Skip to content
geeksforgeeks
  • Tutorials
    • Python
    • Java
    • Data Structures & Algorithms
    • ML & Data Science
    • Interview Corner
    • Programming Languages
    • Web Development
    • CS Subjects
    • DevOps And Linux
    • School Learning
    • Practice Coding Problems
  • Courses
    • DSA to Development
    • Get IBM Certification
    • Newly Launched!
      • Master Django Framework
      • Become AWS Certified
    • For Working Professionals
      • Interview 101: DSA & System Design
      • Data Science Training Program
      • JAVA Backend Development (Live)
      • DevOps Engineering (LIVE)
      • Data Structures & Algorithms in Python
    • For Students
      • Placement Preparation Course
      • Data Science (Live)
      • Data Structure & Algorithm-Self Paced (C++/JAVA)
      • Master Competitive Programming (Live)
      • Full Stack Development with React & Node JS (Live)
    • Full Stack Development
    • Data Science Program
    • All Courses
  • Aptitude
  • Engineering Mathematics
  • Discrete Mathematics
  • Operating System
  • DBMS
  • Computer Networks
  • Digital Logic and Design
  • C Programming
  • Data Structures
  • Algorithms
  • Theory of Computation
  • Compiler Design
  • Computer Org and Architecture
Open In App
Next Article:
Critical Section in Synchronization
Next article icon

Race Condition Vulnerability

Last Updated : 15 Apr, 2025
Comments
Improve
Suggest changes
Like Article
Like
Report

Race condition occurs when multiple threads read and write the same variable i.e. they have access to some shared data and they try to change it at the same time. In such a scenario threads are “racing” each other to access/change the data. This is a major security vulnerability.

What is Race Condition?

A race condition is a situation that may occur inside a critical section. This happens when the result of multiple thread execution in a critical section differs according to the order in which the threads execute. Race conditions in critical sections can be avoided if the critical section is treated as an atomic instruction. Also, proper thread synchronization using locks or atomic variables can prevent race conditions.

This is a major security vulnerability [CWE-362], and by manipulating the timing of actions anomalous results might appear. This vulnerability arises during a TOCTOU (time-of-check, time-of-use) window.

Flow of File Access during it’s TOCTOU Window
Flow of File Access during it’s TOCTOU Window

Flow of File Access during its TOCTOU Window So, what if we lock the file during this TOCTOU window itself?

  1. General Misconception - A trivial cure to this vulnerability could be locking the file itself during this check-and-use window because then no other process can use the file during the time window. Seems easy, then why isn’t this practical? Why can’t we use this approach to solve the race condition problem? The answer is simply that such a vulnerability could not be prevented by just locking the file.
  2. Problems while locking the file - A file is locked out for other processes only if it is already in the open state. This process is called the check-and-open process and during this time it is impossible to lock a file. Any locks created can be ignored by the attacking or the malicious process. What happens is that the call to Open() does not block an attack on a locked file. When the file is available for a check-and-open process, the file is open to any access/ change. So it’s impossible to lock a file at this point in time. This makes any kind of lock virtually non-existent to the malicious processes. Internally it is using the sleep_time which doubles at every attempt. More commonly this is referred to as a spinlock or the busy form of waiting. Also, there is always a possibility of the file getting locked indefinitely i.e. danger of getting stuck in a deadlock.
  3. What would happen even if we were somehow able to lock the file? Let’s try to lock the file and see what could be the possible drawbacks. The most common locking mechanism that is available is atomic file locking. It is done using a lock file to create a unique file on the same filesystem. We make use of link() to make a link to the lock file for any kind of access to the file.
    • If link() returns 0, the lock is successful.
    The most common fix available is to store the PID of the application in the lock file, which is checked against the active PID at that time. Then again a flaw with this fix is that PID may have been reused.
  4. Actual Solutions - A better solution is to rather than creating locks on the file as a whole, lock the parts of the file to different processes. Example - When a process wants to write into a file, it first asks the kernel to lock that file or a part of it. As long as the process keeps the lock, no other process can ask to lock the same part of the file. Hence you could see that the issue with concurrency is getting resolved like this. In the same way, a process asks for locking before reading the content of a file, which ensures no changes will be made as long as the lock is kept. Differentiating this different kind of locks is done by the system itself. The system has the capability to distinguish between the locks required for file reading and those required for file writing. This kind of locking system is achieved by the flock() system call. Flock() call can have different values :
    • LOCK_SH (lock for reading)
    • LOCK_EX (for writing)
    • LOCK_UN (release of the lock)
    Using these separate calls we can tell what kind of locks are necessary. A point to note here is that many processes can be benefited from a reading lock simultaneously since no one will attempt to change the file content. However, only one process can benefit from a lock for writing at a given time which is currently using it. Thus no other lock can be allowed at the same time, even for reading. This kind of carefully crafted system works well with applications that can ask the kernel to reserve their access (their lock) before reading or writing to an important system file. Hence this way of selectively locking the file is much practical than our initial approach. So, while you are trying to implement your file system for directories you could take advantage of this secure coding technique to prevent a potential CWE-362 (Race Condition Vulnerability).

