Tutorials
Courses
Data Structure
Java
Python
HTML
Interview Preparation
DSA
Practice Problems
C
C++
Java
Python
JavaScript
Data Science
Machine Learning
Courses
Linux
DevOps
SQL
Web Development
System Design
Aptitude
GfG Premium
Similar Topics
Web Technologies
37.4K+ articles
Python
21.3K+ articles
Misc
8.5K+ articles
Computer Networks
3.6K+ articles
Difference Between
3.5K+ articles
GBlog
3.1K+ articles
Computer Subject
1.1K+ articles
Ethical Hacking
748+ articles
Cyber-security
425+ articles
Network-security
140+ articles
Information-Security
269+ posts
Recent Articles
Popular Articles
Security as a Service (SECaaS)
Last Updated: 02 August 2022
A business model called SECaaS, or Security as a Service, offers security to IT companies on a subscription basis. A superior security platform is provided by the outsourc...
read more
Computer Networks
Information-Security
Cloud-Computing
How To Remove Password From a PDF File on Windows, Mac, or Linux(Free & Easy Methods)
Last Updated: 26 June 2025
Have you ever encountered a PDF file that’s locked with a password, making it difficult to access the content? Knowing how to remove a password from a PDF can save you tim...
read more
TechTips
Picked
How To
Information-Security
How To
Symmetric Cipher Model
Last Updated: 02 November 2022
Symmetric Encryption is the most basic and old method of encryption. It uses only one key for the process of both the encryption and decryption of data. Thus, it is also k...
read more
Computer Networks
Picked
Information-Security
Different Phases of Data Life Cycle in Cloud Computing
Last Updated: 05 January 2023
Pre-requisite:- Cloud ComputingThere is a misconception about data privacy that it is a subset of information, in the following article we’ll discuss privacy in cloud comp...
read more
Technical Scripter 2022
Information-Security
Cloud-Computing
Cloud Computing
Davies-Meyer Hash Function
Last Updated: 09 March 2023
Pre-requisites: Merkle-Damgard constructionA Merkle-Damgard construction for collision-resistant hash functions required us to design a fixed-length, collision-resistant c...
read more
Computer Networks
Information-Security
PRG, PRF and PRP in Cryptography
Last Updated: 09 March 2023
Cryptography is the study and practice of techniques for secure communication in the presence of third parties called adversaries. It deals with developing and analyzing p...
read more
Computer Networks
Information-Security
Data Warehousing Security
Last Updated: 06 May 2023
Data warehousing is the act of gathering, compiling, and analyzing massive volumes of data from multiple sources to assist commercial decision-making processes is known as...
read more
misc
Information-Security
Data Warehouse
Data Engineering
What is an Asymmetric Encryption?
Last Updated: 13 August 2024
Asymmetric encryption, also known as public-key cryptography, is a type of encryption that uses a pair of keys to encrypt and decrypt data. The pair of keys includes a pub...
read more
Computer Networks
Picked
Information-Security
Types of Cracking
Last Updated: 07 May 2023
Cracking is a technique used to breach computer software or an entire computer security system, and with malicious intent. Though functionally the same as hacking, crackin...
read more
Technical Scripter
misc
Ethical Hacking
Information-Security
Cyber-security
How to hack android phones with Phonesploit
Last Updated: 14 October 2024
Understanding how to hack Android phones with Phonesploit has become a topic of interest and concern. Phonesploit is a powerful tool that allows users to remotely access a...
read more
Python
Linux-Unix
Installation Guide
Ethical Hacking
Information-Security
Cyber-security
Kali-Linux
Ethical Hacking - Basics
Top Online Scams and How to Avoid Internet Scams
Last Updated: 24 April 2025
Online scams are fraud schemes carried out over the internet to fraud people, collectpersonal information, or earn financial benefits through illegal methods. These frauds...
read more
TechTips
Picked
Information-Security
Cyber-security
How To
Web Security
Top 10 Common Frontend Security Attacks
Last Updated: 01 May 2024
In today’s digitization era, web applications are more prevalent than before as our every need from basic to higher (shopping, Banking, Booking, Medical needs, etc) has we...
read more
GBlog
Picked
Information-Security
Network-security
Web Security
GBlog 2024
Bharti Airtel Interview Experience For Information Security and Cloud Operations (On-Campus)
Last Updated: 16 May 2024
Company: Bharti AirtelProfile: Information Security and Cloud OperationsIt was an on-campus drive specifically for females. My resume was shortlisted for this position at ...
read more
Interview Experiences
Information-Security
On-Campus
Experiences
Write It Up 2024
Bharti Airtel
Stages in System Hacking
Last Updated: 06 May 2025
System Hacking is a way through which an attacker or an unauthorized person gains access to your system and starts performing unusual activities on your system (like sendi...
read more
Articles
Ethical Hacking
Information-Security
How to become an Information Security Analyst?
Last Updated: 15 April 2025
Information security refers to the processes and methodologies used to protect sensitive information from unauthorized access, disclosure, disruption, modification, or des...
read more
Picked
Information-Security
GFG Academy
How to become
1
2
3
4
...
18
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our
Cookie Policy
&
Privacy Policy
Got It !