×
Home Discussions Write at Opengenus IQ
×
  • DSA Cheatsheet
  • HOME
  • Track your progress
  • Deep Learning (FREE)
  • Join our Internship 🎓
  • RANDOM
  • One Liner

Software Engineering

Software Engineering is the fastest growing domain which is related to the art of building and designing systems using software concepts and programming. It is the basis of giant companies such as Microsoft, Google, Facebook, Baidu, Alibaba, Apple and others.

automaton

John Conway's Game of Life

The Game of Life is a cellular automaton created in 1970 by the British mathematician John Horton Conway. The game is a zero-player game, where you include an initial input and watch how the board evolve through the generations and if the life will prosper or will be extinct over time.

Gabriel Lechenco Gabriel Lechenco
Computer Architecture

Graphics Processing Unit (GPU) vs Tensor Processing Unit (TPU) vs Field Programmable Gate Arrays (FPGA)

Graphics Processing Unit (GPU), Tensor Processing Unit (TPU) and Field Programmable Gate Array (FPGA) are processors with a specialized purpose and architecture. We have compared these in respect to Memory Subsystem Architecture, Compute Primitive, Performance, Purpose, Usage and Manufacturers.

OpenGenus Tech Review Team OpenGenus Tech Review Team
cyber security

Heap Spraying Attack

Heap Spraying Attack is a type of cyber attack in which the attacker uses the ability to write the series of bytes in the memory for the running program at various places in the heap. The main aim of the attack is to ensure that the bytes can be accessed later as the vector of the separate attack.

Sanyam J
cyber security

DLL Hijacking Attack

Dynamic Link Libraries (DLL) Hijacking is an type of cyber attack when hackers replace the genuine .dll file with the malicious file. This corrupted file, when used by the application, gives erroneous results as programmed by the hacker.

Sanyam J
cyber security

Password Spraying Attack

Password Spraying is a form of cyber attack similar to a brute force attack, where the hacker tries to gain access to the company system by testing out a small number of commonly used passwords on a large number of accounts. This attack allows a attacker to gain access to multiple accounts

Sanyam J
cyber security

Xpath Injection Attack

XPath Injection is an cyber attack used to fetch sensitive data (stored in XML format) from a website, by injecting malicious XPath queries. This attack works for applications that leverage user-supplied information to construct XPath queries.

Sanyam J
automaton

Von Neumann Cellular Automaton

Von Neumann Cellular Automaton model is the original expression of cellular automaton. It has 29 states which are the minimum for a self-replicating machine and all of which can be grouped into four categories: blank, transmission, confluent and transition states. It simulates real systems

Gabriel Lechenco Gabriel Lechenco
cyber security

BlueSmack Attack

Bluesmack is a cyber attack done on bluetooth enabled devices. The attack uses L2CAP (Logic Link Control And Adaptation Protocol) layer to transfer an oversized packet to the Bluetooth enabled devices, resulting in the Denial of Service (DoS) attack.

Sanyam J
cyber security

OS Command Injection Attack

OS Command Injection is a form of shell injection attack, mostly used for execution of unauthorized OS commands in the operating system (OS) to target the system (usually a web server) and degrade its performance. In this attack, the hacker aims to find and exploit some of the vulnerable application

Sanyam J
cyber security

Malvertising Attack

Malvertising is a type of cyber attack in which an hacker use the online advertising to spread the malware. The attack can infect a system pre-click or post-click. A pre-click malvertisement can be embedded in the main scripts of the page. It can even initiate drive-by-download on visiting the site

Sanyam J
Software Engineering

Check memory usage in Linux

Five tools to check memory usage on Linux are free, /proc/meminfo, vmstat, top and dmidecode. The difference between clock speed and memory access is increasing day by day. To keep our machines healthy, we want to check the memory usage of several processes and in Linux, we have five tools to do so.

OpenGenus Tech Review Team OpenGenus Tech Review Team
cyber security

DNS Amplification Attack

DNS (Domain Name System) Amplification is a form of reflection based DDoS attack, in which a hacker spoofs the look-up requests to spoof the DNS servers to hide the source of an exploit and also to direct the response to the target. The attack exploits the disparity in the bandwidth consumption

Sanyam J
cyber security

IP Spoofing Attack

IP (Internet Protocol) Spoofing is a form of cyber attack in which hacker crafts the IP packets which are used to carry out the DDoS attacks as well as MitM attack. In this attack, the fake crafted IP packets are used to impersonate another system or is used to hide the identity of the hacker.