Real-Time Examples of Race Conditions

Example 1 - Consider an ATM Withdrawal

Imagine Ram and his friend Sham both have access to the same bank account. They both try to withdraw Rs,500 at the same time from different ATMs. The system checks the balance and sees there’s enough money for both withdrawals. Without proper synchronization, the system might allow both transactions to go through, even if the balance is only enough for one, leaving the account overdrawn.

Example 2 - Consider a Printer Queue

Imagine two people sending print jobs at the same time. If the printer isn’t managed properly, the print jobs could get mixed up, with pages from one person’s document being printed in the middle of another’s.

Key Terms in a Race Condition

  • Critical Section: A code part where the shared resources are accessed. It is critical as multiple processes enter this section at same time leading to data corruption and errors.
  • Synchronization: It is the process of controlling how and when multiple processes or threads access the shared resources ensuring that only one can enter the critical section at same time.
  • Mutual Exclusion (Mutex): A mutex is like a lock that ensures only one process can access a resource at a time. If a process holds a lock, others must wait their turn preventing race conditions.
  • Deadlock: A situation where two or more processes are stuck waiting for each other's resources, causing a deadlock(standstill).

What is a Race Condition Vulnerability?

Race Condition Vulnerability is a situation where two or more processes or threads in a system simultaneously access the shared resources. If the processes lacks coordination, it leads to unexpected behaviour or security issues.

Let's understand this concept by taking a real-life scenario . Imagine there are 2 people named A and B , trying to write on the same notebook at same time without agreeing on who needs to write first followed by other person which results into writings getting mixed up leading to confusion.

Now let's understand the same concept in computer system. Imagine a system where one process's duty is to read a file from the system and another process's duty is to write to the system. If both of them try to access the same file at same time without a proper control leads to incorrect/incomplete data leading to errors.

Common Vulnerabilities Leading to Race Conditions

  • In systems where multiple processes access the shared memory, failure to control how memory is accessed can lead to conflicting operations, resulting in incorrect data being read or written to the system.
  • If multiple processes access the same file at same time without proper access mechanism, the file's content can become inconsistent.
  • In some scenarios, a certain operations need to be happened in a specific order. If the sequence is not followed and multiple processes run out of order, race conditions can occur leading to error or vulnerabilities.

By identifying these common vulnerabilities, developers can reduce the chance of race conditions that affect the system by proper locking mechanism, careful sequencing and strong synchronization practices which can help to almost reduce/eliminate these issues.

Race Condition, Deadlock and Threat Block

1. Race Condition

A race condition happens when two or more processes try to access the same resource at the same time without proper coordination. This “race” can lead to incorrect results or unpredictable behavior because the order of execution is not controlled.

