Wednesday, 29 May 2019

Anonymous is a decentralized international hacktivist group that is widely known for its various DDoS cyber attacks against several governments, government institutions and government agencies, corporations, and the Church of Scientology.
Motto: We Are Anonymous
Membership: Decentralized affinity group
Purpose: Anti-cyber-surveillance; Anti-cyber-censorship; Internet activismInternet vi...
Region served: Global

Saturday, 18 May 2019

SECURITY MECHANISM

These are the step to prevent from hacking

.Encipherment
. Digital signature
.Access controle
.Authentication exchange
.Traffic podding

  • .Routing control 


Encipherment
is type of security mechanism  in  Which we hide actual data and we do not show real and actual data
In another mechanism which is the
digital signature
   it maintain the authenticity and intigirity  in digital signature  when sender send the data it generate a key and attached with message the key is only for authenticated receiver and when receiver get the message use the key to decode or decrypt it
Access control
In this mechanism we give the priority that which data is highly confidential  and which is not and in this manner we control the access to data
and  manage that which data are for public access and which data is private access

Authentication exchange
Authentication exchange are used for to identify the authenticated user  by the information exchange
Traffic podding
In this mechanism we hide some data packet from the path so the hacker can not access full data in this mechanism hacker even do not understand  what is actula source of data transmission
Routing control
To prevent hacking threat we use routing control it mean when we data transfer router uses many different way to get deliverd at destination in this hacker typically get access to data with help of routing control we can use different path for data transfer

Wednesday, 15 May 2019

CRYPTOGRAPHY & SECURITY ATTACKS

First we discussed about what is cryptography 
Its the secure communication from sender  to receiver  in the persence of third party by using encryption keys that is public key and private key if the data is ecrypted by using private then the message or data will be decrypted only with public key 
And if the data is encrypted with the public key then it will be decrypted with  private key it is the main concept of encryption and decryption 

Security attacks in computer language  its define as the unauthorized access to the system by sending sime malecious and virus  there are two type of security attacks 

● passive
  Passive attack have two sub category
  . Release of message content 
  . Traffic analysis 
 
● active  
   In active attack data stolen from the middle of path and its able to modify and add some new bit with original message. 
In the active attack message is not in its original form it becom crrupted 

●Passive attacks 
In this types of attack haker or intrudure only read the data it  is not able to modify or edit the real message  sender send the message and receiver authorizes to get message but third party steal the message from the path 
By the help of traffic analysis  
Hacker can track the path that from where the data is being send and to the whome it is being deliverd  by the help of traffic analysis 

Sunday, 5 May 2019

Synchronous and Asynchronous communication evolution of microprocessor

SYNCHRINOUS COMMUNICATION

A communication is said to be synchronous if the data have been sent to destination in block  if there are 8 bits data
 10011001  it is the sender data and the data will receive by receiver in this same sequence 10011001  the clock speed of send and receiver is same

ASYNCHRONOUS COMMUNICATION

 It is define as the communication between microprocessor and input output devices
The clock speed different in this communication data is send in the form of binary
There is start and stope bit 0 is refer as stop bit and 1 is start bit attach  to the block of data

MICROPROCESSOR

 Microprocessor is a programable  electronic chip which could perform arithmetic and logic operation and have computing and decision making capabilities 

EVLUTION OF MICRO.   P

4 Bit microprocessor  =the first microprocessor was introduced by intel corp in 1971 it was named as intel 4004  becoz it was a 4 bit microprocessor  it could perform mathmetical operation like addition substraction and multiplication etc after some time intel introduced enhance version of 4004  the 4040

8 bit microprocessor = the first  8 bit microprocessor which could perform arithmetic and logic operation in 1973 again by intel  it was intel 8008  and again followed by intel in 8088

16 bit microprocessor=  8 bit microprocessor were followed by  16 bit micropeocessor named  8086 amd 80286

32 bit microprocessor = the 32 bit microprocessor were introduced by many companies  but most famaous  one is intel 80386

Pentium series. = This type of processor allow to multiple processor in a single  system

Wednesday, 1 May 2019

The central principle of Object oriented programming

  • Inheritance  , polymorphism , Abstraction ,& Data encapsulation _____.                                           We all  ready discussed about polymorphism  we will discuss about inheritacne and abstraction and data Encapsulation
  • Inheritance . One of the keyfeature of OOp in  programming which is allow the user to creat a new class from a base class or parent class the derived class have the feature of base class and additional feature of its own  
  •  there are some type of inheritance 
● Single inheritance= 
A derived class with only one base class
                   ● multilevel inheritance
 From One base class(A)  we get  child class(B) from the child class ( B )we derived another class ( C ) this type of inheritance is known as multilevel inheritance
         
              ● Multiple inheritancel
From many or multiple base class ( A)(B)(C)  we derived a single derived class ( D)
Its is know as multiple inheritance

                   ● Hierarchical  inheritance
From one base class we get many derived class or child class
                ● Hybrid inheritance
The combination of hierarical inheritance and multiple inheritance  is known as hybrid inheritance
                   ●. ABSTRACTION
Its is one of the central principle along with (encapsulation and inheritance )
With the help of abstraction process programmer hides unnecessary  data and show only relevant  data about an object in order to reduce the complexcity  and increase the efficiency

                  ● DATA ENCAPSULATION
It is a process in which  the data of a class and object
Combine in a single form encapsulation prevent the direct access to the data
Its prevent from or reduse
se the hacking threat

                 ● REUSE ABILITY IN (OOP)

THE concept of inheritance provide the idea of reuseability
This mean














Neural network

One of the most powerful things about our brains is the way neurons allow us to learn. Computer scientists have been inspired by the way th...