Ujjawal DixitKafka 101 : Broker, Producers , Consumers , Topics and PartitionsWhat is Kafka ?Feb 4, 20191Feb 4, 20191
Ujjawal DixitTypes of Security AttacksActive attacks: An Active attack attempts to alter system resources or affect their operations. The active attack involves some…Oct 8, 2018Oct 8, 2018
Ujjawal DixitFinding A Duplicate in Array: Detailed Way to SolutionSolution 1: Brute ForceOct 8, 2018Oct 8, 2018
Ujjawal DixitHyperLogLogHyperLogLog is an algorithm for the count-distinct problem, approximating the number of distinct elements in a multiset.Oct 7, 2018Oct 7, 2018
Ujjawal DixitTrie Data StructureStrings can essentially be viewed as the most important and common topics for a variety of programming problems. String processing has a…Oct 7, 2018Oct 7, 2018
Ujjawal DixitPython: Integer is Just Not integerThe Python language is built upon C Libraries. This means that every Python object is simply a cleverly-disguised C structure, which…Oct 7, 2018Oct 7, 2018
Ujjawal DixitDifference between breaking and cracking Encryption AlgorithmsIn the cryptanalysis field, there is a huge difference between “crack” and “break”.Oct 1, 2018Oct 1, 2018
Ujjawal DixitWhat is a shim?A shim is a small library that intercepts and changes calls to another library, mainly to aid compatibility.Oct 1, 2018Oct 1, 2018