Skip to content
Saturday, May 10, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

cryptography

Ethical Hacking IT Security 

What Is Footprinting?

September 21, 2020 Krishna cryptography, security, What Is Footprinting?

Now let’s circle back around to the first step in the process of ethical hacking: footprinting. Footprinting, or reconnaissance, is

Read more
Ethical Hacking IT Security 

Applications of Cryptography

September 21, 2020September 21, 2020 Krishna Applications of Cryptography, cryptography, cryptography applications

Cryptography can be applied in communication of data and information, which we will see in the form of IPSec, SSL,

Read more
Ethical Hacking IT Security 

Issues with Cryptography

September 19, 2020 Krishna cryptography, Issues with Cryptography

Much like any system that will be explored in this text, cryptography has its faults and potential attacks. Attacks are

Read more
Ethical Hacking IT Security 

Symmetric Cryptography

September 19, 2020 Krishna cryptography, Symmetric Cryptography

Symmetric algorithms do some things really well and other things not so well. Modern symmetric algorithms are great at all

Read more
Ethical Hacking IT Security 

Cryptography in Action

September 19, 2020 Krishna cryptography, Cryptography in Action

You will encounter cryptography in many forms throughout this book. It is applied to many different technologies and situations and,

Read more
Ethical Hacking IT Security 

Tracing the Evolution in cryptography

September 19, 2020 Krishna cryptography, evolution in cryptography, Tracing the Evolution in cryptography

As with the ancient Egyptians and Romans, who used secret writing methods to obscure trade or battle information and hunting

Read more
Ethical Hacking IT Security 

History of Cryptography

September 19, 2020 Krishna cryptography, history, History of Cryptography

you can learn things by studying the history of cryptography that can help you relate to the techniques a little

Read more
Ethical Hacking IT Security 

What is Cryptography?

June 17, 2020 Krishna cryptography, security, What is Cryptography?

Look at the following two pieces of text: The text on the left side is a secret message. The message

Read more
Java Tutorial 

Cryptographic Tools

March 18, 2020 Krishna Algorithm, bulk encryption, cryptographic techniques, Cryptographic Tools, cryptography, Data Encryption Algorithm, decrypted, fingerprint, Hashing, Hashing functions, public key encryption, secure hash

The derivation of the word cryptography is from Greek and means literally secret writing . Modern cryptography is still involved

Read more
IT Security Tutorial 

CRYPTOGRAPHY

January 4, 2020 Krishna cryptography, plaintext, strength of cryptography, technical terms

Cryptography is a method of storing and transmitting data in a form that only those it is intended for can

Read more

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.