Resources  
  • PiP - External Streaming Data - Useful Concepts - Part 1Mar 27, 2024. To use computers to automate information processing we have to deal with bitstreams as the information representation. By design, bitstream management involves the organization, storage, retrieval, communication, and manipulation to ensure accuracy, security, and accessibility.
  • Hashing Techniques in Data Structures and AlgorithmsMar 20, 2024. Hashing in data structures utilizes hash functions to map arbitrary-sized data to fixed-size values, enabling efficient storage and retrieval within large datasets commonly employed in hash tables and maps.
  • A Comprehensive Guide to Secure Coding in C#Mar 18, 2024. A Comprehensive Guide to Secure Coding in C# by Ziggy Rafiq. Learn how to write robust and secure C# applications by implementing input validation, encryption, authentication, and error handling. This section provides examples and best practices for preventing SQL injection, XSS attacks, and securing user authentication.
  • Securing Your .NET Projects: Simple Strategies and Real ExamplesFeb 18, 2024. In today's digital world, keeping our software safe from cyber threats is super important. For developers working with .NET projects, it's not just a good idea but really necessary to make sure our apps are strong against potential attacks. Luckily, there are lots of tools and tricks within the .NET world to help us do this.
  • What is Raft Consensus Algorithm?Feb 15, 2024. The Raft Consensus Algorithm ensures fault tolerance and consistency in distributed systems. It simplifies leader election, log replication, and commitment, offering benefits like simplicity, safety, liveness, and flexibility.
  • Moore's Voting Algorithm in JavaScriptFeb 14, 2024. Imagine you're analyzing election results or counting website visits. You need to find the most frequent item, the one that appears more than half the time. Sure, you could loop through the data and count manually, but wouldn't it be cool to have a smarter, more efficient way? Enter Moore's Voting Algorithm, a clever technique that solves this problem with elegance and speed.In this article, we'll demystify Moore's Voting Algorithm and implement it in JavaScript.
  • Cybersecurity of External Streaming Data - ConfidentialityFeb 14, 2024. This comprehensive article delves into cybersecurity considerations for external data, focusing on streaming bitstreams. It covers encryption fundamentals, emphasizing symmetric cryptography and practical implementations like TripleDES encryption.
  • Cybersecurity of External Streaming Data - Non-repudiationFeb 14, 2024. This article which is a continuation of a discussion related to external streaming data will focus on using cybersecurity to protect the confidentiality of bitstreams. It is the third and last part covering the Cybersecurity of External Streaming Data.
  • Two Pointer Approach in PythonFeb 01, 2024. The Two Pointer Approach is one of the most used and efficient techniques to search for a pair in a sorted array. We'll look into the working of it, implementation and use cases.
  • Rate Limiting Algorithms in .NET CoreJan 24, 2024. We’ll explore various rate limiting algorithms in the context of .NET Core, providing code snippets for implementing Token Bucket, Sliding Window, Fixed Window, and Concurrency limiters.
  • Securing Your .NET Applications With ExamplesJan 20, 2024. In the realm of software development, security remains a paramount concern. This is especially true for .NET applications, which often handle sensitive data and interact with critical systems. By adhering to security best practices, developers can create robust applications that safeguard user information and withstand potential attacks.
  • Understanding Naive Bayes Classifiers In Machine LearningJan 15, 2024. Understanding Naive Bayes Classifiers In Machine Learning.
  • Building a Secure PHP MySQL Signup/Login Website with Email VerificationJan 15, 2024. Creating a secure signup/login system is essential for any web application that involves user authentication. In this article, I'll guide you through building a PHP MySQL login/signup website with email verification. I'll focus on security best practices, including password encryption using PHP's built-in functions.
  • Data Structures and Algorithms (DSA) using C# .NET Core - Binary Trees and Binary Search Tree (BST) Tree Traversal- IIJan 02, 2024. The fundamentals of Tree and Binary Search Tree, delving into data reading, node addition, deletion, and search operations through tree traversal. Understand three traversal types: Preorder, Inorder, and Postorder. Source code included.
  • Data Loss Prevention (DLP) in 2024Dec 18, 2023. In the ever-evolving landscape of cybersecurity, protecting sensitive data has become a paramount concern for organizations across industries. As we usher in the year 2024, the significance of robust Data Loss Prevention (DLP) strategies has never been more critical. This guide aims to provide an introductory overview of DLP, its key components, and its relevance in safeguarding against data breaches and unauthorized disclosure.
