
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Sudhir sharma has Published 1149 Articles

sudhir sharma
643 Views
In today's world, the internet has become an integral part of our daily lives. With its growing popularity, it's crucial to safeguard our online activities from potential threats. One of the most effective ways to achieve this is by using a proxy server. To start, let's define what a proxy ... Read More

sudhir sharma
2K+ Views
If you want to save money on your phone bills, setting up a VoIP phone at home is a great alternative. VoIP, or Voice over Internet Protocol, is a technology that enables phone conversations to be made over the internet. Not only is VoIP cheaper than traditional phone services, but ... Read More

sudhir sharma
354 Views
We all rely extensively on the internet for our daily activities in today's digital world. We all utilise numerous websites and programmes to do these duties, whether it's online shopping, social networking, or internet banking. While the internet has made our lives easier, it has also introduced new vulnerabilities like ... Read More

sudhir sharma
1K+ Views
Traceroute is a robust network diagnostic tool that assists you in analysing network performance and diagnosing network issues. You may map out the path that your network traffic travels from your computer to a remote server using traceroute, and find any bottlenecks or other difficulties along the way. Recognizing Traceroute ... Read More

sudhir sharma
530 Views
Ransomware is a type of malware that has been a growing threat to individuals, organizations, and governments worldwide. Ransomware encrypts the victim's files and demands a ransom in exchange for the decryption key. The ransom can be a significant amount of money, and paying it does not guarantee the recovery ... Read More

sudhir sharma
1K+ Views
As more and more services move online, the importance of access control becomes increasingly clear. Access control refers to the processes that limit the ability of unauthorized individuals or entities to access resources, whether those resources are software, data, or physical spaces. Broken access control is one of the most ... Read More

sudhir sharma
1K+ Views
PeStudio is a popular and powerful software analysis tool that allows users to analyze executable files for various Windows operating systems. The software was developed by the Belgian company, Marc Ochsenmeier, and is widely used by malware analysts, software developers, and security researchers around the world. We will provide an ... Read More

sudhir sharma
944 Views
Fibre Channel Protocol (FCP) is a communication protocol designed to provide fast and dependable data transfers between servers and storage devices in storage area networks (SANs). History of FCP FCP was first introduced in the early 1990s as a outcome of a deal between the tech giants among IBM, HP, ... Read More

sudhir sharma
1K+ Views
A network hub is a common networking device that allows multiple devices to communicate with each other. Hubs are used in local area networks (LANs) to connect devices together, such as computers, printers, and servers. This article will explore the basics of network hubs, including how they work, the different ... Read More

sudhir sharma
7K+ Views
Radio broadcasting has come a long way since its inception over a century ago. From analog to digital, radio broadcasting has evolved to provide listeners with high-quality audio that can be received on a variety of devices. One of the latest advances in radio broadcasting is Digital Audio Broadcasting (DAB), ... Read More