Profile cover photo
Profile photo
Kapil Garg
44 followers -
What you think is what you see.
What you think is what you see.

44 followers
About
Posts

Post has attachment

Post has attachment
Hash Tables : Handling Collision
Hash Tables : Handling Collision
fetch-info.blogspot.com
Add a comment...

Post has attachment
Add a comment...

Post has attachment
Wondering Cache
Wondering Cache
fetch-info.blogspot.in
Add a comment...

Post has attachment
If you have ever wondered how cache works or you are having a hard time understanding it for your curriculum or for your computer programs then you might check this article out.
Wondering Cache
Wondering Cache
fetch-info.blogspot.in
Add a comment...

Post has shared content
Have you ever wondered how images are processed by search engines or robots for object recognition, image search, scene recognition , face recognition etc. ? Then you must read the following article to get a glimpse of image processing using python.
#fetch_info #images
Image Search Engine Using Python
Image Search Engine Using Python
fetch-info.blogspot.com
Add a comment...

Post has attachment
Have you ever wondered how images are processed by search engines or robots for object recognition, image search, scene recognition , face recognition etc. ? Then you must read the following article to get a glimpse of image processing using python.
#fetch_info #images
Image Search Engine Using Python
Image Search Engine Using Python
fetch-info.blogspot.com
Add a comment...

Post has attachment
Add a comment...

Post has attachment
Finally the source code is here. A simple authentication system which can logs in the user to the system and manage sessions. A general algorithm is discussed in the following article based on which a simple 2 page system has been designed to understand the concepts. Read along and share your thoughts.
#info-well #security
Add a comment...

Post has shared content
Designing a mechanism which can securely authenticate the user and can prevent information theft is a really tedious task if we don't know about the techniques and the concerned vulnerabilities. We can start learning about the design techniques and can learn how to prevent cookie theft, session hijacking etc. with the help of the following article.
#info-well #hacked
Wait while more posts are being loaded