Canary Tokens and Honeypots

“ Alert!! Your system is compromised! ” It is not concerned until there is a loss in the data or private files. Why wait so long? Maybe this interests you if I say this article says about one of the simplest ways to protect your privacy and keep them secured. Track down before it gets […]

Generative Pre-Trained Transformer (GPT3)

Let me start with one of my favorite beginnings. Have you ever thought of “How the world is going to be?” Well, the glimpses of the future have been already released across the globe. We shall get into the details. GPT-3, Generative Pre-trained Transformer 3 developed by OpenAI, is the latest revolution in Artificial Intelligence […]

Quine: The self-replicating code

Ever heard of self-replicating or self-copying programs? Well there are viruses and worms that can self replicate to one system to the other. Without any involvement of external factors these destroy systems by propagating to one device to the other. Why we are reading this? Yes, there is a similarity. Quines are self-replicating codes or […]

Huffman’s Coding Algorithm

Have you ever thought of how your data on Internet is secured? When you send a photo on any platform, it will be compressed, encrypted and transmitted. The image should be transmitted without any loss in pixels or data. So, several algorithms play a major role in these operations. One such algorithm is Huffman coding […]

Dijkstra’s Algorithm

We have seen Prim’s Algorithm for Minimum Spanning Tree. Dijkstra’s Algorithm, also known as Single source Shortest Path, is similar to it but we use it for graphs. When we are provided with a graph and a source vertex, this method is used to find the minimum distance of that particular vertex from the source […]

DNS Message Format

Similar to HTTP Protocol, DNS protocol also make use of common message format for all query and response exchanges. This could be between client-server or between servers. Message format: Identification:  It is a 16-bit (2 bytes) field that is generated by the client to match the response from the server. It is copied by the […]

DNS (Domain Name System)

From the network protocols earlier, we are aware of what a DNS is. If not, a small recap. DNS is, in simpler words, the phonebook of the Internet. It is known that websites are stored on the servers and they are parsed when the client requests for it. Every website has its unique IP address […]

Linear Search

Linear search or a sequential search is a method used to find an element in a list or an array. It searches for the element sequentially i.e. one after other until the required element is found. Algorithm: Input the no. of elements in which the number has to be searched. Now, read the list of elements. Input the element to search for. Using a loop, search for the element in the list of elements. Exit loop. Stop. Pseudo Code: Code in Java: Time Complexity: Best case: When the […]

Benefits of Offline-compatible Applications

To kickstart with a simple example, how many of us use a dictionary app in our mobiles? I use it for myself. So, if I am bewildered of a word it’s easy for me to refer. The question is does the app uses the Internet? The one which I preferred doesn’t. I preferred it assuming […]

FinTech transforming Banking System

There has been a growth in the technological era. It is transforming the perspective towards the traditional ways of approach. One such technology that changed the custom banking system is FinTech. Let’s dive into the details how FinTech brought the modulations in the financial graphs. FinTech is any organization that toils to provide financial services […]

Kruskal’s Algorithm

Kruskal’s Algorithm is almost similar to Prim’s Algorithm. The difference is that in Prim’s algorithm, the root node chosen is the one having minimum weight but in Kruskal’s algorithm the root vertex is chosen randomly provided the edges are arranged in the ascending order. Here are few steps to follow in finding Minimum Spanning Tree […]

Prim’s Algorithm

Prim’s algorithm is used to find the minimum spanning tree from a graph. It finds the subset of edges that includes every vertex such that the total of the weights of edges should be minimum. How this is done? Will go through the step-by-step procedure! Algorithm: Step 1: From the given graph, remove all loops […]

Basics of Routing Algorithms

If I have to travel from one place to the other, I shall choose the best path both in terms of traffic and type of road. In the same way, the network chooses its path with lesser traffic to deliver the packets. How it is done and why? Let’s have a look. Routing is the […]

HTTP (Hyper Text Transfer Protocol)

From the earlier posts, we might be aware of what basically is HTTP. If not, do not worry! Click here for a short description of HTTP. Now we shall dive deeper into it. HTTP is an application layer protocol that is used for transmitting web pages like HTML. This protocol is based on client-server architecture. […]

Greedy method

“Do you want to buy a car?” If this is the situation, how would you choose a car? Assume that you need a car with better features. Will you go on testing or checking all the car models in the world and then buy it? My answer would be no. I shall separate out or […]