5.4 C
Munich
Sunday, April 11, 2021
- Advertisement -
- Advertisement -spot_img

AUTHOR NAME

wahyurap26

14 POSTS
0 COMMENTS

SIGSALY : encryption technology in your voice

One mechanism for increasing security is to use encryption technology. The data sent is modified so that it is not easily intercepted. So encryption...

Control Unit Operation

1. Micro-Operation The execution of a program consists of the sequential execution of instructions. Each instruction is executed during an instruction cycle ...

Text Encryption in Android Chat Applications using Elliptical Curve Cryptography

Introduction In this era, technology has become an important aspect of human needs. Almost all their activities have been facilitated by technology, especially communication...

Secure Web Applications Against Cross Site Scripting (XSS): A Review

It is common to use client side validations and front end scripting using JavaScript, VBScript and so on in web applications. Excessive use...

DEFENDING AGAINST WEB VULNERABILITIES AND CROSS-SITE SCRIPTING

WHAT IS CROSS-SITE SCRIPTING (XSS) Cross-site scripting (XSS) is a type of computer insecurity vulnerability typically found in Web applications, such as web...

Nano Tube

Heat is something of a nuisance for electrical engineers. It reduces the reliability of electronic devices and even causes them to fail completely. That’s why computer...

A nanotube material conducts heat in just one direction

Asymmetric conductors could revolutionize cooling systems for computers and other devices. Heat is something of a nuisance for electrical engineers. It reduces the reliability of...

Quantum Computer

How it works, why it’s so powerful, and where it’s likely to be most useful first Image courtesy Rigetti Computing. Photo by Justin Fantl. This is the first...

Trusted Directory Services for Secure Internet Connectivity Transport Layer Security using DNSSEC

During the second half of the previous century the number of sensitive business communications and financial transactions increased rapidly. These communications often involved parties...

Computer Memory

Characteristic of Memory Systems The complex subject of computer memory is made more manageable if we classify memory systems according to their key characteristics.The...

Latest news

- Advertisement -spot_img
Enable referrer and click cookie to search for pro webber