Friday, 29 December 2017

What is MD5 or Message Digest 5 Algorithm

We are getting many requests  through emails, messages and on social media people are very much confused asking about how there passwords gets encrypted , and how does this encryption works, what are the algorithms used behind this encryption. So here i am going to tell you about one of the most widely used algorithm used for encryption known as MD5 or Message Digest Algorithm        Before we proceed to MD5 i want to tell...

Friday, 13 October 2017

Everything you Should Know About an IP-Addresses

                                          You have heard of this term IP Address many times in day-to day life if you belong to IT sector, yes as soon as you heard about the term IP only one thing that stucks in your mind is the IP of a computer...

How Cloud Computing Works.

                               Let’s say you’re an executive at a large corporation. Your particular responsibilities include making sure that all of your employees have the right hardware and software they need to do their jobs. Buying computers for everyone isn’t enough — you also...

What are Virtual Machines..?

A virtual machine uses a combination of software and your existing computer to emulate additional computers, all within one physical device. Virtual machines provide the ability to emulate a separate operating system (the guest), and therefore a separate computer, from right within your existing OS (the host). This independent instance appears in its own window and is typically isolated as a completely standalone environment, although...

Details about Java Virtual Machine you mus know.

                             JVM is an specification that provides run-time environment in which java byte-code can be executed. JVMs are available for many hardware and software platforms (i.e. JVM is platform dependent). What is JVM It is: A specification where working of Java Virtual...

Tuesday, 22 August 2017

Virus VS Malware

Difference Between Viruses and Malware These days many of us talk about like malware and spyware a lot more than the virus. Have you ever wondered what exactly are all these? Beginning with to understand what a virus is we will start with the original biological meaning of the word.                                                                                                        ...

Monday, 21 August 2017

How does an Image Sensor Chips and Camera Works.

All webcams work in broadly the same way: they use an image sensor chip to catch moving images and convert them into streams of digits that are uploaded over the Internet. The image sensor chip is the heart of a webcam—so how does that bit work? Let's take a webcam apart and find out. Take the outer case off a webcam and you'll find it's little more than a plastic lens mounted directly onto a tiny electronic circuit board underneath. The...

Sunday, 20 August 2017

Everything You must know About the BITCOINS.

A few days ago, the world has seen the biggest Ransomware attack called WannaCry. The hackers encrypted all the information of victims and asked for Bitcoins to decrypt the data. You may wonder why hackers asked for Bitcoins instead of dollars or euro? What is Bitcoin and Bitcoin mining? What is the reason for asking Bitcoins? In this article, I am going to share everything you need to know about Bitcoins and how do they work. What...

Amazing Use of OTG Cable that you might don't Know.

                                                    USB OTG or the OTG cable is also known as USB On-The-Go cable is the cable which allows USB devices to act as a host which further allows...