Tuesday, September 29, 2020

Competitive Programming

 In CP there are two types of topics - general techniques (like DP, greedy, brute force) and particular algorithms (like graph, math, data structures).

Friday, September 25, 2020

How to become a great programmer

Find how to become a great programmer https://qr.ae/pNo38T 

Default Route in a Routing device

Understanding the default route: 

A default route is the route that takes effect when no other route is available for an IP destination address.

If a packet is received on a routing device, the device first checks to see if the IP destination address is on one of the device’s local subnets. If the destination address is not local, the device checks its routing table. If the remote destination subnet is not listed in the routing table, the packet is forwarded to the next hop toward the destination using the default route. The default route generally has a next-hop address of another routing device, which performs the same process. The process repeats until a packet is delivered to the destination.

The route evaluation process in each router uses the longest prefix match method to obtain the most specific route. The network with the longest subnet mask that matches the destination IP address is the next-hop network gateway.

The default route in IPv4 is designated as 0.0.0.0/0 or simply 0/0. Similarly, in IPv6, the default route is specified as ::/0. The subnet mask /0 specifies all networks, and is the shortest match possible. A route lookup that does not match any other route uses this route if it is configured and active in the routing table. To be active, the configured next-hop address must be reachable.

Administrators generally point the default route toward the routing device that has a connection to a network service provider. Therefore, packets with destinations outside the organization's local area network, typically destinations on the Internet or a wide area network, are forwarded to the routing device with the connection to that provider. The device to which the default route points is often called the default gateway.

Sources:

https://www.juniper.net/documentation/en_US/junos/topics/concept/default-route-understanding.html

https://www.computernetworkingnotes.com/ccna-study-guide/default-routes-in-cisco-routers-explained.html

Monday, September 14, 2020

Open source PHP projects

 Complete list of good 50-most-popular-php-projects-on-github.

Genesis of the word 'CAPCHA'

 CAPCHA - "Completely Automatic Public turing test to tell Computers and Humans Apart".

You can also think of it as 

CAPCHA = CAPTURE + GOTCHA

'gotcha' means - I have got you (used to express satisfaction at having captured or defeated someone or uncovered their faults).

This word was coined by Manuel Blum (born 1938) is a professor of computer science at Carnegie Mellon University, Pittsburgh, Pennsylvania.

Machine Learning: Image recognition

 An-image-recognition-classifier-using-cnn-keras-and-tensorflow-backend-31fda7856906

Saturday, September 12, 2020

Web Services

 What are web services? How it works?

Common Architecture flaws is a computer security

 Types of security attacks

Asynchronous Attack in Computer Security

 video on Asynchronous attack

Trap-doors or Back-doors or Maintenance Hook in computer security

 Trap door concept.


What is a 'Internet Covert Channel'?

 covert channel is an evasion or attack technique that is used to transfer information in a secretive, unauthorized or illicit manner. A covert channel can be used to extract information from or implant information into an organization. An Internet covert channel is the digital equivalent of a briefcase with a secret compartment that a spy might use to slip sensitive documents past security guards into or out of a secure facility. An attacker can use Internet covert channels to transmit sensitive documents unobserved – in this case, bypassing network security measures rather than bypassing security guards. And just as a spy can use that same secret compartment to conceal a weapon from security guards when entering a secure facility, an attacker can use an Internet covert channels to conceal a cyberweapon, for example, a download of malware from an external server onto a host within an organization’s private network.

Internet covert channels can use conventional Internet protocols in unconventional ways. The channel endpoints – an infected computer and the attacker’s command and control computer – must use this evasion or attack software that recognizes and processes these unconventional techniques. Either a user or malware can install this software, or an attacker can install the software using a remote administration tool (RAT). Internet covert channels are different from encrypted tunnels. They can and do transfer information in plain text, but they’re unobserved. While they do not require encryption methods or keys, certain covert channels employ encryption or other means to obfuscate data.

source https://www.icann.org/news/blog/what-is-an-internet-covert-channel

In computer security, a covert channel is a type of attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy

A covert channel is so called because it is hidden from the access control mechanisms of secure operating systems since it does not use the legitimate data transfer mechanisms of the computer system (typically, read and write), and therefore cannot be detected or controlled by the security mechanisms that underlie secure operating systems.

 Covert channels are exceedingly hard to install in real systems, and can often be detected by monitoring system performance.

Covert channels can tunnel through secure operating systems and require special measures to control. Covert channel analysis is the only proven way to control covert channels.

 There are two kinds of covert channels:

  • Storage channels - Communicate by modifying a "storage location", such as a hard drive.
  • Timing channels - Perform operations that affect the "real response time observed" by the receiver.

Link to Excellent explanation of covert-channels

Covert Channels are not efficient in terms of throughput. But they are quite good at hiding their presence, hence providing security by obscurity. If a covert channel is detected, it’s very likely to be entirely compromised unless the content is further protected by encryption.

A network protocol is basically a contract between a sender and a receiver, where the sender sends structured information in a format that can be interpreted by the receiver. This ‘structure’ of the information is defined as the ‘network packet’ structure. A packet mainly consists of 3 parts which are called the and an optional Firewalls and Intrusion Detection Systems (IDS) are particularly interested in the data section of a packet as it carries the actual payload of the transmission.

Video links on Covert channels

Sacred Thought

26 April 2024  Dear friends, I write the explanation of two verses of Geets for all of you, I hope you all will like it and benefit from it....