Ayyappan SubramanianNearly, 700,000 OpenSSH servers are vulnerable to RCE? — An overview on regreSSHionIf you are not a medium member, you can also read my article on my blog www.hashtagtechnophile.comJul 5Jul 5
Ayyappan SubramanianQuantum Key Distribution (QKD) — Unbreakable encryption for Next-Gen network securityWill you believe that particles like photons can secure our communications? It might sound like science fiction, but QKD is a reality. It…Jul 3Jul 3
Ayyappan SubramanianInheritance in Java ft.Kollywood CinemaRajinikanth, known for his unique style, swag and iconic roles, has set the foundation for modern Tamil cinema. Definitely, we would have…Jun 26Jun 26
Ayyappan SubramanianFoundation of Cryptography Part 4: Square and Multiply AlgorithmWelcome back to another article of the series “Foundation of Cryptography”. The previous article of this series discussed about Hill Cipher…Dec 29, 2023Dec 29, 2023
Ayyappan SubramanianFoundation of Cryptography Part 3: Hill Cipher AlgorithmThe Hill cipher algorithm is a symmetric encryption algorithm used in cryptography. It operates on blocks of plain text and uses matrix…Dec 23, 2023Dec 23, 2023
Ayyappan SubramanianFoundation of Cryptography Part 2: Classical CiphersWelcome back to another article of the series “Foundation of Cryptography”. The previous article of this series discussed about…Dec 5, 2023Dec 5, 2023
Ayyappan SubramanianFoundation of Cryptography Part 1— : IntroductionWelcome to a new series which deals with the foundation of cryptography. This article gives you a brief introduction about the…Nov 14, 2023Nov 14, 2023
Ayyappan SubramanianAccess Control Matrix (ACM) in terms of Operation Security — its usage and purposeWelcoming back to another article! This article deals with the Access Control Matrix (ACM) and its purpose.Oct 30, 2023Oct 30, 2023
Ayyappan SubramanianExploring the Layers: A deep dive into Android OS ArchitectureWelcoming back to another article! This article deals with the Android OS architecture and its layers.Sep 18, 20231Sep 18, 20231
Ayyappan SubramanianThe Concept of Rule Availability in Pega and its TypesIf you are a Pega developer then probably you are aware that Pega is made up of rules. Rules define a specific case behaviour but, to…Sep 10, 2023Sep 10, 2023