notes.davidvarghese.net Open in urlscan Pro
2606:4700:3033::6815:233b  Public Scan

Submitted URL: https://my-digital-archive.pages.dev/
Effective URL: https://notes.davidvarghese.net/
Submission: On December 01 via api from US — Scanned from NL

Form analysis 0 forms found in the DOM

Text Content

DIGITAL ARCHIVE



Search

Search

Dark modeLight mode


EXPLORER

 *  * Blockchain
       * Bitcoin
          * Addresses
             * Bitcoin Address
             * Bitcoin Bech32 Address
             * Bitcoin Legacy Address
         
          * Transactions
             * Bitcoin Digital Signature
             * Bitcoin Transaction Fees
             * Bitcoin Transaction Flows
             * Bitcoin Transaction Scripts
             * Bitcoin Transactions
             * Transaction Structure
         
          * Bitcoin
          * Bitcoin Applications
          * Bitcoin Blocks
          * Bitcoin Core
          * Bitcoin Lightweight Clients
          * Bitcoin Mining
          * Bitcoin Network Communication
          * Bitcoin Test Blockchains
          * Digital Wallets
          * Digital Wallets
      
       * Ethereum
          * Ethereum Address
          * Ethereum Basics
          * Ethereum Overview
          * Ethereum Tranasactions
          * Ethereum Wallets
      
       * Blockchain
       * Ethereum Contracts
   
    * Cloud Service Providers
       * AWS
          * AWS Analytics Services
             * Redshift
                * Redshift
                * Redshift Architecture
                * Redshift Distribution Style
                * Redshift Sort Key
            
             * AWS Analytics Services
             * AWS Athena
         
          * AWS Compute Services
             * AWS Lambda
             * EC2 (Elastic Cloud Compute)
         
          * AWS Database Services
             * Dynamo Db
                * Dynamo DB
                * Dynamo DB Primary Key
                * Dynamo DB Secondary Index
            
             * AWS Database Services
         
          * AWS Other Services
             * Kinesis
                * AWS Kinesis
                * Kinesis Key Terms
            
             * AWS Glue
         
          * AWS Storage Services
             * S3
                * S3 (Simple Storage Service)
                * S3 Storage Classes
                * Transfer Acceleration
            
             * AWS Storage Services
         
          * AWS
      
       * Azure
          * Azure Analytics Services
             * Azure Synapse Analytics
                * Azure Synapse Analytics
                * Dynamic Data Masking
                * Partition & Distribution
                * Partition Switching & Splitting
                * Row Level & Column Level Security
            
             * Azure Analytics Services
             * Log Analytics Workspace
         
          * Azure Compute Services
             * Azure Compute Services
             * Azure Container Instance (ACI)
             * Azure Function App
             * Azure Kubernetes Service (AKS)
             * Azure Service Plan
             * Azure Virtual Machine
             * Azure Web App
             * Health Checks
         
          * Azure Concepts
             * Azure Documents
             * Azure Regions
             * Cost Reducing Approaches
         
          * Azure Datastore Services
             * Azure Cosmos Db
                * Apache TinkerPop
                * Azure Cosmos DB
                * Cosmos DB Consistency
                * Cosmos DB Partitioning
                * Cosmos DB Throughput
                * MongoDB API
                * Service-side Features
                * Table API
            
             * Azure SQL Db
                * Azure Elastic Pools
                * Azure SQL DB
                * Connectivity Mode
                * Hyperscale on Azure
                * Purchasing Model
                * SQL DB Security
                * SQL Edge Data Retention
                * Temporal Tables
            
             * Azure Tables
                * Azure Tables
                * Azure Tables Partitioning
            
             * Azure Datastore Services
             * Polybase
         
          * Azure Messaging Services
             * Azure Event Grid
             * Azure Event Hub
             * Azure Messaging Services
             * Azure Service Bus
             * Batch Processing
             * Streaming Units
             * Streaming Window Functions
         
          * Azure Networking Services
             * Azure DDoS Protection
             * Azure Firewall
             * Azure Networking Services
             * Azure Virtual Network
             * Network Security Groups (NSG)
         