  • ASP.NET Core Data Protection APIDec 11, 2023. ASP.NET Core Data Protection API. In web applications, ensuring authenticity is pivotal during round trips. This article delves into the Asp.Net Core Data Protection API, discussing its implementation in web applications, API methods, and prerequisites using .Net Core 6.0 and Visual Studio 2022. Explore cryptographic solutions for data protection, key management, and rotation.
  • Data Structures and Algorithms (DSA) using C# .NET Core — Binary Trees and Binary Search Tree (BST)Nov 27, 2023. In this article we will learn about - Binary Trees. Explore the fundamentals of trees and delve into binary trees, focusing on Binary Search Trees (BST). Understand key terminologies, tree traversal, and mathematical formulas for node calculations in this comprehensive guide.
  • SSL/TLS Termination in API Gateway PatternNov 22, 2023. This article would be beneficial for readers seeking to understand the importance of SSL/TLS termination in enhancing API security and performance. It's great that you not only discuss the benefits but also address potential challenges and provide practical recommendations for best practices.
  • What is Text Analysis in Artificial IntelligenceNov 02, 2023. what is text analysis in AI, what are the techniques available in the text analaysis, how it would be beneficial to the business, the number of use cases available for the text analaysis and finally the conclusion is discussed in this article
  • Counting Cycles in Undirected Graph with DFSOct 26, 2023. This is a graph problem to count the noumber of cycles with length n using Depth First Search
  • Bellman Ford AlgorithmOct 23, 2023. This C# implementation of the Bellman-Ford algorithm computes shortest paths in weighted graphs. It uses classes for edges and graphs and checks for negative weight cycles efficiently.
  • TripleDES Encryption and Decryption in C#Oct 16, 2023. Encryption is the process of rendering data unreadable to safeguard it from unauthorized access. It's widely applied in banking, e-commerce, communication, and security. TripleDES (Triple Data Encryption Standard) is a long-standing encryption method, utilizing three 56-bit keys for both encryption and decryption, also known as symmetric-key encryption. This article delves into TripleDES, elucidating its workings, strengths, and limitations. It compares TripleDES with contemporary encryption methods, placing it within the context of modern cryptography.
  • What Is TF-IDF In Machine Learning?Oct 11, 2023. TF-IDF (Term Frequency-Inverse Document Frequency) is a popular technique used in machine learning and natural language processing to quantify the importance of words in a document relative to a collection of documents.
  • How to Decrypt data using RSA algorithm in C#?Oct 03, 2023. In this article, we have sample code for decrypt an encrypted data with help of RSA Decryption algorithm and .pfx file which contains private key for decryption.
  • Understanding the C# Template Method PatternSep 27, 2023. Understanding the Power of the C# Template Method Pattern is a comprehensive guide that dives into the concept and application of the Template Method design pattern in C#. This title is aimed at developers seeking to grasp the fundamental principles and leverage the potential of the Template Method pattern in their C# projects. It illuminates how this design pattern enables the definition of the skeleton of an algorithm while allowing subclasses to provide specific implementations for certain steps. The title offers detailed explanations, practical examples, and best practices to help developers create extensible and maintainable code using the Template Method pattern. By understanding and mastering this pattern, developers can enhance code reusability, flexibility, and efficiency in their C# applications.
  • Detecting Cycles in Undirected GraphsSep 25, 2023. This C# class, Detect_cycle_in_an_undirected_graph, identifies cycles in undirected graphs using Depth-First Search (DFS). It represents the graph and checks for cycles efficiently. Time complexity: O(V + E), Space complexity: O(V + E).
  • Security ASP.net Core MVC (C#) Encryption and DecryptionSep 19, 2023. On the topic of "Security in ASP.NET Core MVC (C#): Encryption and Decryption," Ziggy Rafiq has written an insightful article. As Ziggy explores encryption and decryption techniques, he offers valuable insights for developers as well as security enthusiasts about how to secure web applications built on ASP.NET Core MVC.
  • Setting Up Azure Blob Storage EncryptionSep 13, 2023. Learn how to configure encryption for Azure Blob Storage to enhance data security. Follow these steps to establish encryption using customer-managed keys in Microsoft Azure.
  • Kahn's Algorithm for Detecting Cycles in Directed GraphsSep 07, 2023. This C# code implements Kahn's algorithm to detect cycles in a directed graph. It represents the graph using adjacency lists and provides methods for adding edges and checking for cycles.
