Engineering Concepts Tutorials

Engineering Concepts Tutorials for UML, Operations Research, Numerical Methods and many more.
  Title / Author Replies
Views
Behind the scenes, the commands sent to mail servers are simple text commands. These commands can be to sent to an email server manually via telnet. This is a quick way to test an email server to determine if it is an open relay. First, determine the MX for the domain in question, run this...
2
17,728
Hi All ! we all use browsers, different kinds of browsers, to surf the internet. But do we know what makes a browser work ? How do a browser come to know that when to show which color or when to show which kind of style of text ? We can say we give instructions by using HTML or DHTML or...
17
8,266
A binary-safe function is a function or operation that can be performed on a binary file without modifying the contents of the file. This ensures that the file is not corrupted or mutilated by the function or operation. Binary data is encoded as a string of ones and zeros (bits), but is not...
1
6,570
Introduction The Transmission Control Protocol / Internet Protocol (TCP/IP) is a nonproprietary, routable network protocol suite that enables computers to communicate over all types of networks. TCP/IP is the native protocol of the Internet and is required for Internet Connectivity. The...
3
13,554
What is MD5 or MD5sum? Its a formula - a way to take a message of an arbitrary length, and create a 128-bit "fingerprint" or "message digest" of the message. MD5 is a way to verify data integrity. On these forums, it comes up fairly often in discussions about storing user passwords and other...
17
83,663
SSL (Secure Sockets Layer) certificates are perhaps the most common way to protect information being transmitted between a visitor Web browser and your Web site. SSL provides encryption services to information flowing between systems and can protect Web traffic, e-mail, instant messages and a host...
1
24,363
Define the Multicore Computing As software developers we have enjoyed a long trend of consistent performance improvement from processor technology. In fact, for the last 20 years processor performance has consistently doubled about every two years or so. But, day by day the truth is realizing...
3
6,016
The article continues the discussion on Algorithms available in Symmetric Key cryptography. It explains the whereabouts of DES algorithm. Due to the limitations of DES on security context, we shall include Triple DES in the scope. Triple DES is a stronger form of DES algorithm. Understanding...
0
3,799
Lossless Encoding is a method of encoding that allows no loss of data while converting to and from encoded data to normal data. Lossless Audio Encoding Q: Why special encoding methods for audio? A : Lossless encoding is not only done in audio, video etc. We actually have a ton of genric...
0
3,117
Instead of defining what is design pattern lets define what we mean by design and what we mean by pattern. According to me design is blue print or sketch of something so it can be defined as creation of something in mind. Moving to pattern, we can define it as guideline, or something that repeats....
82
570,354
Introduction Artificial Intelligence (AI) is a broad field, and means different things to different people. It is concerned with getting computers to do tasks that require human intelligence. However, having said that, there are many tasks which we might reasonably think require intelligence -...
6
27,022
Are You Invisible Online? It's true that your IP address is no secret. It's a basic part of internet communication protocols to send your IP address whenever you connect to another site, request a web page, chat, play an online game, etc. Without your IP address, the computer on the other...
19
23,209
HAProxy stands for High Availability Proxy, is an open-source TCP/HTTP load balancer. In case you are new to the idea of a load balancer, the work of a load balancer is to distribute incoming requests to an array of upstream servers so as no single upstream server is overworked/overloaded by...
0
4,569
A Server is a computer or device on a network that manages network resources. For example, a file server is a computer and storage device dedicated to storing files Any user on the network can store files on the server. A print server is a computer that manages one or more printers and a network...
19
226,801
Analytics and its tools have been very well received by bigger corporations in the recent past. This technical term has gained a lot of importance in the technology world. Corporations such as Google, Facebook are investing heavily to create a unique platform to do big data analysis. This analysis...
0
3,432
Whether you are a newbie who is interested in learning some basic concepts related to computer networks or an experienced fellow looking for a quick refresher on computer network fundamentals, this article is for you. In this article, we will discuss some basic terminologies related to computer...
0
5,398
The Bouncy Castle Crypto APIs is a set of implementations of cryptographic concepts and algorithms. Bouncy Castle APIs are developed in both Java and C#. These APIs can be freely downloaded from the Bouncy Castle home page. Let us have a glance at some of the important type of implementations...
2
9,641
Public Key Infrastructure Public key infrastructure is an architecture which supports mechanisms like integrity and confidentiality. It is heavily used in e-commerce, where business transactions are frequent and should be much secured. In fact business transaction starts only after the two...
0
4,233
Advanced Encryption Standard is a block cipher symmetric encryption algorithm. It is preferred to protect network communications, personal data etc using AES over DES. It encrypts or decrypts the data through several rounds. Categorization It is categorized under three types of key sizes –...
0
3,570
In this article, we will go through a simple example to demonstrate Encryption and Decryption techniques using Triple DES algorithms. We will use Bouncy Castle APIs for performing below steps. Encryption steps - Select an input message - Input message can be in the form of a string which the...
0
7,202