top of page


Choose Password Hashing Algorithm
Introduction The goal of a strong password strategy is to mitigate data breaches in the application. The essence of authentication is to...
Nov 30, 20233 min read
Â
Â
Cyber Security : Tools and Techniques
The world is more dependent on technology than ever before because of the proliferation of digital data. No matter how big or small,...
Nov 30, 20234 min read
Â
Â
Social Networking and Social Media Security
Introduction: Social networking is building upon the basic concept of traditional social networks using which users can connect...
Nov 30, 20235 min read
Â
Â
All About Malware
Malware is commonly known for malicious software. It is a code delivered by a network to interfere with the normal functioning of a...
Nov 30, 20234 min read
Â
Â
Black Cat
I got down at Sanjan from an overcrowded train. It was the only available train that had a scheduled stop at this nondescript village. It...
Nov 30, 20234 min read
Â
Â


Excerpts from Zohra Margaret Chaube's Interview
Q. What, according to you, is the main purpose of story-telling? Ans. An inner urge towards anything that one becomes sensitive to,...
Nov 30, 20235 min read
Â
Â
bottom of page
