Develop a program to implement both encryption and decryption using Caesar Cipher.

AIM: To encrypt and decrypt the given message by using Ceaser Cipher encryption algorithm. ALGORITHMS: 1. In Ceaser Cipher each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. 2. For example, with a left shift of 3, D would be replaced by A, E would become … Continue reading Develop a program to implement both encryption and decryption using Caesar Cipher.

Demonstrate rkhunter tool or any equivalent to find out rootkits in your system.

The rkhunter tool is a security tool that scans your system for rootkits, backdoors, and possible local exploits. It checks for various signs of compromise, such as modified files, hidden processes, suspicious network connections, and more. To use the rkhunter tool, you need to install it on your system first. You can do this by … Continue reading Demonstrate rkhunter tool or any equivalent to find out rootkits in your system.

Tips for shape your outlook signature

How to Add an Email Signature in Outlook An email signature is a block of text that is automatically added to the bottom of your outgoing emails. It can include your name, title, company, contact information, and other relevant details. To add an email signature in Outlook, follow these steps: Open Outlook. Click on the File tab. … Continue reading Tips for shape your outlook signature

Write a web service for finding what people think by asking 500 people‘s opinion for anyconsumer product

AIM:To Write a web services for finding what people think by asking 500 people’s opinion forany consumer product ALGORITHM:1. Open the home page.2. Enter the login ID and type the comments then submit.3. Retrieve comments with post id4. Display the comments index.php <!doctype html> <html lang="en"> <head> <meta charset="UTF-8" /> <title>jQuery Ajax Comment System - … Continue reading Write a web service for finding what people think by asking 500 people‘s opinion for anyconsumer product