Example: Two people trying to edit the same document at the same time, causing one’s changes to overwrite the other’s.

2. Deadlock

A deadlock occurs when two or more processes are waiting for each other to release resources, and none can proceed. It’s like a standstill where each process is holding a resource the other needs, leading to a complete freeze.

Example: Two cars stuck in a narrow road from opposite directions, each refusing to move back and waiting for the other.

3. Thread Block

Thread blocking happens when a thread is unable to continue its work because it’s waiting for a resource that’s currently unavailable. It pauses until the resource is free.

Example: A cashier waiting for the customer ahead to finish paying before attending to the next person in line.

How to Detect Race Conditions?

  • Review the Code : Carefully inspecting of the code can help to identify the areas where shared resources are accessed without proper locking or synchronization.
  • Static Analysis Tools : Specialized tools analyze the code to automatically detect potential race conditions by identifying unsafe access to shared resources.
  • Testing with Multiple Threads/Processes: Simulate scenarios with many threads or processes running simultaneously. If unexpected behaviors like data inconsistencies or crashes occur, a race condition might be present.
  • Logging and Monitoring: Adding logs to track resource access can reveal out-of-order operations, signaling a race condition

How to Prevent Race Condition Attacks?

  • Use Locks: Implement locks (like mutexes) to ensure that only one process or thread can access a resource at a time, preventing conflicting operations.
  • Proper Synchronization: Ensure processes or threads work in a coordinated sequence when accessing shared data. Techniques like semaphores help achieve this.
  • Avoid Time-of-Check to Time-of-Use (TOCTOU) Vulnerabilities: Reduce the gap between checking a condition (like permissions) and acting on it, minimizing opportunities for an attacker to change the state in between.
  • Priority Management: Prioritize certain processes or threads so they get controlled access to critical resources, preventing uncoordinated access.

Conclusion

In conclusion, race conditions, deadlocks, and thread blocks are all issues that arise when multiple processes or threads compete for shared resources. Without proper management, these can lead to data errors, system freezes, or performance slowdowns. By understanding these concepts and applying techniques like synchronization, locking, and careful resource management, we can design systems that avoid these pitfalls and run smoothly.


Next Article
Critical Section in Synchronization

P

piyushagg
Improve
Article Tags :
  • Technical Scripter
  • Operating Systems
  • Technical Scripter 2020
  • Information-Security
  • vulnerability
  • Network-security
  • Cyber-security

Similar Reads

    Operating System Tutorial
    An Operating System(OS) is a software that manages and handles hardware and software resources of a computing device. Responsible for managing and controlling all the activities and sharing of computer resources among different running applications.A low-level Software that includes all the basic fu
    4 min read

    OS Basics

    What is an Operating System?
    An Operating System is a System software that manages all the resources of the computing device. Acts as an interface between the software and different parts of the computer or the computer hardware. Manages the overall resources and operations of the computer. Controls and monitors the execution o
    9 min read
    Functions of Operating System
    An Operating System acts as a communication interface between the user and computer hardware. Its purpose is to provide a platform on which a user can execute programs conveniently and efficiently. The main goal of an operating system is to make the computer environment more convenient to use and to
    7 min read
    Types of Operating Systems
    Operating Systems can be categorized according to different criteria like whether an operating system is for mobile devices (examples Android and iOS) or desktop (examples Windows and Linux). Here, we are going to classify based on functionalities an operating system provides.8 Main Operating System
    11 min read
    Need and Functions of Operating Systems
    The fundamental goal of an Operating System is to execute user programs and to make tasks easier. Various application programs along with hardware systems are used to perform this work. Operating System is software that manages and controls the entire set of resources and effectively utilizes every
    9 min read
    Commonly Used Operating System
    There are various types of Operating Systems used throughout the world and this depends mainly on the type of operations performed. These Operating Systems are manufactured by large multinational companies like Microsoft, Apple, etc. Let's look at the few most commonly used OS in the real world: Win
    9 min read

