Cyber Security
networking
This is a blog about cyber security, python programming, networking, forensics, ethical hacking and malware science.
Developed applications
-
Techriot RSA Cryptography API
RSA (Rivest-Shamir-Adleman) is a widely used encryption algorithm in cybersecurity and cryptography. It’s named after its creators: Ronald Rivest, Adi Shamir, and Leonard Adleman. RSA is a form of asymmetric encryption. Asymmetric means it uses two distinct keys: a public key and a private key. The public key is used for encryption, while the private…
-
Least Significant Bit steganography
The Art of Hidden Communication In the realm of data security and privacy, there exists a fascinating technique called steganography. Derived from the Greek words “steganos” meaning “covered” or “hidden,” and “graphein” meaning “writing,” steganography is the art and science of concealing secret information within seemingly innocuous carriers such as images, audio files, or even…
-
Per VLAN Spanning Tree demonstration
Spanning Tree In computer networks, STP plays a crucial role in maintaining a loop-free and efficient communication path. By preventing redundant links and loops, STP ensures stable and reliable network connectivity. This blog post aims to provide a comprehensive explanation of the Spanning Tree Protocol, its key features, and its significance in network infrastructure. The…