          * Azure Other Services
             * Azure Automation
                * Azure Automation
                * Azure Configuration Management
            
             * Azure Caching Services
                * Azure Cache for Redis
                * Azure CDN
            
             * Azure Data Factory
                * Azure Data Factory
                * Data Factory Components
                * Monitoring & Version Control
            
             * Azure DevOps
                * Azure DevOps
                * Azure Pipelines
                * Centralized vs. Distributed Source Control
                * DevOps Boards
                * Self-Hosted Agents
            
             * Azure Monitor
                * Application Insights
                * Azure Alerts
                * Azure Metrics & Logs
                * Azure Monitor
            
             * ARM Templates
             * Azure AI Services
             * Azure API Management
             * Azure IoT Services
             * Azure Logic App
             * Azure Notification Hub
         
          * Azure Security Services
             * Azure Active Directory
                * Application Identity Types
                * Azure Active Directory (AAD)
                * Azure AD Conditional Access
                * Azure AD Connect
                * Device Identity Management
                * External Identity Types
            
             * Azure Blueprints
             * Azure Defender for Cloud
             * Azure Disk Encryption (ADE)
             * Azure Key Vault
             * Azure Policy
             * Azure Resource Locks
             * Azure Security Services
             * Azure Web Application Firewall (WAF)
             * Role Based Access Control (RBAC)
             * Security Concepts
             * Transparent Data Encryption (TDE)
             * Zero-Trust Model
         
          * Azure Storage Services
             * Access Control Methods
             * Azure Blob Types
             * Azure Containers
             * Azure Data Lake Storage
             * Azure File Shares
             * Azure Queue
             * Azure Storage Account
             * Azure Storage Services
             * Blob Storage Security
             * Block Blob Access Tiers
             * Data Redundancy Options
             * Immutable Blob Storage
             * Partitioning in ADLS
         
          * Azure
      
       * Common Concepts
          * Benefits of Cloud Computing
          * CapEx and OpEx
          * Cloud Deployment Model
          * Cloud Responsibility Models
          * Service Level Agreement
      
       * GCP
          * Digital Transformation
             * Google Cloud Solution Pillars
             * Innovation Waves
         
          * GCP AI ML Services
             * GCP AI Services
             * GCP ML Services
         
          * GCP Analytics Services
             * GCP Data Analytics Services
             * GCP ETL Services
         
          * GCP Api Management Services
             * API Management Services
             * Apigee
         
          * GCP Compute Services
             * App Engine
             * GCP Compute Services
         
          * GCP Concepts
             * Assured Workloads
             * GCP Hierarchy Architecture
             * GCP Project & Folders
             * GCP Regions & Zones
             * GCP Resource Hierarchy
             * Google Cloud for Government
         
          * GCP Container Services
             * GCP Container Services
         
          * GCP Database Services
             * GCP Database Services
         
          * GCP Hybrid Cloud Services
             * Anthos
             * GCP Hybrid Cloud Services
         
          * GCP Migration Services
             * GCP Migration Services
             * Migration Path
             * Types of Migration
         
          * GCP Networking Services
             * Cloud Interconnect
             * GCP Networking Services
             * GCP Virtual Private Cloud (VPC)
             * GCP VPC Services
         
          * GCP Other Services
             * GCP Cloud Deployment Manager
             * GCP Developer Tools
             * GCP Internal Services
             * GCP Media & Gaming Services
             * Operations Suite Services
         
          * GCP Security Services
             * BeyondCorp
             * Cloud Identity
             * Directory Service
             * GCP Compliance Standards
             * GCP IAM Services
             * GCP Security Services
         
          * GCP Serverless Services
             * GCP Serverless Services
         
          * GCP Storage Services
             * Cloud Storage
             * GCP Persistent Disk
             * GCP Storage Services
         
          * GCP Support and Billing
             * Active Assist Recommender
             * Cloud Billing Account
             * Pricing Tiers Overview
         
          * GCP
      
       * Snowflake
          * Snowflake
          * Snowflake Architecture
          * Snowflake Migration Commands
          * Snowflake Table Types
          * Time Travel & Fail Safe
      
