Data Structure
Java
Python
HTML
Interview Preparation
Interview Prep
Tutorials
Tracks
DSA
Practice Problems
C
C++
Java
Python
JavaScript
Data Science
Machine Learning
Courses
Linux
DevOps
Similar Topics
Web Technologies
32.1K+ articles
DSA
20.0K+ articles
Python
19.6K+ articles
Java
9.3K+ articles
Mathematical
5.1K+ articles
Java-Functions
4.2K+ articles
Arrays
4.2K+ articles
PHP
3.8K+ articles
C++
3.7K+ articles
Java - util package
1.6K+ articles
misc
60 posts
Recent Articles
Popular Articles
Megabit vs Megabyte: Know the Difference
Last Updated: 23 July 2025
In the digital world, terms like "megabit" and "megabyte" frequently pop up, especially when discussing internet speeds and data storage. Though they may sound similar, th...
read more
TechTips
misc
Computer Subject
Types of Cracking
Last Updated: 23 July 2025
Cracking is a technique used to breach computer software or an entire computer security system, and with malicious intent. Though functionally the same as hacking, crackin...
read more
Technical Scripter
misc
Ethical Hacking
Information-Security
Cyber-security
7 Layers of IT security
Last Updated: 23 July 2025
Looking at the OSI model, it's evident that more than a few security protocols are required to be fully protected. All potential access points and sites where hackers coul...
read more
misc
Ethical Hacking
How Should Unhandled Errors Preferably be Resolved in Node.js ?
Last Updated: 10 July 2024
Unhandled errors in Node.js can lead to unexpected application crashes, data corruption, and poor user experiences. Effectively managing these errors is crucial for buildi...
read more
misc
Node.js
NodeJS-Questions
Difference Between Red Team and Blue Team in Cyber Security
Last Updated: 29 August 2025
Organizations are always looking for methods to strengthen their defenses against possible attacks in the ever-evolving realm of cybersecurity. Many use a technique known ...
read more
misc
Difference Between
Ethical Hacking
Cyber-security
Zero Trust Security Model
Last Updated: 23 July 2025
In this Era of Cyber security, no user or devices outside or inside the organization network should be automatically trusted, regardless of their location or level of acce...
read more
misc
Ethical Hacking
Cyber-security
Colour Wheel of Cyber Security
Last Updated: 23 July 2025
According to NIST, the ability to protect or defend the use of cyberspace from cyber-attacks is known as cyber security. Now, for companies some exercises/strategies inclu...
read more
misc
Ethical Hacking
Cyber-security
Kth Maximum Level sum
Last Updated: 18 April 2023
Given a binary tree and a non negative integer k. Find and return the Kth maximum level sum in a binary tree. If the levels are less than k, return -1.Examples:Input: root...
read more
Tree
misc
Functional
GitHub
ProGeek 2.0
DSA
Structure of Wireless Communication Link
Last Updated: 14 March 2023
The Structure of a wireless communication link involves several key components that work together and maintains the connection between the transmitter and the receiver. Ev...
read more
misc
Computer Networks
GateCS2023
Computer Networks-Network Layer
Wireshark Wireless Functions
Electronics
Data Warehousing Security
Last Updated: 23 July 2025
Data warehousing is the act of gathering, compiling, and analyzing massive volumes of data from multiple sources to assist commercial decision-making processes is known as...
read more
misc
Information-Security
Data Warehouse
Data Engineering
Evil-winrm Tool For Penetration Testing
Last Updated: 23 July 2025
This program is available on all Microsoft Windows servers (usually port 5985) that have this feature enabled. Of course, only if you have the credentials and permissions ...
read more
misc
Ethical Hacking
Install Honeypot on Linux With Demo
Last Updated: 23 July 2025
Honeypots are computer applications that collect information from hackers and other criminals. They can be used from a physical or a virtual location, and come in many for...
read more
misc
Ethical Hacking
What is PeStudio?
Last Updated: 23 July 2025
PeStudio is a tool to find suspicious artifacts within executable files to accelerate the first malware assessment. Using this tool, the analyst can easily spot the functi...
read more
Analysis of Algorithms
misc
How To
DSA
Explore the concept of JavaScript Function Scope and different types of JavaScript Functions
Last Updated: 17 August 2022
JavaScript is based on functional programming. Therefore, functions are fundamental building blocks of JavaScript. So the function is called first-class citizens in JavaSc...
read more
misc
JavaScript
Web Technologies
Picked
Geeks Premier League
Geeks-Premier-League-2022
JavaScript-Questions
Maximize the sum of elements arr[i] selected by jumping index by value i
Last Updated: 23 July 2025
Given an array arr[], the task is to calculate the maximum sum of elements from the array such that, if an ith element is picked, then arr[i] is added to the sum and i jum...
read more
Dynamic Programming
Greedy
misc
DSA
Arrays
1
2
3
4