Anonymous is a decentralized international hacktivist group that is widely known for its various DDoS cyber attacks against several governments, government institutions and government agencies, corporations, and the Church of Scientology.
Wednesday, 29 May 2019
Saturday, 18 May 2019
SECURITY MECHANISM
These are the step to prevent from hacking
.Encipherment
. Digital signature
.Access controle
.Authentication exchange
.Traffic podding
Encipherment
is type of security mechanism in Which we hide actual data and we do not show real and actual data
In another mechanism which is the
digital signature
it maintain the authenticity and intigirity in digital signature when sender send the data it generate a key and attached with message the key is only for authenticated receiver and when receiver get the message use the key to decode or decrypt it
Access control
In this mechanism we give the priority that which data is highly confidential and which is not and in this manner we control the access to data
and manage that which data are for public access and which data is private access
Authentication exchange
Authentication exchange are used for to identify the authenticated user by the information exchange
Traffic podding
In this mechanism we hide some data packet from the path so the hacker can not access full data in this mechanism hacker even do not understand what is actula source of data transmission
Routing control
To prevent hacking threat we use routing control it mean when we data transfer router uses many different way to get deliverd at destination in this hacker typically get access to data with help of routing control we can use different path for data transfer
.Encipherment
. Digital signature
.Access controle
.Authentication exchange
.Traffic podding
- .Routing control
Encipherment
is type of security mechanism in Which we hide actual data and we do not show real and actual data
In another mechanism which is the
digital signature
it maintain the authenticity and intigirity in digital signature when sender send the data it generate a key and attached with message the key is only for authenticated receiver and when receiver get the message use the key to decode or decrypt it
Access control
In this mechanism we give the priority that which data is highly confidential and which is not and in this manner we control the access to data
and manage that which data are for public access and which data is private access
Authentication exchange
Authentication exchange are used for to identify the authenticated user by the information exchange
Traffic podding
In this mechanism we hide some data packet from the path so the hacker can not access full data in this mechanism hacker even do not understand what is actula source of data transmission
Routing control
To prevent hacking threat we use routing control it mean when we data transfer router uses many different way to get deliverd at destination in this hacker typically get access to data with help of routing control we can use different path for data transfer
Wednesday, 15 May 2019
CRYPTOGRAPHY & SECURITY ATTACKS
First we discussed about what is cryptography
Its the secure communication from sender to receiver in the persence of third party by using encryption keys that is public key and private key if the data is ecrypted by using private then the message or data will be decrypted only with public key
And if the data is encrypted with the public key then it will be decrypted with private key it is the main concept of encryption and decryption
Security attacks in computer language its define as the unauthorized access to the system by sending sime malecious and virus there are two type of security attacks
● passive
Passive attack have two sub category
. Release of message content
. Traffic analysis
● active
In active attack data stolen from the middle of path and its able to modify and add some new bit with original message.