       * Cloud Service Providers
   
    * Computer Networks
       * Layer Wise Concepts
          * Data Link Layer Concepts
             * ARP (Address Resolution Protocol)
             * CSMA-CD
             * Data Link Layer Concepts
             * Ethernet
             * MAC (Media Access Control) Address
             * Spanning Tree Protocol (STP)
             * Virtual LANs (VLANs)
         
          * Network Layer Concepts
             * Ip Address
                * CIDR (Classless Inter-Domain Routing)
                * IP Address
                * IP Address Classes
                * IPv4 (Internet Protocol v4) Address
                * IPv4 to IPv6 Transition
                * IPv6 (Internet Protocol v6) Address
                * Public & Private IP Addresses
            
             * Routing Protocols
                * BGP (Border Gateway Protocol)
                * OSPF (Open Short Path First)
                * RIP & RIPv2 (Routing Information Protocol)
            
             * APIPA (Automatic Private IP Addressing)
             * Dynamic Routing Protocols
             * ICMP (Internet Control Message Protocol)
             * NAT (Network Address Translation)
             * Network Layer Concepts
             * Subnetting
             * Tunneling Protocols
         
          * Physical Layer Concepts
             * Cable Distribution
             * Copper Cable
             * Ethernet Standard
             * Fiber Optic Cable
             * Physical Layer Concepts
         
          * Transport Layer Concepts
             * Network Ports
             * QUIC (Quick UDP Internet Connections)
             * TCP (Transmission Control Protocol)
             * TCP Three-Way Handshake
             * Transport Layer Concepts
             * UDP (User Datagram Protocol)
      
       * Network Basics
          * Host to Host Communication
          * Internet of Things (IoT)
          * Network Architecture
          * Network Geography
          * Network Topologies
      
       * Network Infrastructure
          * Dns Server
             * DNS Attacks
             * DNS Name Servers
             * DNS Records
             * DNS Zone Types
             * Domain Name System (DNS)
         
          * Switch
             * Switch
             * Switch MAC Address Learning
             * Types of Switch
         
          * Bridge
          * Dynamic Host Configuration Protocol (DHCP)
          * Hub
          * Layer 3 Switch
          * Load Balancer
          * Modem
          * Network Devices
          * NIC (Network Interface Card)
          * Repeater
          * Router
          * WAP (Wireless Access Point)
      
       * Network Models
          * OSI Model
          * TCP-IP Model
      
       * Network Protocols
          * HSTS (HTTP Strict Transport Security)
          * HTTP(S) Protocol
          * IPSec Protocol Suite
          * Network Protocols
          * Simple Network Management Protocol (SNMP)
      
       * Network Security
          * Firewall
          * IDS and IPS
          * Network Access Control (NAC)
          * Network Security
          * Network Security Zones
          * Port Security
          * Proxy Server
          * Screened Subnet
          * Virtual Private Network (VPN)
      
       * Wide Area Network
          * Connection Methodologies
             * Asynchronous Transfer Mode (ATM)
             * Dial Up Connection
             * Digital Subscriber Line (DSL)
             * Fiber Distributed Data Interface (FDDI)
             * Frame Relay
             * Integrated Services Digital Network (ISDN)
             * Synchronous Optical Network (SONET)
             * T-Carrier and E-Carrier Digital Signal Lines
         
          * WAN Service Types
          * Wide Area Network (WAN)
      
       * Wireless Networking
          * CSMA-CA
          * IEEE 802.11 Standards
          * SSID (Service Set Identifier)
          * Wireless Encryption Standards
          * Wireless Networking
          * WPA2 (Wi-Fi Protected Access 2)
      
       * Computer Networks
   
    * Cyber Security
       * Access Management
          * Access Control Models
          * Access Control Types
          * Access Management
          * Authentication Factors
          * Federation
          * Identity and Access Management (IAM)
          * Identity Providers (IdP)
          * Lightweight Directory Access Protocol (LDAP)
          * OAuth 2.0
          * OAuth 2.0 Flows
          * OpenID Connect
          * Single Sign-On (SSO)
      
       * Asset Management
          * Asset Management
          * Change Management
          * Mobile Device Management
      
       * Audits and Assessments
          * External Audits
          * Internal Audits
          * Penetration Testing
          * Reconnaissance
      