  • Detect Cycle in a Directed GraphSep 06, 2023. This C# code snippet efficiently detects cycles in a directed graph using Depth-First Search (DFS). It employs an adjacency list represented by a Dictionary<int, List<int>> and returns a boolean indicating whether a cycle is present.
  • SQL SHA Algorithm BenefitsSep 06, 2023. SQL SHA Algorithm and Benefits of Using SHA Algorithm
  • Protecting Data Integrity and Privacy in TestingSep 01, 2023. Data Integrity and Privacy in Testing: Essential for Reliability and Compliance. Explore the significance, best practices, and a real-time example of safeguarding sensitive data during testing.
  • Securing Azure FunctionsAug 28, 2023. Enhance Azure Functions Security: Practical Measures for Robust Protection. Discover authentication, sensitive data safeguarding, network defense, code fortification, and more. Strengthen your functions' security with straightforward strategies.
  • BFS for Disconnected GraphAug 22, 2023. This code implements breadth-first search (BFS) for disconnected graphs. It uses an adjacency list to represent the graph and provides methods for adding edges and performing BFS traversal. The constructor initializes the graph, the AddEdge method connects vertices, and the Bfs method traverses the graph in breadth-first order. The time complexity is O(V+E). An example demonstrates usage.
  • Implementing Binary Search in PythonAug 18, 2023. Binary search, a potent algorithm, efficiently locates items in a sorted collection. Unlike linear search, it drastically minimizes comparisons, making it ideal for large datasets. Explore the binary search principles and Python implementation. Learn how binary search divides the search range and translates this into Python code.
  • Depth First For a GraphAug 17, 2023. Explore the Depth First Search (DFS) algorithm implementation in C# with this code snippet. The provided DfsGraph class embodies a graph, equipped with methods for DFS traversal. Define vertices, establish edges, and initiate traversals efficiently.
  • Breadth First Search for a GraphAug 16, 2023. Learn how to implement BFS with a C# class, BfsGraph, showcasing its core components. Understand the role of adjacency lists and vertices within the class and the functionalities of the constructor and AddEdge method.
  • Efficient Image Optimizer Using C# WPFJul 18, 2023. This article explores the process of building an image optimizer using C# WPF (Windows Presentation Foundation).
  • Mastering Gradient Boosting for RegressionJul 03, 2023. Mastering Gradient Boosting: A Powerful Machine Learning Algorithm for Predictive Modeling is an in-depth article that explores the fundamentals and advanced techniques of Gradient Boosting, one of the most effective and widely used machine learning algorithms.
  • What is Greedy Algorithm?Jun 26, 2023. Learn about greedy algorithms, a type of algorithm that makes decisions locally, but can often lead to globally optimal solutions.
  • Minimum Depth of Binary TreeJun 20, 2023. Find Minimum Depth of Binary Tree
  • Check If a Tree is Subtree of Another TreeJun 20, 2023. In this article, we will understand the Algorithm of how to check a tree is a subtree of another tree with code examples and code explanations.
  • Rivest Shamir Adleman(RSA) Algorithm and FunctionsJun 19, 2023. In Java, you can leverage the built-in cryptographic libraries to generate RSA key pairs, encrypt and decrypt messages, and perform digital signatures. This article explores the RSA application and its uses in various functions.
  • Check if Binary Tree is SymmetricJun 15, 2023. This code is a C# implementation of a solution to the problem of checking if a binary tree is symmetric or not. A binary tree is symmetric if it is a mirror image of itself along the center.
  • Encryption and Decryption in ASP.NET Windows Console Application using C#May 22, 2023. In this article, I have explained how to encrypt and decrypt the text using the AES Encryption standard. Open Visual Studio, Create a new console application.
  • Enhancing Security with Microsoft 365 Secure ScoreMay 18, 2023. By identifying opportunities to strengthen security throughout your organization, Identity Secure Score gives organizations greater insight and control over their security posture.
  • C++ vs. Python: A Performance Comparison using an ExampleMay 15, 2023. C++ and Python are two popular programming languages that are used for different purposes. C++ is known for its speed and efficiency, while Python is known for its ease of use and flexibility. In this article, we will compare the performance of C++ and Python using an example.
  • GCM mode Encryption and Decryption in ASP.NET Console AppMay 15, 2023. In this article, I have explained how to encrypt and decrypt the text using AES Encryption standard using GCM mode.
