are the services of PGP?
PGP includes the following services which are as follows −Authentication − The hash function used is SHA-1 which makes a 160 bit message digest. EP (DP) defines public encryption (decryption) and the algorithm used can be RSA or DSS.The set of SHA-1 and RSA supports an effective digital signature scheme. Because of the strength of RSA the recipient is guaranteed that only the possessor of the connecting private key can make the signature. Because of the strength of SHA-1 the recipient is guaranteed that no one else can create a new message that connects the hash code and therefore the ...
Read MoreWhat is Hashing in information security?
Hashing is the procedure of translating a given key into a code. A hash function can be used to substitute the data with a newly generated hash code. Hash algorithms are generally used to offer a digital fingerprint of a file’s contents often used to provide that the file has not been changed by an intruder or virus. Hash functions are also employed by some operating systems to encrypt passwords. Hash functions support a measure of the integrity of a file.Hashing creates use of algorithms that convert blocks of information from a file in a much shorter value or key ...
Read MoreEvaluate a 2D Legendre series at points (x, y) with 3D array of coefficient in Python
To evaluate a 2D Legendre series at points x, y, use the polynomial.legendre.legval2d() method in Python Numpy. The method returns the values of the two dimensional Legendre series at points formed from pairs of corresponding values from x and y.The 1st parameter is x, y. The two dimensional series is evaluated at the points (x, y), where x and y must have the same shape. If x or y is a list or tuple, it is first converted to an ndarray, otherwise it is left unchanged and if it isn’t an ndarray it is treated as a scalar.The 2nd parameter ...
Read MoreEvaluate a 2D Legendre series at points (x, y) in Python
To evaluate a 2D Legendre series at points x, y, use the polynomial.legendre.legval2d() method in Python Numpy. The method returns the values of the two dimensional Legendre series at points formed from pairs of corresponding values from x and y.The 1st parameter is x, y. The two dimensional series is evaluated at the points (x, y), where x and y must have the same shape. If x or y is a list or tuple, it is first converted to an ndarray, otherwise it is left unchanged and if it isn’t an ndarray it is treated as a scalar.The 2nd parameter ...
Read More