A

Akhil Trivedi's Thecoderzone.com

all about code & web

  • Rated3.0/ 5
  • Updated 7 Years Ago

Recent blog posts from Thecoderzone.com


Security Goals | The Coder Zone
Security Goals | The Coder Zone
The main Goal of  Security is to protect data or information which is being transmitted and achieve the Confidentiality Integrity & Availability of the data....
7 Years Ago
BlogAdda
Security Attacks In Network Security | The Coder Zone
Security Attacks In Network Security | The Coder Zone
Security Attacks an attack is an action that comprises the information or network security. There are two types of attacks: Passive Attack and Active Attack...
7 Years Ago
BlogAdda
Asymmetric Key Cryptography | The Coder Zone
Asymmetric Key Cryptography | The Coder Zone
Asymmetric key cryptography is called a public key cryptography.Asymmetric key cryptography two keys are used, one for encryption and other for decryption....
7 Years Ago
BlogAdda
Symmetric Key Cryptography | The Coder Zone
Symmetric Key Cryptography | The Coder Zone
Symmetric key cryptography also called as Secret key cryptography.Symmetric key cryptography a single key is used for encryption as well as decryption....
7 Years Ago
BlogAdda
Working with JSON | The Coder Zone
Working with JSON | The Coder Zone
A common use of JSON is to read data from a web server, and display the data in a web page. Objects in PHP can be converted into JSON by using the PHP function json_encode() in reverse you can use js...
7 Years Ago
BlogAdda
Redirect Based On Referrer Or IP Address | The Coder Zone
Redirect Based On Referrer Or IP Address | The Coder Zone
Using PHP you can easily redirect your website visitors to a different page depending on where they come from. For example you may have 2 different web sites selling a product but only one customer ca...
7 Years Ago
BlogAdda
...