       * Certifications
          * Comptia Cysa
             * CompTIA CySA+
             * Cybersecurity Roles
         
          * Comptia Security
             * Analyzing Vulnerabilities
             * Bluetooth Vulnerabilities and Attacks
             * CompTIA Security+
             * Digital Media Forensics
             * Email Security
             * Incident Response Procedure
             * NetFlow
             * Security Content Automation Protocol (SCAP)
             * SELinux
             * Web and DNS Filtering
         
          * Isc2 Cc
             * Business Continuity Plan (BCP)
             * Disaster Recovery Plan (DRP)
             * Governance Principles
             * ISC2: Certified in Cybersecurity
             * Laws and Regulations
         
          * Splunk
      
       * Cryptography
          * Algorithm
             * RSA Algorithm
         
          * Cryptographic Solutions
             * Digital Certificate
             * Encryption
             * Encryption Tools & Techniques
             * Hashing
             * Obfuscation
         
          * Math Concepts
             * Eulers Theorem
             * Eulers Totient Function
             * Fermats Little Theorem
             * GCD - Euclids Algorithm
             * Modular Arithmetic
             * Modular Exponentiation
             * Multiplicative Inverse
             * Primitive Roots
             * Relatively Prime Numbers
         
          * Cryptographic Attacks
          * Cryptography
      
       * Cyber Attacks
          * Malware
             * Indicators of Malware Attack
             * Malware Exploitation Techniques
             * Types of Malware
         
          * Social Engineering
             * Impersonation
             * Motivational Triggers
             * Phishing Attacks
             * Social Engineering Attacks
         
          * SQL Injection
             * BOOLEAN based (Blind) Injection
             * Burp Suite
             * Classic Injection Bypass
             * ERROR based (In-band) Injection
             * SQL Injection
             * SQLMap
             * TIME based (Blind) Injection
             * Types of SQL Injection
             * UNION based (In-band) Injection
             * Useful SQL Functions and Queries
         
          * Denial of Service (DoS) Attack
          * Server-Side Request Forgery (SSRF)
          * XSS (Cross Site Scripting)
      
       * Cyber Redundancy
          * Data Backup
          * Data Redundancy
          * High Availability
          * Powering Data Centers
          * RAID
      
       * Exploitation
          * Web App Exploitation
             * Web App Enumeration
             * Web App Exploitation
         
          * Windows Exploitation
             * Mimikatz
             * Windows Exploitation
             * Windows Manual Enumeration
         
          * Exploitation
      
       * Frameworks
          * AAA of Security
          * CIA Triad
      
       * General Concepts
          * Threat Actors
             * Deception Techniques
             * Threat Actor Motives
             * Threat Actors
         
          * CISSP Security Domains
          * CTF Challenge Checklist
          * Gap Analysis
          * Pyramid of Pain
          * Shadow IT
          * Threats & Vulnerabilities
      
       * Governance and Compliance
          * Compliance
          * Contract and Agreement
          * Governance
          * Policies
          * Standards & Procedures
      
       * Information Gathering
          * DNS Enumeration
          * Information Gathering
          * Service Enumeration
          * SMB Enumeration
          * SMTP Enumeration
      
       * Network Hacking
          * ARP Poisoning
          * Bypassing HTTPS (Hypertext Transfer Protocol Secure)
          * Changing MAC Address
          * De-Authentication Attack
          * DNS Spoofing
          * DNS Spoofing Attack
          * Enabling Monitor Mode
          * Injecting JavaScript Code
          * MITM (Man in the Middle) Attack
          * Network Hacking
          * Network Mapping
          * Packet Sniffing
          * WEP (Wired Equivalent Protection)
          * WEP Cracking
          * WPA - WPA2 Cracking
          * WPA (Wi-Fi Protected Access)
      
       * Password Cracking
          * Hashcat
          * Hydra
          * John the Ripper
          * Password Cracking
      
       * Risk Management
          * Business Impact Analysis (BIA)
          * Risk Analysis
          * Risk Appetite
          * Risk Assessment Frequency
          * Risk Identification
          * Risk Management
          * Risk Management Strategies
          * Risk Monitoring
          * Risk Register
          * Third-party Vendor Risks
      
