AUTHOR NAME
Asyraf Adnil
8 POSTS
0 COMMENTS
PKS'15
NCI'17
AES
Definition and Working System of Advanced Encryption Standard (AES)Advance Encryption Standard (AES)Advanced Encryption Standard (AES) is a cryptographic algorithm that can be used to...
Arduino Uno
Arduino Uno is a board that uses the ATmega328 microcontroller. Arduino Uno has 14 digital pins (6 pins can be used as PWM outputs),...
Introduction to Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) has been widely used in factories which is very useful to support supply chain management and control. RFID can identify...
Cache Memory
Cache or cache memory in information technology is a mechanism for high-speed secondary data storage that is used to store data / instructions are...
What Cyber Espionage Is
Cyber Spying, or cyber
espionage, are actions to obtain confidential information without the knowledge
of information holders, whether from individuals, groups, governments and
enemies for personal, economic,...
Routing and Switching
Networks have grown
and developed over the past few decades with the aim of meeting increasingly
complex human needs. Through technological sophistication the need for network
resources...
Virtual Private Network, Why Should We Use It?
VPN or virtual private network is a relationship between one
network to another network using a private network through a private network.
This connection occurs virtually...
AGAINTS THE hOAX
In the modern era now, the dissemination of information can
quickly be conveyed, even from the farthest ends of the world. The acceleration
of the movement...