Profile cover photo
Profile photo
Donnie Ashok
178 followers -
Law Student and Freelance Web Designer
Law Student and Freelance Web Designer

178 followers
About
Donnie's posts

Post has attachment
The internet Thanks to the internet you are reading this article right now. How did the internet get to where it is right today? There is so much history we cannot possibly get it together in this short article. The internet actually got a start about 50…

Post has attachment
As per the latest reports, State Bank of India along with ten other commercial banks, is taking the lead in building the country’s first financial blockchain framework. Reportedly, Axis Bank, Central Bank of India, DCB Bank, Deutsche Bank, HDFC Bank,…

Post has attachment
Bitcoins are all set to disrupt financial exchanges globally. In just one year the value of all bitcoins together have risen from USD 6 billion to USD 16 billion.[note]Bitcoin Market Capitalisation Chart – Mar 2016 – Feb 2017 – Coindesk[/note] At this…

Post has attachment
Digital Signatures are considered to be more secure than the traditional ink signatures we all are used to. This is because ink signatures can be copied manually and exact duplicates can also be created through various ways. However, digital signatures…

Post has attachment
Encryption as explained earlier[note]Encryption and Symmetric Cryptography – How is data secured electronically?[/note] is simply substitution of letters with numbers and then using complex mathematical functions to alter the pattern of numbers. This…

Post has attachment
Computers got popular mostly as a mode of communication. And as the relevance of computers grew in everyday life the need to secure stored data increased proportionately. There arose the need of encryption of stored data on a computer system. Encryption…

Post has attachment
To start with digital fingerprints or hashing you need to understand what is a fingerprint and what is digital (no kidding).   What is a fingerprint? Normally a fingerprint in biology and biometrics is the unique pattern of whorls and lines on the…

Post has attachment
Internet developed rapidly leaving little or no scope for its terminologies to develop. Most internet terms and phrases are English loanwords most analogous to the concept being described. Phishing as a concept is analogous to fishing where predators wait…

Post has attachment
The entire gamut of Indian Technology Law contains references to “digital information”, “digital signatures”, “cryptography”, “public key”, “private key”, etc. And without clarity at the origin it gets much difficult at later stages to understand more…

Post has attachment
Wait while more posts are being loaded