       * Security Architecture
          * Cloud Security Concerns
          * Embedded Systems
          * ICS and SCADA Systems
          * SD-WAN and SASE
          * Software Defined Networking (SDN)
          * Virtualization
      
       * Security Controls
          * Data Protection
             * Data Classification
             * Data Loss Prevention (DLP)
             * Data Ownership
             * Data Protection Techniques
             * Data States & Types
         
          * Data Encryption
          * Endpoint Protection
          * Mobile Device Vulnerabilities
          * Physical Security
          * Security Controls
      
       * Threat Intelligence
          * Cyber Defense Frameworks
          * Cyber Threat Intelligence (CTI)
          * Threat Hunting
          * Threat Modeling
          * Yara
      
       * Tools
          * Bettercap
             * BetterCap
             * BetterCap GUI
         
          * Metasploit Framework
             * Exploit Configuration
             * Metasploit Framework
             * Meterpreter
             * Running Exploit
             * Selecting Exploit
         
          * Nmap
             * Firewall Detection & Evasion
             * Nmap
             * Nmap Scripting Engine (NSE)
             * Normal Scan Techniques
             * Rust Scan
             * Scan Timing and Performance
         
          * BeEF
          * Misc. Utilities
      
       * Cyber Security
   
    * Data Analytics
       * Analytics Concepts
          * ETL vs ELT
          * Fact & Dimension
          * File Formats
          * Slowly Changing Dimension (SCD)
          * Types of Analytics
          * Types of Dimension Tables
      
       * Apache Hadoop
          * Apache Hadoop
          * Hadoop Architecture
          * Hadoop Daemons
          * Hadoop Features
          * Hadoop Shell Commands
          * HDFS Operations
          * MapReduce
      
       * Apache Hive
          * Apache Hive
          * Hive Architecture
          * Hive Commands
          * Hive Custom Partitioning
          * Hive Default Partitioning
          * Hive File Formats
          * Hive Managed and External Tables
      
       * Apache Kafka
          * Apache Kafka
          * Kafka Architecture
          * Kafka Commands
          * Kafka Replication
          * Topics and Partition
      
       * Apache Spark
          * Spark Queries
             * Dataframe Commands
             * Join Query
             * Loading Table from Database
             * Partitioning & Bucketing
             * RDD Commands
             * Spark SQL Syntax
             * User Defined Schema
         
          * Spark Streaming
             * Output Sinks
             * Read from Folder
             * Spark Streaming
             * Spark Streaming Joins
             * Spark Streaming with Kafka
             * Spark Structure Streaming
             * Stream Processing
             * UDF (User Defined Function)
             * Watermarks
             * Window Transformations
         
          * Apache Spark
          * Delta Lake (Spark Queries)
          * RDD (Resilient Distributed Dataset)
          * Spark Architecture
          * Spark Clusters
          * Spark Compression
          * Spark Config & Settings
          * Spark Job, Task and Stage
          * Spark Joins
          * Spark Memory Management
          * Spark Operations
          * Spark SQL Optimization
      
       * Apache Sqoop
          * Apache Sqoop
          * Sqoop Commands
      
       * Data Visualization
          * Excel
             * Functions
                * Excel Arrays
                * Excel Evaluate Formula
                * Excel Function Tips
                * Excel Operators
                * Lookup Functions
                * OR and AND Criteria
                * SEARCH and FIND Function
            
             * Excel
             * Excel Shortcuts
             * Protecting Excel Workbooks
             * Types of Errors
         
          * Power Bi
             * Interactive Reports
             * Microsoft Power BI
             * Paginated Reports
             * Power BI
             * Power BI Embedded
             * Power BI Service
      
       * Databricks
          * Cloning & Overwriting (Delta Table)
          * Databricks
          * Databricks Auto Loader
          * Databricks Clusters
          * Databricks SQL (Misc.)
          * Databricks SQL (Tables)
          * Databricks SQL (Views)
          * Delta File Format
          * Delta Live Tables
          * Insert & Merge (Delta Table)
          * Medallion (Multi-Hop) Architecture
      
