Wired Equivalent Privacy (WEP)

Wired Equivalent Privacy (WEP) WEP is a security algorithm for IEEE 802.11 wireless networks. It was introduced with the original 802.11 standards ratified in 1997, and it was majorly done to provide data confidentiality which was not in traditional wired networks. WEP is recognizable by its key of 10 or 26 hexadecimal digits (40 or 104 bits). It was of […]

Daemon thread in Java

Daemon thread in java: Daemon thread is a low priority thread providing services to the user thread. This thread runs in the background to perform tasks such as garbage collection. Major Properties: It cannot prevent the JVM from exiting when all the user threads finish their execution. JVM terminates itself […]

Honeypot : Trap for Hackers

What is a Honeypot? A honeypot is a system that is network-attached and is deployed as a decoy to lure cyber attackers and to find, change or study hacking procedures or attempts in order to gain unauthorized access to information systems. The function of a honeypot is to represent itself […]

JavaScript Browser Detection

You might have seen many websites detecting your browser and displaying the details of your browser on the web pages or checking the version of the browser to tell you to upgrade the browser or sometimes the websites might only run on a certain version or higher. A common example […]

Blockchain Basics:

Blockchain : A blockchain is a digital, distributed ledger of all the transactions made in the system. It is open to anyone. The information is transferred to all the systems in that network, which results in a peer-to-peer network of systems. This technology emerged as a consequence of the cryptocurrency, […]