A Simple Structure of two factor authentication to keep a check on privacy.

Can't find image

Bio-Hashing

We all want that no one can access our private data without our permission. For that, we use secret key (password or PIN) like in our different gadgets or in ATM card. But that secret key can be stolen and once it is, we will have no control on our data.

One other method used to provide protection to data is using our bio-metric data like fingerprint, iris or face-pattern. It has some advantage over previous one as it can’t be stolen since user can validate their identity only by being present on validation place. But here is a disadvantage that this criteria lead to increase in False rejection rate read more...

Make Notepad using Tkinter

Let’s see how to create a simple notepad in Python using Tkinter. This notepad GUI will consist of various menu like file and edit, using which all functionalities like saving the file, opening a file, editing, cut and paste can be done.

Now for creating this notepad, Python 3 and Tkinter should already be installed in your system. You can download suitable python package as per system requirement read more...

Can't find image

Python offers multiple options for developing GUI (Graphical User Interface). Out of all the GUI methods, tkinter is most commonly used method.

From Newbie to pro and take over the flow.

Can't find image

Viruses

Heya friends! Welcome back! Before continuing on with Malicious Logic, I request you to have a look at this great and informative article Worms, Viruses and Beyond!!

Now, this article will focus more on applications than theory of computer viruses, worms, and Trojan horses. But, please note that this article is meant to be used for educational purposes only.I, in no way, promote the usage of viruses, worms, or trojan horses to attack computer systems and causing damage