       * Data Analytics
   
    * Database Engineering
       * Database Concepts
          * Data Modeling
          * Row vs. Column Store
          * Types of Partitioning
      
       * NoSQL
          * Database Theorems
          * Log Structure Merge (LSM) Tree
          * Types of NoSQL Databases
      
       * SQL
          * Oracle SQL
             * Data Control Language (DCL)
             * Data Definition Language (DDL)
             * Data Manipulation Language (DML)
             * Data Query Language (DQL)
             * Literal and Operators
             * Materialized View
             * Oracle SQL
             * Oracle SQL Functions
             * Subqueries
             * Transaction Control Language (TCL)
             * Types of Joins
         
          * PL SQL
             * Control Flow and Loops
             * PL-SQL
             * PL-SQL Collections
             * PL-SQL Cursors
             * PL-SQL Functions
             * PL-SQL Packages
             * PL-SQL Procedures
             * PL-SQL Ref Cursors
             * PL-SQL Triggers
             * PL-SQL User Defined Exception
             * Row Type Variable
             * Variables and Constants
         
          * SQL Concepts
             * Count Command
             * Multiple Row Subquery Operator
             * Normalization
             * Query Processing Order
             * Relational Model
             * SQL Concepts
             * SQL Statement Order
             * Truncate, Delete & Drop Command
             * Types of Indexes
             * Types of Keys
             * Views
         
          * SQL Query Examples
             * SQL Join Examples
             * SQL Query Examples
             * SQL Window Function Examples
         
          * Oracle Database Config
      
       * Database Engineering
   
    * Electronics
       * Components
          * Capacitors
          * Inductors
          * Resistors
          * Transformers
      
       * AC & DC Current
       * Conventional Current
       * Current
       * Electronics
       * Power & Energy
       * Voltage
   
    * 
    * Languages
       * English
          * English
          * Parts of Speech
          * Philosophy
          * Schwa Sound
      
       * Japanese
          * Grammer
             * Japanese Grammar
             * X wa Y desu
         
          * Hiragana
             * Hiragana
             * Hiragana H-Column
             * Hiragana K-Column
             * Hiragana M-Column
             * Hiragana N-Column
             * Hiragana R-Column
             * Hiragana S-Column
             * Hiragana T-Column
             * Hiragana Vowels
             * Hiragana W-Column & N
             * Hiragana Y-Column
         
          * Kanji
             * Kanji
         
          * Katakana
             * Katakana
             * Katakana H-Column
             * Katakana K-Column
             * Katakana M-Column
             * Katakana N-Column
             * Katakana R-Column
             * Katakana S-Column
             * Katakana T-Column
             * Katakana Vowels
             * Katakana W-Column & N
             * Katakana Y-Column
         
          * Words
             * Japanese Words
         
          * Japanese
      
       * Languages
   
    * Operating System
       * Linux
          * Commands
             * Archival Commands
             * Copy Commands
             * cron Command
             * cURL Command
             * cut Command
             * dd Command
             * Device Information Commands
             * File Permission Commands
             * find Command
             * grep Command
             * Linux Commands
             * ln Command
             * lsof Command
             * Mount Commands
             * Network Related Commands
             * Package Management Commands
             * Process Management Commands
             * seq Command
             * Service Management Commands
             * sftp Command
             * sort & uniq Command
             * ssh Command
             * SSH Port Forwarding
             * User & Group Management Commands
             * xargs Command
             * xrandr Command
         
          * Linux System Concepts
             * Control Groups (cgroups)
             * Device Drivers
             * File Descriptors
             * File System Structure
             * Linux Kernel
             * Linux Memory Management
             * Linux Namespaces
             * Linux System Concepts
         
          * Shell Scripting
             * Bash
             * Bash Arrays
             * Bash Conditional Statements
             * Bash File Operations
             * Bash Functions
             * Bash Iteration Statements
             * Bash Special Symbols
             * Bash User Input
             * Bash Variables
             * Linux Environment Variables
         
          * Tools and Utilities
             * Linux Tools & Utilities
             * Tmux
             * Vim Editor
         
