
n8n Locally? Why? How?
You know that one friend who swears automation will “save you hours”?
Deep dives into data engineering, AI systems, and the tools I build.

You know that one friend who swears automation will “save you hours”?

There’s nothing more infuriating than getting scammed — especially on a peaceful Sunday morning — and perhaps more shameful when your country becom...

Revolution of 2001 : Advance Encryption Algorithm

Diving deeper into historic cryptograms we also see graphical ciphers. They provided a representational method to hide your message. Such ciphers have been documented for centuries being used in occults and secret societies.

The easiest way to hide messages is to replace it with something different. And today we’ll be covering such a cipher(if you can call it that).

Although rarely employed in practice, the Affine cipher is a prominent name often encountered in the field of cryptography. In order to understand ...

Throughout history, we have been trying to find ways to hide information, but it has rarely been adequate in practice. This time I came across a ra...

Let’s talk about one of the most famous algorithms in cybersecurity, the RSA algorithm. As simple as it is, it has yet to be broken. It was created...

Considered widely a variation of the Vigenère Cipher, the Beaufort Cipher is also a polyalphabetic substitution cipher that makes use of a lookup table when being encoded and decoded by hand.

Now, obviously, not all ciphers can be perfect and secure, so today we will be understanding a rather easy-to-understand cypher, the Railfence Ciph...
10 of 10 posts