  • iOS App Security: Best Practices for Protecting User DataMay 12, 2023. This article discusses best practices for iOS app security, including encryption, user authentication, secure network communications, code signing, app sandboxing, two-factor authentication, anti-jailbreaking and anti-rooting measures, following Apple's App Store Guidelines, and educating users about security risks. By following these best practices, iOS developers can build secure and trustworthy apps that protect user data from malicious attacks.
  • Best Practices for SQL Server Backup and Restore OperationsApr 28, 2023. Best Practices for SQL Server Backup and Restore Operations
  • SQL Server Security Best PracticesApr 25, 2023. SQL Server Security Best Practices
  • Popular AI/ML Tools AvailableMar 15, 2023. In this article, you will learn about Popular AI/ML tools used.
  • Optimization Of Queries In SQL Server - HEAP TABLESMar 08, 2023. This article will help you to understand how to start to think on optimization of sql queries and why use indexes in tables
  • Step-by-Step Guide To Develop Tic-Tac-Toe AI With BlazorMar 06, 2023. Design and developing a Tic Tac Toe game where second-player is AI.
  • Deploy And Manage BitLocker On Windows ServerFeb 27, 2023. In this article, you will learn how to deploy and manage the BitLocker Drive Encryption on windows server,
  • Manage Disk Encryption Keys For Azure Virtual MachinesFeb 27, 2023. In this article, I will guide you to manage disk encryption keys for Azure virtual machine by using azure Key vault, Azure Key Vault for managing encryption keys that can be used for encrypting our data disk
  • Various Ways To Secure Sensitive Data In C#Feb 13, 2023. In this article we will see Various ways to secure sensitive data in C# with example.
  • Understanding Consensus Algorithms In BlockchainFeb 03, 2023. In this article, we'll go through some of the popular consensus algorithms currently being used by different blockchains, including.
  • Best Algorithm For Encrypting And Decrypting A String In C#Jan 31, 2023. In this article, we learn about how to encrypt and Decrypt a String in C#.
  • Rod Cutting Problem In C#Jan 30, 2023. In this article, we will understand Rod Cutting Problem in C#.
  • Kadane's Algorithm In C#Jan 02, 2023. This articles describes and demonstrates the Kadane's Algorithm in C#.
  • Fuzzy Search In C#Dec 26, 2022. This article describes and demonstrates the fuzzy search in C#.
  • Introduction To Homomorphic Encryption With Microsoft SEALDec 20, 2022. Homomorphic encryption allows third-party providers to perform computations on encrypted data without decrypting the data. This capability is opening new opportunities to provide services while preserving privacy.
  • Algorithms And Data Structures Interview Question - RecursionDec 01, 2022. In this article, you will learn about algorithms and data structures interview question - recursion.
  • So, What Exactly Big O Is?Oct 26, 2022. What is Big O notation? How to use it? How to calculate the algorithm's speed?
  • Generate A Strongly Secured Encrypted PDF File Using PDFFileEcrypterOct 19, 2022. The purpose of this article is to present an effective approach for strong encryption of PDF files using a password and a complicated algorithm.
  • C# - Bubble Sort AlgorithmOct 10, 2022. In this article, you will learn about C# - Bubble Sort Algorithm.
  • Introduction To Symmetric EncryptionSep 21, 2022. In this article, you will learn about Symetric Engryption.
  • AD Connect Synced Users Restore After On-Prem AD Encryption Or LossAug 09, 2022. Restore the syncing of AD users to Azure AD from the newly created domain. Note: On-prem requirements are not covered here.
  • Fast, Simplest And Clean O1 LFU Cache Algorithm Implementation In C#Mar 24, 2022. In this article, you will learn about fast, Simplest and Clean O1 LFU Cache Algorithm Implementation In C# using available default classes.
  • Fast, Short And Clean O1 LRU Cache Algorithm Implementation In C#Mar 23, 2022. In this article, you will learn about Fast, short and clean O1 LRU Cache implementation in C#
  • Usage Of STL In CPP ProgrammingMar 23, 2022. Standard Template Library that is considered as the bundle of template classes and pre defined functions that is highly used segment for the generic programming.
  • Convert Numbers To Roman Characters In C#Mar 22, 2022. This is medium level problem to Convert Numbers To Roman Characters In C# on leetcode.
  • Data Structure And Algorithm - Implementing Custom StackFeb 23, 2022. This article explains how to develop a custom stack structure using C#.
  • Data Structure And Algorithm - Choosing The Right Data StructureFeb 14, 2022. This article explains how to choose the right Data Structure.
  • Data Structure And Algorithm - Common TypesFeb 08, 2022. This article explains the common types available in the Data structure.
