We are living in the world, where protection of security is very important, and security does not comes free This is basic building block of any security.
SSH is a secure protocol for secure remote login. It is widely used remote login protocol to login from one linux/unix system to another linux/unix system login.
This post is about 4 phases of SSL (Secure Socket Layer) protocol and how it works internally before start sending data over the transport layer from Application layer.
Continue reading 4 phases of SSL protocol
This post is about SSL(Secure Socket Layer) handshake protocol, you can say that SSL is a handshake protocol which allows server and client to exchange different parameters. This protocol performs its various job before application data is transmitted. There are lot of steps and things run behind the this protocol. SSL is a protocol which is used to send the encrypted data over the transport network.
Eclidean algorithm is used to find gcd of numbers, which is being used in mathematics extensively but how can we find gcd in programming language? we will learn in this article.
Continue reading Euclidean algorithm to find gcd