DIY Makeup for Everyday in Life

Hello dear friends! Today we are going to see about another interesting topic about makeup. Beauty is every girl's dream. So today let's see about DIY makeup for everyday life. We all do many things to stay beautiful. All of us like to stay healthy and beautiful in our life. Specially the girls. Boys also like to stay handsome. The issue is we all have to do it with our busy life. Going to saloon everyday is not an easy task. Apart from that…

Continue Reading DIY Makeup for Everyday in Life

Five makeup items for daily usage

Hello my dear friends! Today I am going to bring a favorite and an interesting details to you.Today let's look at what are the five makeup items for daily usage. Makeup is a secret of every girl. Makeup brings a confidence, brightness and beauty to the face and soul. It helps us to present ourselves in a good manner. From the ancient times kings, queens and others used makeup. Not only in one specific region all around the world we can see the history…

Continue Reading Five makeup items for daily usage

What is Diffie – Helman Algorithm

Hello my dear friends. Today we are going to discuss about what is Diffie - Helman algorithm. The Diffie - Helman algorithm is a very important algorithm in computer security. Then without wasting many time let's learn about what is Diffie - Helman algorithm. For what purpose it is using. The Diffie - Helman algorithm invented in the year 1976. The invention is a collaboration of two people. They are Whitfield Diffie and Martin Helman. Diffie - Helman algorithm is a specific method of…

Continue Reading What is Diffie – Helman Algorithm

What is public key infrastructure and how does it works?

Hello my dear friends! How are you doing? Today we are going to discuss about public key infrastructure. Let's discuss about what is public key infrastructure and how does it work. Public key infrastructure is something connect with computer security. It ensures and helps for computer security. Firstly let's see what is public key infrastructure? Public key infrastructure is a set of hardware, software, people, policies and procedures needed to create, manage, distribute, use, store and revoke digital certificates. PKI directly connect with cryptography.…

Continue Reading What is public key infrastructure and how does it works?

Asymmetric Key Encryption

Hello friends! Today we are going to look at asymmetric key encryption. So far we were talking about many security topics. If you are newbie for cryptography please go through our introduction to cryptography concepts post. You can learn the basics of encryption. https://youtu.be/AxD5Vt8AX0o What is symmetric key encryption What is asymmetric key encryption? asymmetric encryption is also known as the public key encryption. The meaning of asymmetric means two things, not same. In asymmetric key encryption we use two keys for the encryption.…

Continue Reading Asymmetric Key Encryption

Software Engineering Coding Interview Questions

Hello friends! How are you doing? Today also I brought you another interesting article. Earlier we discuss about software engineering technical interview questions. We all have to go through an interview for a job. We have to pass from the interview to get the job. In software engineering we have to face two interviews. One is the HR interview and another one technical interview. Today we are going to discuss some software engineering coding interview questions. In an interview the interviewee will give you…

Continue Reading Software Engineering Coding Interview Questions

Software Engineering Interview Questions

Hello dear friends! Today i have brought you whole new experience. So far inside our blog we only provide information related to learning process. Now I have thought to give little bit professional training as well. Therefore today I have brought you set of software engineering interview questions. I think limiting our website for only students is not good. Therefore I took this decision. Interview is a turning point and important phase we go through in our lives. Get ready for the interview and…

Continue Reading Software Engineering Interview Questions

Symmetric Key Encryption

Hello dear friends! How are doing I hope all of you are fine. Today I have brough you another information system security post. So far we have discussed about many system security details. If you can remember we firstly had a brief intro to encryption. Then secondly we learned about different ciphers. As per that we discussed ciphers can be divided into types. They are block ciphers and stream ciphers or substitution ciphers or transpositions. We do the encryption based on any method above.…

Continue Reading Symmetric Key Encryption

Types of Ciphers for encryption

Hello dear friends! how are you? I hope all of you are doing well. Today we are going to discuss another information system security post. So the topic we are going to discuss is the types of ciphers for encryption. I hope all of you have a sound of knowledge about encryption. If you don't have a basic knowledge about key concepts of encryption, please visit our introduction to cryptography article. Introduction to Ciphers Let's have a brief introduction about ciphers first. The encryption…

Continue Reading Types of Ciphers for encryption

Introduction to cryptography concepts

Hello dear friends! How are you doing? Hope everyone is fine these days. Today I am hoping to discuss another interesting topic. This is a topic which is never been discussed in the myexamnote until now. Although from today onwards I hope to write more articles about this. So let’s see what is the topic for today. So today’s topic is an introduction to cryptography concepts. Firstly let’s see what kind of thing today we are going to talk about? We are going to…

Continue Reading Introduction to cryptography concepts