    Structure of Operating System

    Operating System Services
    An operating system is software that acts as an intermediary between the user and computer hardware. It is a program with the help of which we are able to run various applications. It is the one program that is running all the time. Every computer must have an operating system to smoothly execute ot
    6 min read
    Introduction of System Call
    A system call is a programmatic way in which a computer program requests a service from the kernel of the operating system on which it is executed. A system call is a way for programs to interact with the operating system. A computer program makes a system call when it requests the operating system'
    11 min read
    System Programs in Operating System
    System Programming can be defined as the act of building Systems Software using System Programming Languages. According to Computer Hierarchy, Hardware comes first then is Operating System, System Programs, and finally Application Programs.In the context of an operating system, system programs are n
    5 min read
    Operating Systems Structures
    The operating system can be implemented with the help of various structures. The structure of the OS depends mainly on how the various standard components of the operating system are interconnected and merge into the kernel. This article discusses a variety of operating system implementation structu
    8 min read
    History of Operating System
    An operating system is a type of software that acts as an interface between the user and the hardware. It is responsible for handling various critical functions of the computer and utilizing resources very efficiently so the operating system is also known as a resource manager. The operating system
    8 min read
    Booting and Dual Booting of Operating System
    When a computer or any other computing device is in a powerless state, its operating system remains stored in secondary storage like a hard disk or SSD. But, when the computer is started, the operating system must be present in the main memory or RAM of the system.What is Booting?When a computer sys
    7 min read

    Types of OS

    Batch Processing Operating System
    In the beginning, computers were very large types of machinery that ran from a console table. In all-purpose, card readers or tape drivers were used for input, and punch cards, tape drives, and line printers were used for output. Operators had no direct interface with the system, and job implementat
    6 min read
    Multiprogramming in Operating System
    As the name suggests, Multiprogramming means more than one program can be active at the same time. Before the operating system concept, only one program was to be loaded at a time and run. These systems were not efficient as the CPU was not used efficiently. For example, in a single-tasking system,
    5 min read
    Time Sharing Operating System
    Multiprogrammed, batched systems provide an environment where various system resources were used effectively, but it did not provide for user interaction with computer systems. Time-sharing is a logical extension of multiprogramming. The CPU performs many tasks by switches that are so frequent that
    5 min read
    What is a Network Operating System?
    The basic definition of an operating system is that the operating system is the interface between the computer hardware and the user. In daily life, we use the operating system on our devices which provides a good GUI, and many more features. Similarly, a network operating system(NOS) is software th
    2 min read
    Real Time Operating System (RTOS)
    Real-time operating systems (RTOS) are used in environments where a large number of events, mostly external to the computer system, must be accepted and processed in a short time or within certain deadlines. such applications are industrial control, telephone switching equipment, flight control, and
    6 min read

    Process Management

    Introduction of Process Management
    Process Management for a single tasking or batch processing system is easy as only one process is active at a time. With multiple processes (multiprogramming or multitasking) being active, the process management becomes complex as a CPU needs to be efficiently utilized by multiple processes. Multipl
    8 min read
    Process Table and Process Control Block (PCB)
    While creating a process, the operating system performs several operations. To identify the processes, it assigns a process identification number (PID) to each process. As the operating system supports multi-programming, it needs to keep track of all the processes. For this task, the process control
    6 min read
    Operations on Processes
    Process operations refer to the actions or activities performed on processes in an operating system. These operations include creating, terminating, suspending, resuming, and communicating between processes. Operations on processes are crucial for managing and controlling the execution of programs i
    5 min read
    Process Schedulers in Operating System
    A process is the instance of a computer program in execution. Scheduling is important in operating systems with multiprogramming as multiple processes might be eligible for running at a time.One of the key responsibilities of an Operating System (OS) is to decide which programs will execute on the C
    7 min read
    Inter Process Communication (IPC)
    Processes need to communicate with each other in many situations. Inter-Process Communication or IPC is a mechanism that allows processes to communicate. It helps processes synchronize their activities, share information, and avoid conflicts while accessing shared resources.Types of Process Let us f
    5 min read
    Context Switching in Operating System
    Context Switching in an operating system is a critical function that allows the CPU to efficiently manage multiple processes. By saving the state of a currently active process and loading the state of another, the system can handle various tasks simultaneously without losing progress. This switching
    4 min read
    Preemptive and Non-Preemptive Scheduling
    In operating systems, scheduling is the method by which processes are given access the CPU. Efficient scheduling is essential for optimal system performance and user experience. There are two primary types of CPU scheduling: preemptive and non-preemptive. Understanding the differences between preemp
    5 min read

