Top Posts
Host IT Smart – An Honest Review about...
Life cycle of a thread in Java
Multithreading in Java
Python Keywords and Identifiers
Java Database Connections | JDBC Tutorial
CSJMU BCA 1 SEM QUESTION PAPERS
C++ Structure
Data Transmission in Network
Computer Network and its Component
OSI Model
TECHARGE
  • HOME
  • BLOGS
  • TUTORIALS
    • ALL TUTORIALS
    • PROGRAMMING TUTORIALS
      • JAVA TUTORIALS
      • C++ TUTORIAL
      • C PROGRAMMING TUTORIALS
      • PYTHON TUTORIAL
      • KNOWLEDGE MANAGEMENT TUTORIALS
      • DATA STRUCTURE AND ALGORITHM TUTORIALS
      • PROGRAMMING EXAMPLES
        • CPP EXAMPLES
        • JAVA EXAMPLES
        • C++ GRAPHICS PROGRAM
    • PROJECTS
      • PYTHON PROJECTS
      • SWIFT PROJECT
    • PPROGRAMMING QUIZ
    • DBMS TUTORIALS
    • COMPUTER NETWORK TUTORIALS
    • COMPUTER NETWORK SECURITY TUTORIALS
    • E COMMERCE TUTORIALS 
    • AWS TUTORIAL
    • INTERNET OF THINGS
    • CHEATSHEET
  • MORE
    • JOBS AND INTERNSHIPS
    • INTERVIEW PREPARATION
    • TECH BOOK
    • TECH NEWS
    • UNIVERSITY PAPERS
    • MNC TWEETS
    • THINKECO INITIATIVES
    • CONTACT US
  • WRITE +
  • ABOUT US
  • HIRE US
Category:

Computer Network Security

  • Computer Network

    RSA Algorithm

    by anupmaurya April 18, 2022
    by anupmaurya April 18, 2022

    In this article you’ll learn about (Rivest–Shamir–Adleman) RSA Algorithm and implementation of RSA algorithm using C program. RSA algorithm is an asymmetric cryptography algorithm. Asymmetric actually means that it works…

    2 FacebookTwitterLinkedinRedditWhatsappTelegramEmail
  • Computer Network

    Cryptography

    by anupmaurya December 8, 2021
    by anupmaurya December 8, 2021

    The cryptography is a complex field that needs knowledge of mathematics, electronics, and programming. The need and desire for private and secret communication are necessary for the military communication systems.…

    8 FacebookTwitterLinkedinRedditWhatsappTelegramEmail
  • Computer Network SecurityE-Commerce Tutorials

    Secure Electronic Transaction (SET)

    by anupmaurya August 9, 2021
    by anupmaurya August 9, 2021

    Secure electronic transaction (SET) was an early communications protocol used by e-commerce websites to secure electronic debit and credit card payments. Secure electronic transaction was used to facilitate the secure…

    2 FacebookTwitterLinkedinRedditWhatsappTelegramEmail
  • Computer Network Security

    Difference between File Transfer Protocol and Secure File Transfer Protocol

    by anupmaurya July 26, 2021
    by anupmaurya July 26, 2021

    In this article you’ll learn about Difference between File Transfer Protocol (FTP) and Secure File Transfer Protocol (SFTP). File Transfer Protocol (FTP) FTP stands for File Transfer Protocol. It is a…

    0 FacebookTwitterLinkedinRedditWhatsappTelegramEmail
  • Computer Network Security

    Caesar Cipher Technique in Cryptography

    by anupmaurya July 11, 2021
    by anupmaurya July 11, 2021

    In this tutorial you’ll learn about Caesar Cipher Technique in Cryptography, which is based on mono-alphabetic cipher. The Caesar cipher method is based on a mono-alphabetic cipher and is also…

    3 FacebookTwitterLinkedinRedditWhatsappTelegramEmail
  • Computer Network Security

    Network security model and its components

    by anupmaurya July 7, 2021
    by anupmaurya July 7, 2021

    In this article you’ll learn about Network security model and its components. A Network Security Model exhibits how the security service has been designed over the network to prevent the opponent…

    2 FacebookTwitterLinkedinRedditWhatsappTelegramEmail
  • Computer Network Security

    Important Question on Computer Network Security

    by anupmaurya July 7, 2021
    by anupmaurya July 7, 2021
    4 FacebookTwitterLinkedinRedditWhatsappTelegramEmail
  • Computer Network Security

    Transposition Technique in Cryptography

    by anupmaurya July 7, 2021
    by anupmaurya July 7, 2021

    In this tutorial ,you’ll learn about variations of transposition technique, and we will also observe how the transposition technique is different from the substitution technique. Transposition technique(No replacement of character) is…

    4 FacebookTwitterLinkedinRedditWhatsappTelegramEmail
  • Computer Network Security

    Digital Signature

    by anupmaurya July 3, 2021
    by anupmaurya July 3, 2021

    In this tutorial, you’ll learn about Digital Signature, Key Generation Algorithm, Signing Algorithm, and Signature verification Algorithms. A digital signature is a mathematical technique used to validate the authenticity and…

    4 FacebookTwitterLinkedinRedditWhatsappTelegramEmail
  • Computer Network Security

    Digital Certificate

    by anupmaurya July 3, 2021
    by anupmaurya July 3, 2021

    In this article, you’ll learn about Digital Certificate, What digital certificate contains and the difference between Digital certificate and digital signature. Digital certificate is issued by a trusted third party…

