Harshani Somarathne
Tuesday, September 25, 2018
Test Images
Below images are being used for the
Hashtag Generator and Content Authenticator research
.
No comments:
Post a Comment
Older Post
Home
Subscribe to:
Post Comments (Atom)
Test Images
Below images are being used for the Hashtag Generator and Content Authenticator research .
How to do phishing
Have you ever received emails saying that you have won a grand prize or an email claiming it’s something useful, such as a coupon to ...
IPsec Protocol
IPsec protocol is a standard that is used in VPNs to secure the IP networks.IPsec protocol also protects and authenticates the IP packets t...
No comments:
Post a Comment