    CPU Scheduling in OS

    CPU Scheduling in Operating Systems
    CPU scheduling is a process used by the operating system to decide which task or process gets to use the CPU at a particular time. This is important because a CPU can only handle one task at a time, but there are usually many tasks that need to be processed. The following are different purposes of a
    8 min read
    CPU Scheduling Criteria
    CPU scheduling is essential for the system's performance and ensures that processes are executed correctly and on time. Different CPU scheduling algorithms have other properties and the choice of a particular algorithm depends on various factors. Many criteria have been suggested for comparing CPU s
    6 min read
    Multiple-Processor Scheduling in Operating System
    In multiple-processor scheduling multiple CPUs are available and hence Load Sharing becomes possible. However multiple processor scheduling is more complex as compared to single processor scheduling. In multiple processor scheduling, there are cases when the processors are identical i.e. HOMOGENEOUS
    8 min read
    Thread Scheduling
    There is a component in Java that basically decides which thread should execute or get a resource in the operating system. Scheduling of threads involves two boundary scheduling. Scheduling of user-level threads (ULT) to kernel-level threads (KLT) via lightweight process (LWP) by the application dev
    7 min read

    Threads in OS

    Thread in Operating System
    A thread is a single sequence stream within a process. Threads are also called lightweight processes as they possess some of the properties of processes. Each thread belongs to exactly one process.In an operating system that supports multithreading, the process can consist of many threads. But threa
    7 min read
    Threads and its Types in Operating System
    A thread is a single sequence stream within a process. Threads have the same properties as the process so they are called lightweight processes. On single core processor, threads are are rapidly switched giving the illusion that they are executing in parallel. In multi-core systems, threads can exec
    8 min read
    Multithreading in Operating System
    A thread is a path that is followed during a program’s execution. The majority of programs written nowadays run as a single thread. For example, a program is not capable of reading keystrokes while making drawings. These tasks cannot be executed by the program at the same time. This problem can be s
    7 min read

    Process Synchronization

    Introduction of Process Synchronization
    Process Synchronization is used in a computer system to ensure that multiple processes or threads can run concurrently without interfering with each other.The main objective of process synchronization is to ensure that multiple processes access shared resources without interfering with each other an
    10 min read
    Race Condition Vulnerability
    Race condition occurs when multiple threads read and write the same variable i.e. they have access to some shared data and they try to change it at the same time. In such a scenario threads are “racing” each other to access/change the data. This is a major security vulnerability.What is Race Conditi
    10 min read
    Critical Section in Synchronization
    A critical section is a segment of a program where shared resources, such as memory, files, or ports, are accessed by multiple processes or threads. To prevent issues like data inconsistency and race conditions, synchronization techniques ensure that only one process or thread accesses the critical
    8 min read
    Mutual Exclusion in Synchronization
    During concurrent execution of processes, processes need to enter the critical section (or the section of the program shared across processes) at times for execution. It might happen that because of the execution of multiple processes at once, the values stored in the critical section become inconsi
    6 min read