          * Linux Index
          * Linux Misc. Commands
      
       * Windows
          * Command Prompt
             * Download Commands
             * Encryption Commands
             * Folders as Virtual Drive
             * Network Commands
             * Symbolic Links
             * System Repair Commands
             * Task Management Commands
         
          * Microsoft Active Directory
             * Active Directory Terminologies
             * Domain Controller (DC)
             * Domain Services
             * Microsoft Active Directory
         
          * Misc Stuff
             * NTFS Alternative File Stream
             * Windows Files & Tweaks
             * Windows Shortcuts
         
          * Tools and Utilities
             * Windows Terminal
             * Winget Commands
             * WSL Configuration
         
          * Windows Index
      
       * Operating System
       * Process vs. Threads
   
    * Programming Languages
       * ASP.NET
          * Action Result
          * ASP.NET
          * Entity Framework
      
       * Assembly
          * Assembly
      
       * C
          * Core Concepts
             * C Arithmetic Operators
             * C Arrays
             * C Basic Types
             * C Functions
             * C Fundamentals
             * C Loops
             * C Modules
             * C Pointers
             * C Selection Statements
             * C Strings
             * C Structs
         
          * Therotical Concepts
             * Compiling and Linking
             * Directives
             * Floating Point Numbers
         
          * C
      
       * C Sharp
          * Advanced Concepts
             * CSharp Generics
             * CSharp Lambda Expression
             * Extension Methods
         
          * Core Concepts
             * Arithmetic Operators
             * Casting Datatype
             * Control Flow Statements
             * CSharp Arrays
             * CSharp User Input
             * Datetime and Timespan
             * Enums
             * File & Directory Operations
             * Iteration Statements
             * Lists (Dynamic Arrays)
             * Primitives Datatype
             * Strings
         
          * Object Oriented Concepts
             * Abstract & Sealed Class
             * Access Modifiers
             * Boxing and Unboxing
             * Composition
             * CSharp Classes
             * CSharp Constructor
             * CSharp Indexers
             * CSharp Inheritance
             * CSharp Methods
             * Fields
             * Interface
             * Method Overriding
             * Properties
             * Structs
             * Upcasting and Downcasting
         
          * Theoretical Concepts
             * Architecture of .NET Application
             * CLR (Common Language Runtime)
             * Dotnet Framework Intoduction
             * Dotnet Implementations
         
          * C Sharp
          * Dependency Injection
      
       * CSS
          * Core Concepts
             * CSS Box Model
             * CSS Element Types
             * CSS Inheritance
             * CSS Specificity
             * CSS Units
         
          * Layout
             * CSS Flexbox
             * CSS Grid Layout
             * CSS Positioning
         
          * CSS
          * CSS Colors & Typography
      
       * JavaScript
          * Event Listeners
          * JavaScript
          * JS - Other Features
          * JS - Under the Hood
      
       * Node.js
          * Bcrypt Usage
          * Dotenv Usage
          * EJS Syntax
          * Express
          * Mongoose
          * Node.js
      
       * PowerShell
          * PowerShell
          * PowerShell Input & Output
          * PowerShell Objects
      
       * Python
          * Advanced Concepts
             * Python Async Programming
             * Python Metaclasses
             * Python Variable Scopes
         
          * Core Concepts
             * Bitwise Operator
             * Python Collections
             * Python Comprehension
             * Python Control Flow & Loops
             * Python Exception Handling
             * Python File Operations
             * Python Functions
             * Python Generators
             * Python String Formatting
             * Python Strings
         
          * Object Oriented Concepts
             * Attributes
             * Property
             * Python Abstract Class & Method
             * Python Access Modifiers
             * Python Classes
             * Python Constructor
             * Python Inheritance
             * Python Method Overriding
             * Python Methods
         
          * Theoretical Concepts
             * Python Memory Management
         
          * Python
      
       * Rust
          * Advanced Concepts
             * Rust Generics
             * Rust Lifetimes
             * Rust Traits
         
          * Core Concepts
             * Rust Collections
             * Rust Control Flow
             * Rust Datatypes
             * Rust Enums
             * Rust Error Handling
             * Rust Functions
             * Rust Match Expression
             * Rust Slices
             * Rust Structs
         
