Database encryption in Java

Basically, encryption is the process or conversion of user data in code or more specifically in the cyphertext form in order to prevent unauthorized access, So, encryption is very much important in today’s world where we all are working on large datasets stored in databases and the credentials of the database must be secured in order to secure the privacy and unauthorized access.

[mai mult...]

How to Disable Keylogger in Windows 10

The term Keylogger is mostly associated with spyware or malware programs designed to record the key strokes of unknowing computer users in a covert manner, with a harmful intent. In the case of Windows 10, the term Keylogger began to be associated with the program when the trial version of Windows 10 was released with an in-built Key logging functionality.

[mai mult...]

P2P(Peer To Peer) File Sharing

A peer-to-peer network allows computer hardware and software to communicate without the need for a server. Unlike client-server architecture, there is no central server for processing requests in a P2P architecture. The peers directly interact with one another without the requirement of a central server.

[mai mult...]

Program to remotely Power On a PC over the internet using the Wake-on-LAN protocol

Wake-on-lan is an Ethernet or token ring computer networking standard that allows a computer to be turned on or awakened by a network message.

  • The message is usually sent to the target computer by a program executed on a device connected to the same local area network, such as a smartphone.
  • It is also possible to initiate the message from another network by using subnet-directed broadcasts or a WOL gateway service.
  • Equivalent terms include wake on WAN, remote wake-up, power on by LAN, power up by LAN, resume by LAN, resume on LAN and wake up on LAN.
[mai mult...]

How to Read Encrypted WhatsApp Messages on Android Without Keys

One of the reasons why WhatsApp becomes one of the most popular messaging services is because of the strong security feature. It encrypts messages from end to end, so the only ones who can read those messages are the sender and the receiver – unless someone else can open either the sender’s or receiver’s phones. But sometimes even the owner of the phone can’t access his/her phones due to technical glitches.

[mai mult...]

Use PowerShell to Set Environment Variables

PowerShell Environmental variable stores the Windows Operating System information like the Operating System path where it installed, System Drive, User profile path, number of Processors, etc. They can be used by another program or the child parent processes because they are easier to work.Setting the environment variable using the PowerShell is the easy way, and for that, we can use either the simple variable appending method, the .Net method, or the Set-Item cmdlet.

[mai mult...]