Skip to content

Cyber Security
networking

This is a blog about cyber security, python programming, networking, forensics, ethical hacking and malware science.

Developed applications

  • Techriot RSA Cryptography API

    Techriot RSA Cryptography API

    RSA (Rivest-Shamir-Adleman) is a widely used encryption algorithm in cybersecurity and cryptography. It’s named after its creators: Ronald Rivest, Adi Shamir, and Leonard Adleman. RSA is a form of asymmetric encryption. Asymmetric means it uses two distinct keys: a public key and a private key. The public key is used for encryption, while the private… Read…

    More here…

  • Least Significant Bit steganography

    Least Significant Bit steganography

    The Art of Hidden Communication In the realm of data security and privacy, there exists a fascinating technique called steganography. Derived from the Greek words “steganos” meaning “covered” or “hidden,” and “graphein” meaning “writing,” steganography is the art and science of concealing secret information within seemingly innocuous carriers such as images, audio files, or even… Read…

    More here…

  • Per VLAN Spanning Tree demonstration

    Per VLAN Spanning Tree demonstration

    Spanning Tree In computer networks, STP plays a crucial role in maintaining a loop-free and efficient communication path. By preventing redundant links and loops, STP ensures stable and reliable network connectivity. This blog post aims to provide a comprehensive explanation of the Spanning Tree Protocol, its key features, and its significance in network infrastructure. The… Read…

    More here…