Skip to main content

Posts

Showing posts from September, 2021

Is Li-Fi Better than Wi-Fi?

Li-Fi  ( light fidelity )  is a bidirectional wireless system that transmit data to the devices like mobiles, laptop, etc., via infrared light or LED. The device has a receiver to pick up light signals and a transmitter to send light signal back to the lamp using infrared light or LED. It was first unveiled in 2011 and, unlike Wi-Fi, which uses radio frequency, Li-Fi technology only needs a light source with a chip to transmit an internet signal through light waves. Light fidelity (LiFi) is a faster, more secure and efficient wireless connection that uses light waves to transmit data Li-Fi technology still has a long way to go before worldwide adoption but every year, we are getting nearer to enjoying it for ourselves. The future surely looks bright with LiFi. How LiFi Works? LiFi makes use of visible light through overhead lighting for the transmission of data. This is possible through the use of a Visible Light Communications (VLC) system for data transmission. A VLC system has two q

Protocols used in IoT

We will see the most commonly used Protocols in IoT here. Bluetooth Recent developments in Bluetooth are set to position the technology as 'the communication protocol of choice' for IoT. In fact, Bluetooth with its ability to connect disparate devices and industries through short-range technology can transform the way devices interact with each other. AMQP (Advanced Message Queuing Protocol) AMQP is an open standard protocol used for more message-oriented middleware. As such, it allows for messaging interoperability between systems regardless of the message brokers or platforms being used. It offers security and interoperability, as well as reliability, even at a distance or over poor networks. It supports communications, even when systems aren't simultaneously available. ZIGBEE  Zigbee is a wireless technology developed as an open global standard to address the unique needs of low-cost, low-power wireless IoT networks. The Zigbee standard operates on the IEEE 802.15.4 phy

Top 10 Web Application Security Risks

  The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.  Companies should adopt this document and start the process of ensuring that their web applications minimize these risks. Using the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces more secure code. Top 10 Web Application Security Risks A1:2017-Injection : Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. A2:2017-Broken Authentication : Application functions related to authentication and session management are often implemented incorrectly, allowing attackers to compromise

C|EH (Practical) : Tips and Tricks to write Exam

About the Certified Ethical Hacker (Practical) C|EH Practical is a six-hour, rigorous exam that requires you to demonstrate the application of ethical hacking techniques such as threat vector identification, network scanning, OS detection, vulnerability analysis, system hacking, web app hacking, etc. to solve a security audit challenge. This is the next step after you have attained the highly acclaimed Certified Ethical Hacker certification. Professionals that possess the C|EH credential will be able to sit for exam that will test them to their limits in unearthing vulnerabilities across major operating systems, databases, and networks. You will be given limited time, just like in the real world. The exam was developed by a panel of experienced SMEs and includes 20 real-life scenarios with questions designed to validate essential skills required in the ethical hacking domains as outlined in the C|EH program. It is not a simulated exam but rather, it mimics a real corporate network thro

Ethical Hacking

  What is an Ethical Hacking? Ethical Hacking sometimes known as as Penetration Testing is an act of intruding or penetrating into system or networks find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, to minimize or eliminate any potential attacks. Who is Hacker? A Hacker is a person who discovers and exploits the weakness in computers and/or networks to gain access. Hackers are typically experienced computer programmers with knowledge of computer security. Hackers are categorized according to the intent of their actions. Hackers are categorized as follows: White Hat A hacker who gains access to systems/networks with a view to fix the identified vulnerabilities. They may

WiFi Standards

 What is Wifi? WiFi stands for Wireless Fidelity. It is based on the IEEE 802.11 family of standards and is mainly a local area networking (LAN) technology designed to provide in-building broadband coverage. Nowadays, WiFi has become the de facto standard for last mile broadband connectivity in homes, offices, and public hotspot locations. Systems can typically provide a coverage range of only about 1,000 feet from the access point. Wifi Standards The 802.11 standard is defined through several specifications of WLANs. It defines an over-the-air interface between a wireless client and a base station or between two wireless clients. 802.11b • 802.11b was approved in 1999. • It uses the same 2.4 GHz frequency as the original 802.11 standard. • It supports a maximum theoretical rate of 11 Mbps and has a range up to 150 feet. • 802.11b components are cheap, but the standard has the slowest maximum speed of all the 802.11 standards. • And since 802.11b operates in the 2.4 GHz, home appliance

Print Multiplication Tables in Python

# -*- coding: utf-8 -*- #Created on Sat Sep 21 10:24:49 2019 # @author: MEGHA m = int(input("How many tables you want to print?")) n = int(input("How many tables you want to print in each row?")) p = int(input("How many terms you want in each table?" )) print ("\nThe MultiPlication Tables are") print ("****************************** ") for x in range (1,m,n):     for y in range (1,p+1):         for z in range (1,n+1,1) :             if x+z-1 <= m :                 print (str(y) + " * " +str( x+z-1) + " = "+str(y*(x+z-1)), end = "\t ")         print("")     print("") # end Result: How many tables you want to print?15 How many tables you want to print in each row?5 How many terms you want in each table?2 The MultiPlication Tables are ******************************  1 * 1 = 1           1 * 2 = 2           1 * 3 = 3           1 * 4 = 4           1 * 5 = 5   2 * 1 = 2     

Password Security

Password Security is the first and most basic act of securing your information and data. Using strong passwords lowers the overall risk of a security breach. Risks • Weak Passwords • Password Sharing Risk Impact • Week Passwords o      Password can be easily guessed o      Critical Information Loss • Password Sharing o      Personal / Company’s Information disclosure to other parties How to Stop?  Don’t use the same password for different applications.  If password is stolen, all the information it protects is at risk and can be used to take over all your accounts Don’t use personal information as password like name, birthday, driving license, passport number etc., Don’t use dictionary words in any language or abbreviations Don’t use sequence or character patterns like ‘abcdef’ or adjacent letters of your keyboard Don’t use sequences or repeated numbers. Examples 1234567, 44444, birthdate(11-04-72) Don’t share passwords on Phones, SMS, email Best Practices: • The longer the password, t