    Critical Section Problem Solution

    Peterson's Algorithm in Process Synchronization
    Peterson's Algorithm is a classic solution to the critical section problem in process synchronization. It ensures mutual exclusion meaning only one process can access the critical section at a time and avoids race conditions. The algorithm uses two shared variables to manage the turn-taking mechanis
    15+ min read
    Semaphores in Process Synchronization
    Semaphores are a tool used in operating systems to help manage how different processes (or programs) share resources, like memory or data, without causing conflicts. A semaphore is a special kind of synchronization data that can be used only through specific synchronization primitives. Semaphores ar
    15+ min read
    Semaphores and its types
    A semaphore is a tool used in computer science to manage how multiple programs or processes access shared resources, like memory or files, without causing conflicts. Semaphores are compound data types with two fields one is a Non-negative integer S.V(Semaphore Value) and the second is a set of proce
    6 min read
    Producer Consumer Problem using Semaphores | Set 1
    The Producer-Consumer problem is a classic synchronization issue in operating systems. It involves two types of processes: producers, which generate data, and consumers, which process that data. Both share a common buffer. The challenge is to ensure that the producer doesn't add data to a full buffe
    4 min read
    Readers-Writers Problem | Set 1 (Introduction and Readers Preference Solution)
    The readers-writer problem in operating systems is about managing access to shared data. It allows multiple readers to read data at the same time without issues but ensures that only one writer can write at a time, and no one can read while writing is happening. This helps prevent data corruption an
    7 min read
    Dining Philosopher Problem Using Semaphores
    The Dining Philosopher Problem states that K philosophers are seated around a circular table with one chopstick between each pair of philosophers. There is one chopstick between each philosopher. A philosopher may eat if he can pick up the two chopsticks adjacent to him. One chopstick may be picked
    11 min read
    Hardware Synchronization Algorithms : Unlock and Lock, Test and Set, Swap
    Process Synchronization problems occur when two processes running concurrently share the same data or same variable. The value of that variable may not be updated correctly before its being used by a second process. Such a condition is known as Race Around Condition. There are a software as well as
    4 min read

