RSA is asymmetric key encryption algorithm which was first presented by three MIT researchers Ron Rivest, Adi Shamir and Leonard Adleman in the year 1977. This algorithm uses trapdoor function based on the fact that it is easy to compute…
Both functions scanf() and gets() are used to read the input from standard input (keyboard) But, there are differences in how they treat the input. scanf() Function gets() Function Signature of sanf() functionint scanf ( const char * format, ……
IPv4 address is binary string of 32 bits, it is used to identify each computer or device connected to internet or intranet uniquely. It is necessary to have IP address assigned to a device to participate in communication in a…
Go Programming language has two data types rune and string that are used to define characters and strings in go respectively Characters in Go Characters are runes in go language, rune literals are expressed in single quotes (‘) . Where,…
Go language has only one looping construct, that is for. There are three forms of for loops in Go. For can be used with single condition much like while loop in other programming language, a “for” clause which much like…
Python built-in function filter is helpful sometimes to write a compact code. Filter function takes two arguments “function” and “iterable”. Each element of iterator which is returned by iterable is passed to function (first argument). Function must return either True…
A leap year is the year which divisible by 4. But all century(multiples of 100) years that are divisible 4 are not leap years, in such a case it is tested against if it is divisible by 400. Here is…
String.fromCodePoint was introduced in ES6 to address shortcomings of String.fromCharCode to deal with UNICODE. Discussing String.fromCharCode vs String.fromCodePoint, both methods receive sequence of code points but String.fromCharCode require surrogate pair for supplementary characters while String.fromCodePoint also can receive directly code…
There are lot of command line tools available in Linux to dump files as ASCII, decimal, hexadecimal, octal and binary forms. Often it will be helpful when you want to study internals of any file structure or debugging/troubleshooting network systems.…
This article will help to configure network interface on Linux manually Prerequisites to configure network interface To configure network interface following things are required Terminal or SSH Access to shell via terminal emulator or via SSH IP Address IP Address…
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok