Explore an alternative to traditional passwords: passkeys.
Also find me here:
Baeldung Author
Subham Datta
I'm currently pursuing Ph.D. degree in Computer Engineering from the University of Cyprus. I'm also working at KIOS Research and Innovation Center of Excellence. My research area includes Cyber Security, Algorithms, Machine Learning. In my free time, I love watching cricket and movies.
Here's what I've written (so far):
Baeldung on Computer Science
- All
- Networking (35)
- OS (24)
- Security (23)
- Algorithms (23)
- Trees (11)
- Graphs (8)
- Programming (7)
- Math and Logic (7)
- Data Structures (7)
- Path Finding (4)
- Sorting (2)
- Software Architecture (2)
- Graph Traversal (2)
- Core Concepts (2)
- Artificial Intelligence (2)
- Web (1)
- Searching (1)
- Machine Learning (1)
- Concurrency (1)
What Is Middleware?
Filed under Security
Explore the basic concept of middleware, along with an example.
How Does Meet-in-the-Middle Attack Work?
Filed under Security
Learn about the meet-in-the-middle attacks (MITM).
Telnet vs. SSH
Filed under Networking
Explore two popular network protocols: Telnet and Secure Shell Protocol (SSH).
Network Management Principles With SNMP
Filed under Networking
Learn how Simple Network Management Protocol (SNMP) works.
Selective Repeat Protocol
Filed under Networking
Learn about a protocol used for the reliable delivery of data packets in networks: Selective Repeat Protocol (SRP).
Software Engineering: What Is a Shim?
Filed under Software Architecture
Explore the shim concept in software engineering with an example.
Wireless Disassociation Attacks
Filed under Security
Learn how an attacker could launch wireless disassociation attacks on devices connected to a network.
Switching Techniques in Computer Networks
Filed under Networking
Explore three popular network-switching techniques: circuit, packet, and message switching.