Explore a technique spammers use to steal sensitive data and launch cyber attacks: spam.
Also find me here:
Baeldung Author
Subham Datta
I'm currently pursuing Ph.D. degree in Computer Engineering from the University of Cyprus. I'm also working at KIOS Research and Innovation Center of Excellence. My research area includes Cyber Security, Algorithms, Machine Learning. In my free time, I love watching cricket and movies.
Here's what I've written (so far):
Baeldung on Computer Science
- All
- Networking (35)
- OS (24)
- Security (23)
- Algorithms (23)
- Trees (11)
- Graphs (8)
- Programming (7)
- Math and Logic (7)
- Data Structures (7)
- Path Finding (4)
- Sorting (2)
- Software Architecture (2)
- Graph Traversal (2)
- Core Concepts (2)
- Artificial Intelligence (2)
- Web (1)
- Searching (1)
- Machine Learning (1)
- Concurrency (1)
The Different Types of Backups in Computing
Filed under Security
Explore different types of backups in computing.
What Are Sessions? How Do They Work?
Filed under Web
Explore web sessions in detail.
Transport Layer: Multiplexing and Demultiplexing
Filed under Networking
Explore multiplexing and demultiplexing techniques.
What Is Ad Hoc Testing?
Filed under Programming
Learn about an unstructured and quick-to-perform testing technique: ad hoc testing.
Basics of One-time Passwords
Filed under Security
Explore a modern security mechanism used for authentication: one-time password (OTP).
Database Sharding vs. Partitioning
Filed under Core Concepts
Explore two methods for splitting databases into parts to manage them efficiently: sharding and partitioning.
What Are Brute Force Attacks?
Filed under Security
Explore brute-force attacks in detail.
Mobile Networking: Snooping TCP
Filed under Networking, Security
Explore a technique used to inspect and analyze TCP traffic on a network: snooping TCP.