    3 FacebookTwitterLinkedinRedditWhatsappTelegramEmail
Newer Posts
Older Posts

Recent Posts

  • Host IT Smart – An Honest Review about this Indian Hosting Company

    May 24, 2022
  • Life cycle of a thread in Java

    May 24, 2022
  • Multithreading in Java

    May 23, 2022
  • Python Keywords and Identifiers

    May 23, 2022
  • Java Database Connections | JDBC Tutorial

    May 22, 2022

Keep in touch

Facebook Twitter Linkedin Youtube Github

Categories

  • Amazon Web Services
  • C Examples
  • C Programming Tutorial
  • C# Programming Tutorials
  • C++ Graphics Program
  • C++ Programming Tutorials
  • Cheatsheet
  • Computer Fundamental And Office Automation
  • Computer Network
  • Computer Network Security
  • CPP Examples
  • Data Structure and Algorithm
  • Dbms Tutorials
  • Design
  • E-Commerce Tutorials
  • Economics
  • Educational
  • Events
  • Git and GitHub
  • Html Tutorials
  • Information System Analysis Design And Implementation
  • Internet
  • Interview Preparation
  • IoT Project
  • IoT-Internet of Things
  • Java Program Examples
  • Java Tutorial
  • JavaScript
  • JavaScript Example
  • Jobs and Internships
  • JSP
  • Knowledge Management
  • Linux
  • Matplotlib Library
  • Operating System Tutorial
  • Operator Overloading
  • Paper
  • Programming
  • Python Examples
  • Python Project
  • Python Tutorial
  • Searching Algorithm
  • Servlets
  • Sorting Algorithms
  • SQL Tutorial
  • SYSADMIN
  • Tech News
  • Technology
  • Web Development

EDUCATIONAL

  • PyScript: Python in the Browser

  • Best Fake Email Generators (Free Temporary Email Address)

  • How to Find Out Who Owns a Domain Name

  • Mobile phone brands by country of origin

  • Best way to use google search you won’t believe exist

  • 10 mostly asked questions related to WhatsApp

  • Top 8 Programming Languages That Will Rule in 2022

  • Google Cloud Platform

  • Best Online Code Editors For Web Developers

  • How to Write a Synopsis for Project Work

CHEATSHEET

  • Git and Github 2022 Cheat Sheet

  • ReactJs Cheatsheet

  • Linux Commands Cheat Sheet

  • C Programming language Cheatsheet

  • Scala Cheatsheet

  • MySQL Cheatsheet

  • Javascript Cheatsheet

PROJECTS

  • Python Rock Paper Scissors Game

  • Currency Converter in Python

  • Alarm clock GUI application with tkinter

  • Print emojis using python without any module

  • Country Date and Time using Python

  • Covid-19 Tracker Application Using Python

  • Python | GUI Calendar using Tkinter

  • Python: Shutdown Computer with Voice

  • Python GUI Calculator using Tkinter

  • Convert an Image to ASCII art using Python

  • Python YouTube Downloader with Pytube

  • Tic-Tac-Toe using Python

TUTORIALS

  • JAVA TUTORIAL
  • COMPUTER NETWORK
  • DBMS TUTORIAL
  • E-COMMERCE TUTORIAL
  • KNOWLEDGE MANAGEMENT
  • C++ PROGRAMMING
  • COMPUTER NETWORK SECURITY
  • AMAZON WEB SERVICES

TECH NEWS

  • PyScript: Python in the Browser

  • HalloApp is a secure alternative to WhatsApp, made by two early WhatsApp employees

  • 5+ Best Humanoid Robots In The World

  • Windows 11 Now Official, Brings Fresh UI, Centrally-Placed Start Menu

TERMS & POLICY

  • PRIVACY POLICY
  • TERMS AND CONDITIONS

COMPILERS

  • JAVA COMPILER
  • PYTHON COMPILER
  • JS COMPILER
  • C++ COMPILER
  • C COMPILER

JOBS AND INTERNSHIPS

  • TCS off-campus hiring 2022 for software engineers- 2019, 2020, & 2021 Batches

    February 27, 2022
  • Deloitte Recruitment For Any Graduates as Learning Operations Associate Analyst

    February 18, 2022
  • HP Recruitment For Tech Support Intern Position

    February 16, 2022
  • EY Hiring- PAS Global Immigration Advanced Analyst

    February 14, 2022
  • Amazon Recruitment Drive for Virtual Customer Support Associate Position

    February 12, 2022

@2019-21 - All Right Reserved. Designed and Developed by Techarge

TECHARGE
  • HOME
  • BLOGS
  • TUTORIALS
    • ALL TUTORIALS
    • PROGRAMMING TUTORIALS
      • JAVA TUTORIALS
      • C++ TUTORIAL
      • C PROGRAMMING TUTORIALS
      • PYTHON TUTORIAL
      • KNOWLEDGE MANAGEMENT TUTORIALS
      • DATA STRUCTURE AND ALGORITHM TUTORIALS
      • PROGRAMMING EXAMPLES
        • CPP EXAMPLES
        • JAVA EXAMPLES
        • C++ GRAPHICS PROGRAM
    • PROJECTS
      • PYTHON PROJECTS
      • SWIFT PROJECT
    • PPROGRAMMING QUIZ
    • DBMS TUTORIALS
    • COMPUTER NETWORK TUTORIALS
    • COMPUTER NETWORK SECURITY TUTORIALS
    • E COMMERCE TUTORIALS 
    • AWS TUTORIAL
    • INTERNET OF THINGS
    • CHEATSHEET
  • MORE
    • JOBS AND INTERNSHIPS
    • INTERVIEW PREPARATION
    • TECH BOOK
    • TECH NEWS
    • UNIVERSITY PAPERS
    • MNC TWEETS
    • THINKECO INITIATIVES
    • CONTACT US
  • WRITE +
  • ABOUT US
  • HIRE US