          * Theoritical Concepts
             * Rust Module Namespace
             * Rust Module System
             * Rust Ownership Model
         
          * Rust
      
       * Svelte
          * Svelte
      
       * Code Execution Models
       * Programming Languages
   
    * Software Engineering
       * Data Structures and Algorithms
          * Algorithms
             * Algorithms
             * Binary Search
             * Floyds Algorithm
             * Kadanes Algorithm
             * Union Find
         
          * Data Structures
             * Array
             * AVL Tree
             * Binary Heap
             * Binary Search Tree
             * Binary Tree
             * Bloom Filter
             * Data Structures
             * Graph
             * Hash Table
             * Linked List
             * Queue
             * Stack
         
          * Big-O Notation
          * Data Structures & Algorithms
          * Recursion
      
       * DevOps
          * Docker
             * Building Docker Image
                * Building Docker Image
                * Docker File
                * Docker Hub
            
             * Docker Essentials
                * Container Management
                * Container Run Modes
                * Docker Compose
                * Docker Health Check
                * Docker Network
                * Docker Prune Command
                * Docker Volumes
                * Image Management
            
             * Docker Swarm
                * Swarm Architecture
                * Swarm Cluster Management
                * Swarm Network
                * Swarm Secrets
                * Swarm Service
                * Swarm Stacks
            
             * Docker
             * Docker Command Examples
         
          * Git
             * Commands
                * Git Add Command
                * Git Branch Command
                * Git Checkout Command
                * Git Clone Command
                * Git Commit Command
                * Git Config Command
                * Git Diff Command
                * Git Log Command
                * Git Merge Command
                * Git Pull Command
                * Git Push Command
                * Git Rebase Command
                * Git Remote Command
                * Git Revert & Reset Command
                * Git Rm Command
                * Git Stash Command
                * Git Tag Command
            
             * Git
         
          * GitHub Actions
             * GitHub Action Usage
             * GitHub Actions
             * GitHub Actions Commands
         
          * Kubernetes
             * Kubernetes Basics
                * Kubernetes Architecture
                * Kubernetes Components
            
             * Kubernetes Components
                * Kubernetes ConfigMap & Secrets
                * Kubernetes Deployments
                * Kubernetes HELM
                * Kubernetes Ingress
                * Kubernetes Namespace
                * Kubernetes Pods
                * Kubernetes Services
                * Kubernetes StatefulSet
                * Kubernetes Volumes
                * Kubernetes YAML File
            
             * Kubernetes
         
          * DevOps
      
       * Software Concepts
          * Application Security
          * Association, Aggregation and Composition
          * Fork vs. Spawn
          * Program Memory Management
          * Reference Type vs. Value Type
          * Regex
          * Software Concepts
          * Software Licensing
          * Stack and Heap Memory
      
       * System Design
          * Consistent Hashing
          * Deployment Strategy
          * System Design
      
       * Software Engineering

 * 


HOME PAGE

Created: Jan 28, 2024 • Modified: Nov 29, 2024
145 words, 1 min read

 * main
 * index

Welcome to Digital Archive. This is a place where I store information about
various topics that interest me. Fell free to explore all the content. I welcome
your feedback and encourage contributes to enhance the accuracy of the material.

There are multiple ways to navigate Digital Archive:

 1. Use the search bar to search for any term. The search bar can also be
    accessed by pressing ctrl+k.
 2. Click on a note to explore its content, and follow the links and backlinks
    to dive deeper into related topics.
 3. Interact with the graph on the left of the page to visualize connections
    between notes, and click on any node to navigate directly to that note.
 4. Click on the tags to explore the topics by category.


TABLE OF CONTENT

 * Cloud Service Providers
 * Computer Networks
 * Cyber Security
 * Blockchain
 * Operating System
 * Software Engineering
 * Programming Languages
 * Database Engineering
 * Data Analytics
 * Electronics
 * Languages

--------------------------------------------------------------------------------


BACKLINKS

 * No backlinks found





GRAPH VIEW




© 2024 David Varghese | Licensed under CC BY-NC 4.0 | Created with Quartz v4.4.0

 * GitHub
 * LinkedIn
 * Discord
 * Blog
 * Medium