Technology in Law and Crime

The police have long hoped that technology would ease their most vexing problems. Law enforcement is about keeping society safe. So it is no surprise that as society has changed, so too has law enforcement. New technologies, new methods, and new ideas have brought significant change to the profession. The most important recent innovations in […]

Binary Search

Imaginary situation: “Assume there was a crime incident at some large building. There is a team of police officers who arrived at the crime scene. They are searching and collecting evidence from different parts of the building.” The question, in our context, is not what the crime is! The relation is how will they search? […]

Network Performance

“Sir, I am unable to join the class as my network connectivity is poor!” A very common conversation during these days (ignoring the facts!). So, when you say your network connectivity is poor it does mean to the performance of the network. Why my network connection is slow? What are the factors affecting speed? Let’s […]

Wireshark

From Security to Troubleshooting wireshark has become an indispensable tool in analysis and packet capturing information in computer networking domain. Here’s an article that will help you start using this tool efficiently.

Canary Tokens and Honeypots

“ Alert!! Your system is compromised! ” It is not concerned until there is a loss in the data or private files. Why wait so long? Maybe this interests you if I say this article says about one of the simplest ways to protect your privacy and keep them secured. Track down before it gets […]

Generative Pre-Trained Transformer (GPT3)

Let me start with one of my favorite beginnings. Have you ever thought of “How the world is going to be?” Well, the glimpses of the future have been already released across the globe. We shall get into the details. GPT-3, Generative Pre-trained Transformer 3 developed by OpenAI, is the latest revolution in Artificial Intelligence […]

Quine: The self-replicating code

Ever heard of self-replicating or self-copying programs? Well there are viruses and worms that can self replicate to one system to the other. Without any involvement of external factors these destroy systems by propagating to one device to the other. Why we are reading this? Yes, there is a similarity. Quines are self-replicating codes or […]

Huffman’s Coding Algorithm

Have you ever thought of how your data on Internet is secured? When you send a photo on any platform, it will be compressed, encrypted and transmitted. The image should be transmitted without any loss in pixels or data. So, several algorithms play a major role in these operations. One such algorithm is Huffman coding […]

Dijkstra’s Algorithm

We have seen Prim’s Algorithm for Minimum Spanning Tree. Dijkstra’s Algorithm, also known as Single source Shortest Path, is similar to it but we use it for graphs. When we are provided with a graph and a source vertex, this method is used to find the minimum distance of that particular vertex from the source […]

Getting Along with GCP

I have a Confession to make… Hello!! I didn’t see you there, hahahahaha. Probably because I haven’t posted in like 2 months. I will not try to explain myself here. I know…. We were just about to get started with the main part of the Cloud Computing, but unfortunately I got lost in learning this […]

Transactions in Bitcoin

In one of my previous posts, I had given an overview of how transactions occur. Now I’ll explain how transactions are actually accounted and performed. Parallels with real currency In Bitcoin and other cryptocurrencies forked/derived from it, transactions are accounted in a way similar to how physical currency is accounted for when exchanging for goods […]

DNS Message Format

Similar to HTTP Protocol, DNS protocol also make use of common message format for all query and response exchanges. This could be between client-server or between servers. Message format: Identification:  It is a 16-bit (2 bytes) field that is generated by the client to match the response from the server. It is copied by the […]