Nadeem

Nadeem

Authy – Google Authenticator Alternative

Alternative to Google Authenticator featured Image

Google Authenticator Alternative With the fast-growing risk of hacking, two-factor authentication is a second layer of security. In two-factor authentication, we need two keys to log into an account. Two-factor authentication is available with almost all accounts nowadays. There will…

Excel Formulas and Functions

Excel Formulas and Functions Featured Image

Excel formulas and functions are two words that you may have heard a lot during the Excel learning process. Those words are sometimes used interchangeably, this is why they might be confusing at times. Do not worry we are here…

100 Useful Microsoft Excel Shortcuts

Microsoft Excel Shortcuts Featured Image

Excel Shortcuts. In the journey of learning Microsoft Excel, we learn a lot of functions and keywords. We learn several techniques to handle and manipulate data. It will be really helpful if we learn to use shortcuts. So here I…

What is VLookup in Excel and How to Use it?

vlookup featured image

Vlookup. Today we will talk about Vlookup in excel and why do we use it. Many of you who have recently started learning Microsoft Excel, are very curious about this topic. What is Vlookup? Vlookup is a function in Microsoft…

Easily Removing Duplicates in Excel 2019

removing duplicates in excel Featured Image

Removing Duplicates in Excel. Today we will talk about how to remove duplicates in the Microsoft Excel spreadsheet. The version of Microsoft Excel that I am going to use in this article is Micorosft Excel 2019. Let us start. In…

What is DNS Server and How Does it Work?

What is DNS Server Featured Image

What is DNS Server? DNS stands for Domain Name System. This is actually a service that runs on all of our computers but majorly it runs the entire internet. We type a website in the browser and with the bling…

What is a Distributed Denial of Service Attack?

What is a Distributed Denial of Service Attack Featured Image

What is a Distributed Denial of Service Attack? also termed DDos Attack. The question is very common among computer or programming students who are learning about hacking techniques. This question is also asked by willing to be a white hat…

Public Key vs Private Key in Cryptography

Public Key vs Private Key Featured Image

Previously we talked about End to End Encryption, this time we will talk about Public Key vs Private Key in Cryptography. Before we start discussing their difference. We need to understand what they are and how they are used. Public…