    Deadlocks & Deadlock Handling Methods

    Introduction of Deadlock in Operating System
    A deadlock is a situation where a set of processes is blocked because each process is holding a resource and waiting for another resource acquired by some other process. In this article, we will discuss deadlock, its necessary conditions, etc. in detail.Deadlock is a situation in computing where two
    11 min read
    Conditions for Deadlock in Operating System
    A deadlock is a situation where a set of processes is blocked because each process is holding a resource and waiting for another resource acquired by some other process. In this article, we will discuss what deadlock is and the necessary conditions required for deadlock.What is Deadlock?Deadlock is
    8 min read
    Banker's Algorithm in Operating System
    Banker's Algorithm is a resource allocation and deadlock avoidance algorithm used in operating systems. It ensures that a system remains in a safe state by carefully allocating resources to processes while avoiding unsafe states that could lead to deadlocks.The Banker's Algorithm is a smart way for
    8 min read
    Wait For Graph Deadlock Detection in Distributed System
    Deadlocks are a fundamental problem in distributed systems. A process may request resources in any order and a process can request resources while holding others. A Deadlock is a situation where a set of processes are blocked as each process in a Distributed system is holding some resources and that
    5 min read
    Handling Deadlocks
    Deadlock is a situation where a process or a set of processes is blocked, waiting for some other resource that is held by some other waiting process. It is an undesirable state of the system. In other words, Deadlock is a critical situation in computing where a process, or a group of processes, beco
    8 min read
    Deadlock Prevention And Avoidance
    Deadlock prevention and avoidance are strategies used in computer systems to ensure that different processes can run smoothly without getting stuck waiting for each other forever. Think of it like a traffic system where cars (processes) must move through intersections (resources) without getting int
    5 min read
    Deadlock Detection And Recovery
    Deadlock Detection and Recovery is the mechanism of detecting and resolving deadlocks in an operating system. In operating systems, deadlock recovery is important to keep everything running smoothly. A deadlock occurs when two or more processes are blocked, waiting for each other to release the reso
    6 min read
    Deadlock Ignorance in Operating System
    In this article we will study in brief about what is Deadlock followed by Deadlock Ignorance in Operating System. What is Deadlock? If each process in the set of processes is waiting for an event that only another process in the set can cause it is actually referred as called Deadlock. In other word
    5 min read
    Recovery from Deadlock in Operating System
    In today's world of computer systems and multitasking environments, deadlock is an undesirable situation that can bring operations to a halt. When multiple processes compete for exclusive access to resources and end up in a circular waiting pattern, a deadlock occurs. To maintain the smooth function
    8 min read
geeksforgeeks-footer-logo
Corporate & Communications Address:
A-143, 7th Floor, Sovereign Corporate Tower, Sector- 136, Noida, Uttar Pradesh (201305)
Registered Address:
K 061, Tower K, Gulshan Vivante Apartment, Sector 137, Noida, Gautam Buddh Nagar, Uttar Pradesh, 201305
GFG App on Play Store GFG App on App Store
Advertise with us
  • Company
  • About Us
  • Legal
  • Privacy Policy
  • In Media
  • Contact Us
  • Advertise with us
  • GFG Corporate Solution
  • Placement Training Program
  • Languages
  • Python
  • Java
  • C++
  • PHP
  • GoLang
  • SQL
  • R Language
  • Android Tutorial
  • Tutorials Archive
  • DSA
  • Data Structures
  • Algorithms
  • DSA for Beginners
  • Basic DSA Problems
  • DSA Roadmap
  • Top 100 DSA Interview Problems
  • DSA Roadmap by Sandeep Jain
  • All Cheat Sheets
  • Data Science & ML
  • Data Science With Python
  • Data Science For Beginner
  • Machine Learning
  • ML Maths
  • Data Visualisation
  • Pandas
  • NumPy
  • NLP
  • Deep Learning
  • Web Technologies
  • HTML
  • CSS
  • JavaScript
  • TypeScript
  • ReactJS
  • NextJS
  • Bootstrap
  • Web Design
  • Python Tutorial
  • Python Programming Examples
  • Python Projects
  • Python Tkinter
  • Python Web Scraping
  • OpenCV Tutorial
  • Python Interview Question
  • Django
  • Computer Science
  • Operating Systems
  • Computer Network
  • Database Management System
  • Software Engineering
  • Digital Logic Design
  • Engineering Maths
  • Software Development
  • Software Testing
  • DevOps
  • Git
  • Linux
  • AWS
  • Docker
  • Kubernetes
  • Azure
  • GCP
  • DevOps Roadmap
  • System Design
  • High Level Design
  • Low Level Design
  • UML Diagrams
  • Interview Guide
  • Design Patterns
  • OOAD
  • System Design Bootcamp
  • Interview Questions
  • Inteview Preparation
  • Competitive Programming
  • Top DS or Algo for CP
  • Company-Wise Recruitment Process
  • Company-Wise Preparation
  • Aptitude Preparation
  • Puzzles
  • School Subjects
  • Mathematics
  • Physics
  • Chemistry
  • Biology
  • Social Science
  • English Grammar
  • Commerce
  • World GK
  • GeeksforGeeks Videos
  • DSA
  • Python
  • Java
  • C++
  • Web Development
  • Data Science
  • CS Subjects
@GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our Cookie Policy & Privacy Policy
Lightbox
Improvement
Suggest Changes
Help us improve. Share your suggestions to enhance the article. Contribute your expertise and make a difference in the GeeksforGeeks portal.
geeksforgeeks-suggest-icon
Create Improvement
Enhance the article with your expertise. Contribute to the GeeksforGeeks community and help create better learning resources for all.
geeksforgeeks-improvement-icon
Suggest Changes
min 4 words, max Words Limit:1000

Thank You!

Your suggestions are valuable to us.

What kind of Experience do you want to share?

Interview Experiences
Admission Experiences
Career Journeys
Work Experiences
Campus Experiences
Competitive Exam Experiences