Learn New Programming Tutorials And Technologies.
Contact Us
Get in touch and we’ll get back to you as soon as we can. We look forward to hearing from you! If you have any questions, or if you want to contact us or if...
About Us
Monkelite was started with the above mission in mind, to provide you with easy to understand and simple to implement Programming tutorials and new technologies updates. Our goal is to provide rich and detailed tutorials,...

How to Encrypt and Decrypt Data in Angular 8

Introduction In this article, You’ll learn how to implement AES encryption and decryption in Angular 8 while developing an application. Concepts The AES is the advanced encryption standard. So, these algorithms have been the standard of encryption for organizations like the NSA and anyone else that wants to hide their …

How to Upload Video using Angular 8 with WebAPI

Introduction In this article, you’ll learn how to upload and view Video using Angular 8 with Web API. we’ll also be creating a demo project for better understanding. This article is very useful for those who are getting started with Angular. Prerequisites 1. Angular 82. ASP.NET Web API3. SQL Server4. …

Understanding the Basics of Node.js

Introduction In this tutorial, I want to introduce you to the basics of Node.js and this tutorial is a quick refresher. Before that, you have some basic knowledge about how javascript works, what you use it for and it’s base syntax. Overview Javascript is a weakly typed programming language. it’s …

The Value of Blockchain Technology

Introduction In this tutorial, we will discuss the values of blockchain. the best-known implementation of blockchain out there. and a lot of the development and the direction where things are base on the premise of what blockchain does to enable Bitcoin to happen. Many people call blockchain The Internet of …

Basic Operations of Blockchain Technology

In this tutorial, you’ll learn the basics operations of a blockchain and its basic structure. So, the operations in the decentralized network are the responsibility of the peer participants and their respective computational nodes. For example, desktop, laptop, and server. These following operations are included. Validation transactions Gathering the transactions …