Getting Started with Angular Using Visual Studio Code

In this article, we are going to set up an Angular app using Visual Studio Code. We will use Angular CLI to demonstrate. Angular is a web application framework written in typescript. A web browser such as Chrome, Firefox or Internet Explorer only includes JavaScript, so we have to compile our Typescript to JavaScript, and we use a typescript compiler that requires NodeJS. NodeJS Node.js … Continue reading Getting Started with Angular Using Visual Studio Code

What is 401 Unauthorized Error? How to fix it?

The HTTP 401 Unauthorized error code indicates that the requested resources is restricted and to access the resources needs valid authentication, the requested client has lacks valid authentication for the target resources. Error 401 can occur in one of several possible scenarios.: The client sent its authentication credentials to the server, but the server has rejected the credentials. The client has not provided authentication credentials in the … Continue reading What is 401 Unauthorized Error? How to fix it?

dictionary implementation in typescript

Dictionary implementation in TypeScript

As a C# developer, Dictionary is very common and it’s a frequent part of development routine. it’s very helpful when we want to look up values based on keys. Just pass the keys and get the values…bingo. Moreover, C# library enables to use it as a generic way (using the same class with different data type – not dependant on specific data type). Recently I … Continue reading Dictionary implementation in TypeScript

JS Projects for Beginner – Get Random Quote – Get a grip Javascript

The Random Quotes project is fairly simple. Create a simple page with button, When the “Generate Quote” button is pressed, it triggers a change in quote and the author name. In this project i am getting the quotes from api via promise call and update the quote colletion. When the “Generate Quote” button is pressed, respective HTML control value get updated. It uses Math.Floor() and Math.random() methods to display random quotes accross project. for the … Continue reading JS Projects for Beginner – Get Random Quote – Get a grip Javascript

JS Projects for Beginner – Change page background colour

Create a simple html page, Implement the JavaScript code such that every time the button is clicked on html page, the background colour of page should change. Problem Statement credit: Solutions: Html Simple html page one button with ‘btn’ id JS code: In script, I have added event listener for button and on click inside function gets called, Function creates a rgb colour value … Continue reading JS Projects for Beginner – Change page background colour

Youtube Error 503 Solved in 10 Minutes

The most widely recognized disappointment on Youtube is the ‘Youtube error 503’ message that springs up when an end-client attempt to get to a page that is incidentally inaccessible.  The error, which is an HTTP status code, is a ramification of a worker’s inaccessibility at that particular second.  We investigate five distinct arrangements that can help in taking care of this issue and how to … Continue reading Youtube Error 503 Solved in 10 Minutes

machine learning with .net, machine learning tutorial, machine learning online course, machine learning course, machine learning step by step guide, machine learning steps for beginners

Machine Learning – Understanding and Introduction

Machine learning(ML) is the process of training machines by feeding data to an algorithm. As a result, machines can make smart decisions or good predictions. This prediction can be improved by experience and data.ML is a branch of artificial intelligence (AI). This enables the ability of computers to learn without being explicitly programmed. So, that machine can carry out certain tasks. For example, email filtering … Continue reading Machine Learning – Understanding and Introduction

The Binary Numbering System (base-2)

Every machine is an electronic system. in order to communicate with machines, the best way is to via electrical signals. Every electronic machine has a minimum of two signals i.e. “positive” and “negative”. Considering this as fundamental principles computers used binary to build their systems The Binary Numbering System is the most fundamental numbering system in all digital and computer-based systems. a binary number is … Continue reading The Binary Numbering System (base-2)

thread.sleep, thread.sleep in c#,thread.sleep in c# console application, thread.sleep in c# windows application, thread.sleep in c# not working

Why you should avoid Thread.Sleep

Introduction Thread.Sleep allows user to hold or suspend or block the current thread execution till a predefined time. it is implemented in System.Threading.Thread.dll assembly. It has two overload method C# Source code to demonstrate thread sleep Why you should avoid Thread.Sleep Thread.Sleep required hardcoded sleep time value, which is not a good idea at all. In multithread applications, handling a race condition using Thread.Sleep is … Continue reading Why you should avoid Thread.Sleep

MD5 – Message-Digest Algorithm

The MD5 hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length encrypted value further used for authentication. As it is hash function so it is irreversible. MD5 hash function is severely compromised, MD5 is not collision-resistant. The weaknesses of MD5 have been exploited in the field, most infamously by the Flame malware … Continue reading MD5 – Message-Digest Algorithm

Why we need Continues Deployment?