In the active attack message is not in its original form it becom crrupted
●Passive attacks
In this types of attack haker or intrudure only read the data it is not able to modify or edit the real message sender send the message and receiver authorizes to get message but third party steal the message from the path
By the help of traffic analysis
Hacker can track the path that from where the data is being send and to the whome it is being deliverd by the help of traffic analysis
Sunday, 5 May 2019
Synchronous and Asynchronous communication evolution of microprocessor
SYNCHRINOUS COMMUNICATION
A communication is said to be synchronous if the data have been sent to destination in block if there are 8 bits data
10011001 it is the sender data and the data will receive by receiver in this same sequence 10011001 the clock speed of send and receiver is same
ASYNCHRONOUS COMMUNICATION
It is define as the communication between microprocessor and input output devices
The clock speed different in this communication data is send in the form of binary
There is start and stope bit 0 is refer as stop bit and 1 is start bit attach to the block of data
MICROPROCESSOR
Microprocessor is a programable electronic chip which could perform arithmetic and logic operation and have computing and decision making capabilities
EVLUTION OF MICRO. P
4 Bit microprocessor =the first microprocessor was introduced by intel corp in 1971 it was named as intel 4004 becoz it was a 4 bit microprocessor it could perform mathmetical operation like addition substraction and multiplication etc after some time intel introduced enhance version of 4004 the 4040
8 bit microprocessor = the first 8 bit microprocessor which could perform arithmetic and logic operation in 1973 again by intel it was intel 8008 and again followed by intel in 8088
16 bit microprocessor= 8 bit microprocessor were followed by 16 bit micropeocessor named 8086 amd 80286
32 bit microprocessor = the 32 bit microprocessor were introduced by many companies but most famaous one is intel 80386
Pentium series. = This type of processor allow to multiple processor in a single system
A communication is said to be synchronous if the data have been sent to destination in block if there are 8 bits data
10011001 it is the sender data and the data will receive by receiver in this same sequence 10011001 the clock speed of send and receiver is same
ASYNCHRONOUS COMMUNICATION
It is define as the communication between microprocessor and input output devices
The clock speed different in this communication data is send in the form of binary
There is start and stope bit 0 is refer as stop bit and 1 is start bit attach to the block of data
MICROPROCESSOR
Microprocessor is a programable electronic chip which could perform arithmetic and logic operation and have computing and decision making capabilities
EVLUTION OF MICRO. P
4 Bit microprocessor =the first microprocessor was introduced by intel corp in 1971 it was named as intel 4004 becoz it was a 4 bit microprocessor it could perform mathmetical operation like addition substraction and multiplication etc after some time intel introduced enhance version of 4004 the 4040
8 bit microprocessor = the first 8 bit microprocessor which could perform arithmetic and logic operation in 1973 again by intel it was intel 8008 and again followed by intel in 8088
16 bit microprocessor= 8 bit microprocessor were followed by 16 bit micropeocessor named 8086 amd 80286
32 bit microprocessor = the 32 bit microprocessor were introduced by many companies but most famaous one is intel 80386
Pentium series. = This type of processor allow to multiple processor in a single system
Wednesday, 1 May 2019
The central principle of Object oriented programming
- Inheritance , polymorphism , Abstraction ,& Data encapsulation _____. We all ready discussed about polymorphism we will discuss about inheritacne and abstraction and data Encapsulation
- Inheritance . One of the keyfeature of OOp in programming which is allow the user to creat a new class from a base class or parent class the derived class have the feature of base class and additional feature of its own
- there are some type of inheritance
A derived class with only one base class● Single inheritance=
● multilevel inheritance
From One base class(A) we get child class(B) from the child class ( B )we derived another class ( C ) this type of inheritance is known as multilevel inheritance
● Multiple inheritancel
From many or multiple base class ( A)(B)(C) we derived a single derived class ( D)
Its is know as multiple inheritance
● Hierarchical inheritance
From one base class we get many derived class or child class
● Hybrid inheritance
The combination of hierarical inheritance and multiple inheritance is known as hybrid inheritance
●. ABSTRACTION
Its is one of the central principle along with (encapsulation and inheritance )
With the help of abstraction process programmer hides unnecessary data and show only relevant data about an object in order to reduce the complexcity and increase the efficiency
● DATA ENCAPSULATION
It is a process in which the data of a class and object
Combine in a single form encapsulation prevent the direct access to the data
Its prevent from or reduse
se the hacking threat
● REUSE ABILITY IN (OOP)
THE concept of inheritance provide the idea of reuseability
This mean
Subscribe to:
Posts (Atom)
Neural network
One of the most powerful things about our brains is the way neurons allow us to learn. Computer scientists have been inspired by the way th...

-
Inheritance , polymorphism , Abstraction ,& Data encapsulation _____. We all ready discu...
-
The act of copying software without being authorized for its uses its termed as software piracy if some needs to use particular soft...
-
Will computer connect with human mind and combine the power of human mind and computer become super power ( Brain – computer interfa...