Posts

B.tech previous year papers

  B.tech 2nd year 3rd sem

Mathematics Formula

Math's formula  

DBMS NOTES For B.Tech,BCA

DBMS NOTES  

BCA All previous year papers

2nd sem 1st sessional paper   2nd semester 2nd sessional paper 3rd semester 1st sessional 3rd sem 2nd sessional 1st semester 1st sessional paper 1st semester 2nd sessional 1st semester (Even) paper 2nd semester (odd) paper 2nd year 3rd odd semester

Authentication

Basics of Authentication 1.Authentication is the process of confirming the identity of a user or system attempting to access a resource. It ensures that the entity trying to gain access is indeed who or what it claims to be. The basics involve three factors: something you know (like a password), something you have (like a smartphone for two-factor authentication), or something you are (like biometric data - fingerprint, facial recognition). These factors combined form the foundation for various authentication methods used in digital security. Attacking a Password System Attacking a password system involves various techniques aimed at exploiting vulnerabilities to gain unauthorized access. Some common methods include: 1.Brute Force Attack: Trying all possible combinations of characters until the correct password is found. This method requires time but can be effective against weak passwords. 2.Dictionary Attack: Using a list of commonly used passwords or words

Computer organization & Architecture Notes

Image
Computer architecture is the organisation of the components which make up a computer system and the meaning of the operations which guide its function.  Notes 1 Notes 2 Notes 3 Unit 4