  • LinkedList Implementation In JavascriptJan 26, 2022. LinkedList is one of the major data structures used, so it becomes very crucial to understand its behavior, once you have a clear knowledge of the basics, you can solve most complex problems.
  • Min StackDec 30, 2021. This is an algorithm problem.
  • Valid ParenthesesDec 30, 2021. This is an algorithm problem.
  • List Of Algorithns In Computer ProgrammingDec 07, 2021. I'm adding here the lis of Algorithms available in computer programming. These algorithms are used in our day to day coding and in our real-life.
  • How To Enable SSL In Visual StudioNov 24, 2021. In this article, you will learn how to enable SSL in Visual Studio.
  • Microsoft Azure AI FundamentalsMay 22, 2021. We’ll talk about Microsoft AI, the pathway to learn for beginners who are curious to explore the Microsoft AI Platforms, various functionalities and features supported by Machine Learning Studio in Azure
  • Cryptography In The Digital EraSep 09, 2020. This article covers different cryptographic techniques that ensure data Confidentiality, Integrity and Availability.Information Security involves preventing or at least reducing the probability of unauthorized/inappropriate access to data, or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information.
  • Knapsack Problem In Analysis And Design Of AlgorithmsSep 04, 2020. In this article, you will learn about the Knapsack problem in the analysis and design of algorithms.
  • Dota2 Senatution Aug 30, 2020. In this article, you will learn about Dota2 Senatution.
  • Word Search Using Backtracking AlgorithmAug 25, 2020. In this article, you will learn how to search for Word in a N X N Board.
  • Colonizing Zombies Aug 12, 2020. This article explains the turns needed for Zombies to colonize a 2-D Matrix.
  • Comparison Of TDEA And Rijndael Advance Encryption Standard (AES)Jul 16, 2020. This article covers the description of TDEA Algorithm, considerations for use of TDEA.Algorithm, security for TDEA Algorithm, and recommendations for reducing the risk. It also covers the origin of the Rijndael Algorithm, why AES replaced the TDEA algorithm, high-level description of Rijndael Algorithm, Decryption Process and Stability under attack
  • Find The Next Greater ElementJul 08, 2020. In this article, you will learn how to find every element's next greater element.
  • Best Sorting AlgorithmJul 03, 2020. In this article, you will learn about which sorting algorithm is the best.
  • Working With Red-Black Trees In C#May 28, 2020. Although binary search trees (BSTs) are used widely, as data gets added, binary search trees tend to degenerate into an unordered linked list over time. The "red-black tree" is a related type of binary tree that's often more suitable for certain types of search operations. This article discusses how red-black trees facilitate faster searches and become less disordered over time than similar data structures, and shows how to build and search a red-black tree in C#.
  • Authentication And Authorization Using JSON Web Tokens In .NET CORE 3.1May 21, 2020. In this article, we will discuss authentication and authorization using JSON web Tokens in.NET core 3.1.
  • A Beginner's Guide to Cyber SecurityMay 03, 2020. This article looks at the fundamentals of cybersecurity, including basic terms and terminologies of security, the importance of data, attributes of data. and the CIA triad, confidentiality, integrity, and availability. It also looks at cybersecurity domains and different types of encryption techniques, like asymmetric and symmetric encryption.
  • Azure Encryption at RestApr 26, 2020. In this article, you will learn about Azure Encryption.
  • Activation Link VulnerabilityApr 22, 2020. Most of the websites use hashes for their activation link.In this blog, I will explain how to find or bypass those hashes.
  • Advanced Encryption Standard (AES) In C#Feb 14, 2020. In this article, you will learn about advanced Encryption Standard (AES) in C#.
  • How To Lock File And Folder Using Command Prompt (CMD) In Windows 10Dec 26, 2019. In this article, I have described how to Lock and Unlock any file and folder using the command prompt (Cmd) in windows 10.
  • How To Encrypt And Decrypt In C# Using Simple AES KeysNov 25, 2019. In this article, a string is encrypted and decrypted based on public-key cryptography
  • Introduction To RecursionNov 14, 2019. In data structure and algorithms, Recursion plays an important role. In this article, we will look at a brief introduction to Recursion.
  • Lesk Algorithm In Python To Remove Word AmbiguityOct 09, 2019. In this article, we will see how to use Python code to remove word ambiguity using the Lesk algorithm

About Symmetric-Encryption-Algorithms

NA

OUR TRAINING