In CP there are two types of topics - general techniques (like DP, greedy, brute force) and particular algorithms (like graph, math, data structures).
I am also active at:
Tuesday, September 29, 2020
Monday, September 28, 2020
Sunday, September 27, 2020
List of best online resources for software engineers
- https://www.tutorialride.com/
- https://cses.fi/problemset/
- https://www.java67.com/
- https://erdplus.com/
- https://www.youtube.com/watch?v=zWg7U0OEAoE&list=PLBF3763AF2E1C572F
- https://www.youtube.com/watch?v=qH6yxkw0u78&list=PL-pUjcDnciX3Z5AEE8HHRrcfj-987Ia94
- https://www.kaggle.com/learn/overview
- https://www.freecodecamp.org/news/new-online-courses/
- https://www.youtube.com/watch?v=n2D1o-aM-2s&list=PLh94XVT4dq02frQRRZBHzvj2hwuhzSByN
- https://www.tutorialspoint.com/cakephp/index.htm
- EJB coding
- coursera.org/learn/django-build-web-apps
- https://www.netacad.com/
- developers.turing.com/welcome
Friday, September 25, 2020
Default Route in a Routing device
Understanding the default route:
A default route is the route that takes effect when no other route is available for an IP destination address.
If a packet is received on a routing device, the device first checks to see if the IP destination address is on one of the device’s local subnets. If the destination address is not local, the device checks its routing table. If the remote destination subnet is not listed in the routing table, the packet is forwarded to the next hop toward the destination using the default route. The default route generally has a next-hop address of another routing device, which performs the same process. The process repeats until a packet is delivered to the destination.
The route evaluation process in each router uses the longest prefix match method to obtain the most specific route. The network with the longest subnet mask that matches the destination IP address is the next-hop network gateway.
The default route in IPv4 is designated as 0.0.0.0/0 or simply 0/0. Similarly, in IPv6, the default route is specified as ::/0. The subnet mask /0 specifies all networks, and is the shortest match possible. A route lookup that does not match any other route uses this route if it is configured and active in the routing table. To be active, the configured next-hop address must be reachable.
Administrators generally point the default route toward the routing device that has a connection to a network service provider. Therefore, packets with destinations outside the organization's local area network, typically destinations on the Internet or a wide area network, are forwarded to the routing device with the connection to that provider. The device to which the default route points is often called the default gateway.
Sources:
https://www.juniper.net/documentation/en_US/junos/topics/concept/default-route-understanding.html
Wednesday, September 23, 2020
Wednesday, September 16, 2020
Monday, September 14, 2020
Genesis of the word 'CAPCHA'
CAPCHA - "Completely Automatic Public turing test to tell Computers and Humans Apart".
You can also think of it as
CAPCHA = CAPTURE + GOTCHA
'gotcha' means - I have got you (used to express satisfaction at having captured or defeated someone or uncovered their faults).
This word was coined by Manuel Blum (born 1938) is a professor of computer science at Carnegie Mellon University, Pittsburgh, Pennsylvania.
Sunday, September 13, 2020
Saturday, September 12, 2020
What is a 'Internet Covert Channel'?
A covert channel is an evasion or attack technique that is used to transfer information in a secretive, unauthorized or illicit manner. A covert channel can be used to extract information from or implant information into an organization. An Internet covert channel is the digital equivalent of a briefcase with a secret compartment that a spy might use to slip sensitive documents past security guards into or out of a secure facility. An attacker can use Internet covert channels to transmit sensitive documents unobserved – in this case, bypassing network security measures rather than bypassing security guards. And just as a spy can use that same secret compartment to conceal a weapon from security guards when entering a secure facility, an attacker can use an Internet covert channels to conceal a cyberweapon, for example, a download of malware from an external server onto a host within an organization’s private network.
Internet covert channels can use conventional Internet protocols in unconventional ways. The channel endpoints – an infected computer and the attacker’s command and control computer – must use this evasion or attack software that recognizes and processes these unconventional techniques. Either a user or malware can install this software, or an attacker can install the software using a remote administration tool (RAT). Internet covert channels are different from encrypted tunnels. They can and do transfer information in plain text, but they’re unobserved. While they do not require encryption methods or keys, certain covert channels employ encryption or other means to obfuscate data.
source https://www.icann.org/news/blog/what-is-an-internet-covert-channel
In computer security, a covert channel is a type of attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy.
A covert channel is so called because it is hidden from the access control mechanisms of secure operating systems since it does not use the legitimate data transfer mechanisms of the computer system (typically, read and write), and therefore cannot be detected or controlled by the security mechanisms that underlie secure operating systems.
Covert channels are exceedingly hard to install in real systems, and can often be detected by monitoring system performance.
Covert channels can tunnel through secure operating systems and require special measures to control. Covert channel analysis is the only proven way to control covert channels.
There are two kinds of covert channels:
- Storage channels - Communicate by modifying a "storage location", such as a hard drive.
- Timing channels - Perform operations that affect the "real response time observed" by the receiver.
Storage Channels — Storage Covert channels encode covert data in the packets themselves (encoded in headers as I mentioned before). Timing (temporal) Channels —Delay between the packets is used to transmit data.
Link to Excellent explanation of covert-channels
Covert Channels are not efficient in terms of throughput. But they are quite good at hiding their presence, hence providing security by obscurity. If a covert channel is detected, it’s very likely to be entirely compromised unless the content is further protected by encryption.
A network protocol is basically a contract between a sender and a receiver, where the sender sends structured information in a format that can be interpreted by the receiver. This ‘structure’ of the information is defined as the ‘network packet’ structure. A packet mainly consists of 3 parts which are called the header
, data
, and an optional trailer
. Firewalls and Intrusion Detection Systems (IDS) are particularly interested in the data
section of a packet as it carries the actual payload of the transmission.
Video links on Covert channels
Thursday, September 10, 2020
How can I run a C++ program directly from Windows?
How-can-I-run-a-C-program-directly-from-Windows
-
Acronym Full Form AJAX Asynchronous JavaScript and XML API Application Programming Interface APK Android Application Package ASP Activ...
-
#include<stdio.h> int main() { int M,N,q; scanf("%i %i",&M, &N); if((M%N)!=0) {printf("0&quo...
-
"A good company understands that problem solving ability and the ability to learn new things are far more important than knowledge o...