Continuous Deployment (CD) is an autonomous release process that uses automated testing to validate changes for instant auto deployment to a production environment. As good software practice, developer often break big task into small piece for smooth development and integration in other side it’s also good for end user to grasp the small changes. But releasing software frequently is not easy task. Frequent release come … Continue reading Why we need Continues Deployment?

Diffie Hellman Key Exchange

In early 70’s to send a secret message, both parties (sender and receiver) have to exchange the key to encrypt and decrypt the message. Exchange secret key may lead to compromising the security, as while exchange this key if someone intercepted secret key then the interceptor can decrypt all messages. This problem is called the key exchange problem in computer science  The key exchange problem … Continue reading Diffie Hellman Key Exchange

Modular Exponentiation

Modular Exponentiation as also known as repeated sequence algorithm which performs exponentiation over modulus. Which essential in computer cryptosystems. A typical problem related to cryptography involves exponentials with a very large number e.g. 36078267  mod 17. To perform these very large number calculation we need an efficient approach. The approach should be a time-efficient and memory-efficient approach. As directly calculating (36078 * 267 mod 17) … Continue reading Modular Exponentiation


Cryptography – Mixture of Art and science

Being human, we always concern about our privacy. Privacy plays a significant role in our lives, right from starting on the day till the end of the day. As part of privacy, we want our data, message to be secure. A common example is when we send a text message mostly expecting that only intended recipients should receive it. So being intelligent, human started manipulating … Continue reading Cryptography – Mixture of Art and science

Deep Dive in RC4 (RC4 Source Code in C#)

RC4 (Rivest Cipher 4) was designed by Ron Rivest. It is remarkable for its speed and simplicity. It widely used in many applications and protocols. Though, there are multiple Vulnerability has been discovered in RC4.  It is a stream cipher type. It encrypt/decrypt input data one by one. In this way, the encryption or decryption can be implemented on the length of the variable. This algorithm does not … Continue reading Deep Dive in RC4 (RC4 Source Code in C#)

eXtended Tiny Encryption Algorithm (XTEA) – PART II

In this article, we will demonstrate eXtended Tiny Encryption Algorithm (XTEA). Don’t forget to read the Part I of TEA. XTEA (eXtended TEA) is a block cipher designed to fix weaknesses in TEA. Like TEA, XTEA is a 64-bit block Feistel cipher with a 128-bit key and a suggested 64 rounds. As per book “Information Security and Cryptology – ICISC 2003“ TEA is a 64-round … Continue reading eXtended Tiny Encryption Algorithm (XTEA) – PART II

Cryptography - Tiny Encryption Algorithm, TEA

Tiny Encryption Algorithm (TEA)- Part I

 Tiny Encryption Algorithm is a simple, powerful & notably fast encryption algorithm. Although TEA algorithm has a few weaknesses as it suffers from equivalent keys (Which left the room for related-key attacks) – each key is equivalent to three others, which means that the effective key size is only 126. It is Feistel type cipher, the algorithm relies on the alternate use of XOR and ADD … Continue reading Tiny Encryption Algorithm (TEA)- Part I

Deterministic Algorithm

A deterministic algorithm is an Algorithm in which for a given input, the computer will always produce the same output by going through the same states that also means for given the same input, it will take the same amount of time/memory/resources every time it run. In other words, I would say A deterministic algorithm is simply an algorithm that has a predefined output. For instance, … Continue reading Deterministic Algorithm

Symmetric encryption Cryptography

Symmetric Cryptography

This is the simplest kind of Cryptography that involves only one secret key to encrypt and decrypt information. It is also known as “Secret Key Cryptography”.   Both Sender and receiver should know the key to be able to communicate securely.   For Example: if Mahesh & Shalini wants to communicate using symmetric-key cryptography then both would have to devise key and use it for … Continue reading Symmetric Cryptography