Anjana SModern AuthenticationDecades before we had a way to authenticate the users in order to access the data that is present on the website. How it was done there …Dec 3, 2023Dec 3, 2023
Anjana SCyber Kill ChainCyber Kill Chain talks about gathering possible vulnerabilities in the infrastructure, a device, or a network and attacking those…Aug 31, 2022Aug 31, 2022
Anjana SHyper AutomationIn simple terms hyper automation is the extension of traditional legacy business process automation by combining the efforts of…Jul 14, 2022Jul 14, 2022
Anjana SOpen Source IntelligenceOpen Source Intelligence (OSINT) is intelligence collected from publicly available resources. To take a real-life scenario let’s take that…Jul 6, 2022Jul 6, 2022
Anjana SGuessing Game in UipathThe Problem :- In this Game , the computer will have one random number in the memory and the user gets 5 chances to guess it . If the…Jan 30, 2022Jan 30, 2022
Anjana SRE Framework in UipathIt is also called as Robotic Enterprise Framework which is based on state machines. State machines are ones that uses finite number of…Jan 22, 2022Jan 22, 2022
Anjana SinAnalytics VidhyaAssociation Rule Mining Including Apriori AlgorithmSupermarkets have large number of customers checking into the shops and as Shop Owners they need to decide what products could be at which…Jan 2, 2022Jan 2, 2022