Hash

We learnt in an earlier article that encryption transforms a plaintext into ciphertext by applying an algorithm. The length of the ciphertext

More

How Email Works

As mentioned in a previous article, email is the electronic way of exchanging (digital) mail through the use of internet and it

More

P2P Networks

In traditional networks, there is a computer server which receives requests from various computers, processes those requests and sends data back to

More

Cracked Software

A software generally falls into one of the following categories: Open Source Software (freely available + source code is available free of

More

Biometrics

Biometrics literally means measurement of a person’s physical characteristics. In cybersecurity, it means to analyze a person’s biological characteristics using statistical methods

More
1 2 3 5