Sanyam J
cyber security

MAC Flooding Attack

MAC (Media Access Control) Flooding is a type of cyber attack done in a network to compromise the security of the network switches. In this attack the network is flooded with the fake MAC addresses. The hacker uses this attack to steal sensitive data that is being transferred in the network.

Sanyam J
cyber security

Ping Of Death Attack

Ping of Death (PoD) Attack is a form of DDoS attack, which is used for disrupting the victim network by sending the packets larger then the max size allowed using some arbitrary commands. The attack degrades the targeted system or even freeze the system.

Sanyam J
cyber security

Smurf Attack

Smurf Attack is a type of DDoS Attack, which floods the system with the spoofed ping messages. The attack has an amplification vector that increases the damage by exploiting the characteristics of the broadcast network. The attack swamps the internet with the replies to ICMP echo requests.

Sanyam J
cyber security

BlueBugging Attack

Bluebugging is a type of cyber attack done on the Bluetooth enabled devices. The attack allows the hacker to access the cell commands and infiltrate the phone calls, read and send SMS. This allows any hacker to modify the contact list, connect to the internet and eavesdrop on any phone conversation

Sanyam J
cyber security

Distributed Denial Of Service Attack (DDoS)

Distributed Denial Of Service (DDoS) is a form of cyber attack which is done to make target online services unavailable to the users. The attack disrupts the normal traffic of a targeted server, network or service by overwhelming the target or its surrounding infrastructure

Sanyam J
cyber security

Man In The Middle Attack (MitM)

Man In The Middle (MitM) is a type of cyber attack in which a hacker intercepts the communication between two people either to eavesdrop or to impersonate one of the person. The aim of the attack is to steal financial details such as account details, credit card numbers or sensitive details

Sanyam J
cyber security

Denial Of Service Attack

Denial Of Service Attack is a form of cyber attack basically used by hackers to prevent the victims from accessing any legitimate service. This hacker floods the web servers with excessive traffic in order to succeed in this attack. The attack does not result in theft or loss of data

Sanyam J
cyber security

SQL Injection Attack

SQL(Structured Query Language) Attack is a cyber attack used for the manipulation of the backend database through the malicious SQL Query. The attack allows a hacker to cause repudiation issues and spoof the identity. The attack allows the complete exposure of the database

Sanyam J
Data Structures

Ternary Search Trees

Ternary Search Tree is a special type of trie data structure and is widely used as an low memory alternative to trie in a vast range of applications like spell check and near neighbor searching. The average case time complexity is O(log N) for look-up, insertion and deletion operation.

Aman Agarwal Aman Agarwal
Software Engineering

Control Flow in Python

In Control Flow, there are certain conditions which we put with the help of predefined syntaxes and the program then run in that order and chooses the condition as a output. Control statements include conditional and iteration statements like if else, while, do while and if elif and for loop

Sanyam J
similarity measurement

Minkowski distance [Explained]

Minkowski distance is a distance/ similarity measurement between two points in the normed vector space (N dimensional real space) and is a generalization of the Euclidean distance and the Manhattan distance. See the applications of Minkowshi distance and its visualization using an unit circle.

OpenGenus Tech Review Team OpenGenus Tech Review Team
similarity measurement

Damerau Levenshtein distance

Damerau Levenshtein distance is a variant of Levenshtein distance which is a type of Edit distance. Damerau stated that the four operations in Damerau Levenshtein distance correspond to more than 80% of all human misspellings. It adds an extra operation named transposition to its set of operations

OpenGenus Tech Review Team OpenGenus Tech Review Team
OpenGenus IQ © 2025 All rights reserved â„¢
Contact - Email: team@opengenus.org
Primary Address: JR Shinjuku Miraina Tower, Tokyo, Shinjuku 160-0022, JP
Office #2: Commercial Complex D4, Delhi, Delhi 110017, IN
Top Posts LinkedIn Twitter
Android App
Apply for Internship