Sunny NehraBursting the Quantum Computing Hype Bubble with Real FactsThe news, social media, television shows, conferences, etc nowadays be like “Quantum computing will change our life in all ways”, Quantum…Jun 18Jun 18
Sunny NehraHow can hackers hack into someone’s facebook or email accounts?This article is conceptual, logical, factual and technical. I will advice all of your to go through it very carefully and suggest…May 12, 2020May 12, 2020
Sunny NehraUnderstanding UASF (BIP 148) , BIP 9 , Segwit and Segwit2x signallingNOTE : If you want to read about basics of Bitcoin Improvement proposals and its need you can refer to this article …Nov 13, 2019Nov 13, 2019
Sunny NehraWhat is the concept behind SQL injection? How does SQL injection work?Sql Injection is basically an attack that relies on adding some content to any input ( user input) in any query so as to manipulate the…Nov 13, 2019Nov 13, 2019
Sunny NehraWhat is the difference between AI, Machine Learning, NLP, and Deep Learning?This has become one of the most asked questions nowadays ! Let me try to nail these all at my best.Nov 13, 2019Nov 13, 2019
Sunny NehraHow are changes made to Bitcoin ?Well bitcoin doesn’t have any owner or centralised system. Its an open source. Anyone can become a node to facilitate its functioning (…Nov 5, 2019Nov 5, 2019
Sunny NehraHow Scammers are using thermal cameras to steal ATM pins , your passwords and others | Hacks and…Well i just noticed that we don’t have any video on social engineering or such attacks which are not about hard coding skills or…Nov 5, 2019Nov 5, 2019
Sunny NehraUnderstating asymmetric and symmetric key cryptography, hash functions, MITM attacks, Salts…Our cryptography playlist on youtube has covered most of this : https://www.youtube.com/playlist?list=PLf8bMP4RWebLVGpUnhji9Olkj1jdXfzFdNov 5, 2019Nov 5, 2019