Rawconceal

Created: July 26, 2013  
Last Updated: July 7, 2014

Rawconceal

Rawconceal is an algorithm to hide any message using an image file. Unlike any other steganography methods where it alters or modifies the image file in some or the other way, Rawconceal will not modify or change the image file by even a single bit.

Virtual Private Networks – In-depth Technical Details

Created: June 11, 2013  
Last Updated: July 7, 2014

site to site VPN

This article is about Virtual Private Networks. In this article I will try to explain VPN from a completely technical perspective. I will explain what a tunnel is in VPN. I will also be focusing on various scenarios of using VPNs and how we use virtual network adapters for tunneling.

Top PC Games Worth Playing

Created: January 7, 2013  
Last Updated: July 7, 2014

Batman Arkham Knight

Out of quite many games I have played all this time, I have compiled a list of my favorite games that I found to be worth playing and sharing. Here is a list of Best PC games to play. I have also tried to give it relative ratings based on my personal experience.

The Internet Structure

Created: December 30, 2012  
Last Updated: July 7, 2014

Internet Schema

We all use the internet, many wonder how it works, many just don’t care, and a few knows the actual architecture of the internet. Hereby, I attempt to create a picture of the internet, its backbone structure, its governing bodies and how it all fits together and makes everything run so smoothly and efficiently. I will try to explain how the IP addresses, Domain names and other such namespaces in the internet are distributed, and who controls them.

Pages: 1 2 3 4 5 6 7 8

Dijkstra’s Algorithm in C

Created: December 30, 2012  
Last Updated: July 7, 2014

Dijkstra's Algorithm

Here is an implementation of the Dijkstra’s algorithm in C programming language. It should work on all linux platforms.

Raw Link – A Hybrid VPN Model

Created: December 29, 2012  
Last Updated: July 7, 2014

Virtual Private Network

The virtual private network world is dominated by the client-server technologies. And there are some rarely used peer-to-peer technologies also. Each of these technologies has its own advantages and disadvantages. So hereby we plan to invent a third type of VPN technology. It would be sort of a Hybrid technology of both- the client/server and the peer-to-peer technology. This Hybrid VPN protocol would have a server, but communications would take place directly between the clients. So in short, we plan to create a technology which would have best of both worlds. Here we will look at the existing VPN technologies, its advantages and disadvantages, which will form the base of our new Hybrid VPN Model.

A Problem With Strings

Created: December 29, 2012  
Last Updated: July 7, 2014

APWS

An Algorithm and C program that finds out for any string that is twisted and tangled, if it will form a Knot or not when its two ends are stretched.