developers.comHow to Safeguard Yourself from Phishing: Understanding the Sneaky Cyber ThreatUnderstanding Phishing: A Sneaky Cyber Threat In the realm of cybersecurity, phishing stands out as a crafty method used by cybercriminals to trick individuals into giving away sensitive information. Imagine receiving an email that seems entirely leg...Dec 8, 2023·2 min read
developers.comALGORITHM, TIME & SPACE COMPLEXITY (with in 3min)ALGORITHM The typical definition of an algorithm is a formally defined procedure for performing some calculation. Algorithms are mainly used to achieve software reuse. Once we have an idea or a blueprint of a solution, we can implement it in any hi...Dec 29, 2022·3 min read
developers.comTypes of Data StructuresGeneral categorization of Data Structures Data structures are generally categorized into two classes Primitive data structures Non-primitive data structures Primitive data structures are the fundamental data types that are supported by a program...Dec 21, 2022·3 min read
developers.comVCS in open sourceVCS This version control system(VCS) should be able to show differences between versions of work created and even detect if there is any conflict between the two versions. Keeps a track of modifications made. Also known as the core of open source o...Dec 18, 2022·2 min read
developers.comIntroduction To Data StructuresBy reading the title the first question that comes to our mind is What are data structures? A data structure is a group of data elements that are put together under one name. Which defines a particular way of storing Organizing data in a computer ...Dec 17, 2022·2 min read