Featured Article

How Google Search Works!

The Google Search: It happens billions of times a day in the blink of an eye and we can have anything before us our minds can think of! Let’s explore the art and science that makes it possible. Crawling & Indexing: The journey of a query starts before we ever type a search, with crawling… Read More »

Featured Article

K-Nearest Neighbours

K-Nearest Neighbours is one of the most basic yet essential classification algorithms in Machine Learning. It belongs to the supervised learning domain and finds intense application in pattern recognition, data mining and intrusion detection. It is widely disposable in real-life scenarios since it is non-parametric, meaning, it does not make any underlying assumptions about the… Read More »

Java.lang.Math Class in Java | Set 2

Java.lang.Math Class in Java | Set 1 More Methods: cosh() : java.lang.Math.cosh() method returns the hyperbolic cosine of the argument passed. Special cases : Result is NaN, if argument is NaN. Result is 1.0, if the argument is zero. Result is +ve infinity, if argument is infinite. Syntax: public static double cosh(double arg) Parameters: arg… Read More »

Java.lang.Math Class in Java | Set 1

Math Class methods helps to perform the numeric operations like square, square root, cube, cube root, exponential and trigonometric operations Declaration : public final class Math extends Object What is NaN argument ? A constant holding a Not-a-Number (NaN) value of type double. It is equivalent to the value returned by Double.longBitsToDouble(0x7ff8000000000000L). Methods of lang.math… Read More »

Code Injection and Mitigation with Example

Code injection is the malicious injection or introduction of code into an application. The code introduced or injected is capable of compromising database integrity and/or compromising privacy properties, security and even data correctness. It can also steal data and/or bypass access and authentication control. Code injection attacks can plague applications that depend on user input… Read More »

Nagarro Interview Experience | Set 9

First Round IQ Test 12 mins 50 Ques (Very Basic IQ questions) (No negative marking) It was just meant to test the candidate’s presence of mind, and decision making skills. Basic Mental Maths Questions. To pass this round, attempt atleast 35 questions, the trick is not to stuck on any question and skip it if you think its not solvable… Read More »

Doubly Circular Linked List | Set 2 (Deletion)

We have discussed doubly circular linked list introduction and its insertion. Let us formulate the problem statement to understand the deletion process. Given a ‘key’, delete the first occurrence of this key in circular doubly linked list. Algorithm Case 1: Empty List(start = NULL) If the list is empty, simply return. Case 2:List initially contain… Read More »

Command Injection Vulnerability and Mitigation

Command injection is basically injection of operating system commands to be executed through a web-app. The purpose of the command injection attack is to inject and execute commands specified by the attacker in the vulnerable application. In situation like this, the application, which executes unwanted system commands, is like a pseudo system shell, and the… Read More »