Home | Technology

Technology

 5 Top Remote Control Helicopters below $500

Remote Control Helicopters

Remote Control Helicopters, however, are the best alternative to Remote Control Drones. But, RC Helicopters not always give the same feeling as RS drone gives so I collected a list of those RC helicopters which has drone features enabled. I’d say you can gift any of the helicopters out of …

Read More »

Cryptography: Block Cipher & Feistel Block Cipher

Block cipher Crypto

We have learned traditional cipher techniques and various core cryptographic techniques so far. Let’s move forward and discuss on Block cipher and Feistel block cipher. Let’s have quick revisions from previous sessions. Revision from previous sessions Major traditional cipher techniques Caesar traditional cipher – type A Caesar traditional cipher – …

Read More »

Remote Control Drone – FAQs & Buying Tips

remote control drone avinash inviul

What is Remote Control Drone? Remote control drone is a remotely controlled flying robot which uses software stored in its embedded system in conjunction with sensors & GPS system.  Technically it is called as Unmanned Aerial Vehicles (UAV).   What are the actions performed by Remote Control Drone? Drones are …

Read More »

Top 10 Browsers for web surfing

Web Surf browsers

Google Chrome It was released in 2008 by Google. It is very fast and its users are growing daily. 70 million users have Google Chrome.  It has a great design layout. Its user interface and speed put it at the top in the list of browsers. It is 32.00 mb in …

Read More »

Understanding some Traditional Cipher techniques

Traditional Cipher techniques

In previous sessions we have learned modern cryptographic techniques which include Symmetric key encryption and asymmetric key encryption. Today we are going to learn about some traditional cipher technique which people used earlier to protect important information. Revision from previous class Kerckhoff’s principle of cryptography Cryptographic attacks Active Attacks Passive …

Read More »

Understanding major Cryptographic attacks

Welcome to third session on Cryptography. Let us have quick revision of previous class! Revision from previous class: Cryptosystems Types of Cryptosystems Symmetric key encryption Asymmetric key encryption Session 1 Link – Cryptography: Basic Understanding Session 2 Link- Cryptosystem and its types This is the age of information. Internet is …

Read More »

Cryptosystem and its types

cryptography

This is second session in the series of posts on Cryptography. I would recommend you to read the previous article on the same before you go through this article. It will help you build your better understandings on Cryptography & Cryptosystem. Revision from previous session: We have learnt below topics …

Read More »

Cryptography: Basic understanding

cryptography

Globalization made the world closer so the Internet made them connected. Internet is so vast that we can’t risk our data security over the internet. Science of Cryptography mainly deals on how we can secure data over Internet through encryption and decryption. We are going to cover full research based …

Read More »