converse.js and candy.js Functionalities

December 24, 2016

I have tried both converse.js and candy for creating a chat application on the browser for some use. Both of them provide very good functionality. Both converse.js and candy are based on XMPP client and pull data from the ejabberd server and render it on the screen on the browser.

Read More

The problem of key distribution in symmetric keys

November 29, 2016

The problem of key distribution is one of the most basic problems faced in the case of symmetric keys. As the name suggest there is a difficulty of key sharing in the case of symmetric keys. In the case of the symmetric key, there is only one key that is why it must be kept secure on the both ends.

Read More

Usage of symmetric keys and asymmetric keys in encryption

November 29, 2016

Let’s visualise the time when the internet just started and the people were started getting hold. Of course, this was the time when the US military made the internet public. Everyone was fascinated by the new thing. So you can reach anyone who is miles away just by using a service called the internet.

Read More

Ways of producing cipher text from plain text

November 29, 2016

As we have discussed in one of my another post that a cryptography is the way of producing encrypted text out of the simple or plane text. In that post we also talked in detail about the definition of cipher text and plain text.

Read More

Creating graphs using data form .csv file

November 16, 2016

Yesterday I was talking to a friend and he told me that he has some work that he needs to complete by the following night. He asked me for the help and I decided to help as my exam was postponed. He said that he had a .csv file( comma separated values) and want to shift the whole data into postgresql database.

Read More

How does kerberos authentication works: Authentication applications

November 13, 2016

Today we are going to discuss some of the application of the authentications systems. These are the applications of the authentication where the user is identified differentely and various services are provided to the user. Authentication also helps in keeping a seprate user experience for every authencated user and working for each user with different stratergy.

Read More