The Responsibility Chain A design pattern that constructs a chain of receiver objects for a request is one of the Gang of Four design patterns.

"Avoid tying the sender of a request to its receiver by giving different objects a chance to handle the request," according to the Chain of…

ARP poisoning is the technique of utilizing ARP’s flaws to distort the MAC-to-IP mappings of other network devices. When ARP was first developed in 1982, security was not a top priority, therefore the protocol’s authors did not include any authentication procedures to validate ARP messages. Every device that is connected…

The Builder Design Pattern is a creational Design Pattern for creating complex objects. Builder design pattern is much helpful when a developer wants to create an object for a class which has numerous attributes. The object of the builder class is independent from the other objects.

The primary goals of…

Ensuring the correct messages reach the correct audience on the correct time is a fundamental business strategy for every business success. Failure in explaining why the solution is best for the ideal buyers will make the product to be less sold in the market even if it is the best…

What are Floating point errors?

Computers aren’t always as precise as we believe. They are really good at what they are told to do and can complete tasks quickly. However, in many situations, a minor error may have major ramifications. Floating point errors are a well-known problem. The accuracy with…

DNS (Domain Name Service) Spoofing is a computer attack where the user is diverted to a fraudulent or malicious or fake website which looks like the real one with the aim of stealing the user data (user credential in most cases). …

Before analyzing about evolution of software engineering, Let’s understand what is the difference between software and engineering.

Before analyzing about evolution of software engineering, let’s understand what is the difference between software and engineering.

What is a software?

Software is more than just a set of instructions. A software is…

Organization around the world invest a lot in computer security. Most of the organization have a dedicated IT team or they hire white hat hackers to perform penetration testing with the aim of patching the vulnerabilities. There are multiple ways and techniques used by the hackers to exploit technical vulnerabilities…

Amalakanthan R

Associate Software Engineer at Virtusa

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store