## Cryptography 101 - Mathematical Basis (II) - Modular exponentiation

Second post of the Cryptography 101 course I am writing. In this post you will learn how to compute Modular exponentiation

Second post of the Cryptography 101 course I am writing. In this post you will learn how to compute Modular exponentiation

Python script to add size tags width and height to an image

What are Types and Functions in the context of Category Theory? Think of Types as Sets.

How I implemented my own related posts feature using sklearn, KMeans and TF-IDF for this blog

If we want to rename all the files to delete the web page name from the file name, there is no need in going renaming file by file. using the rename command of GNU/Linux we can get it done so easily.

First post on Cryptography basis, this series is inspired by a course on cryptography I took at my University

What is a category? This post explain it using Scala and Property based Tests

A quick org-mode reference guide of the most useful key binds

Best practices to create and manage passwords & hardening your online presence

A curated lists of books I've read and recommend about security, computer science and Machine Learning

A curated list of blogs, podcasts and Youtube Channels about Mathematics

After a few years using Gentoo and upgrading each new kernel version manually, I decided to automate the process, here is how.