Posts

Cyber Security Education in West Bengal as my TOC (Thing Of Concern).

This is the end of 2022 and the era of Technologies where we are continuously exploring new things which are quite cool and useful and easy-to-use stuff. One of these evolving techs is Cyber Security which is now evolving as a thing of great concern for different states of India as well as India as a whole. But along with that we come across a problem which is quite a huge one, the problem of education on Cyber Security to normal people. My concern here is educating the children on Cyber Security with which they'll not only get to know about the whole Cyber Culture but will also be able to be some Best Solutions of Cyber Security both for the State as well as the Nation. But the thing to notice here is about the educators who will educate the children. In my view we lack those kinds of people here at least in Bengal. There are no "Good Teachers" of Cyber Security here to teach in schools neither we have such an infrastructure to develop one.  There's a recent news of...

What are VPNs?

    VPN stands for  Virtual Private Network . A VPN provides a secure & protected connection when connected to a network. It encrypts all the datas & disguise us with absolutely under a different identity with a different IP (Internet Protocol) address & Location. The encryption happens in  "Real Time".  It makes tracking parties more difficult to track you....   How  does a VPN  work? A VPN connection disguises your data traffic online and protects it from external access. Unencrypted data can be viewed by anyone who has network access and wants to see it. With a VPN, hackers and cyber criminals can’t decipher this data. Encryption:  To read the data, you need an  encryption key  . Without one, it would take millions of years for a computer to decipher the code in the event of a bruteforce attack. With the help of a VPN, your online activities are hidden even on public networks. Secure Data Transfer : If you work remote...

How to be Secure in Social media and games?

Image
This is 2020 , an era where people totally depend on technology or simply speaking the Cyber World. If I say Social media then most of us use it Wright!  But most of us don't know the probable threats that once caused can seriously damage whole of our life . After installing during the configuration process we give the access to some various informative & vital parts of our device such as: Call logs, Media access etc..... And also link some  other apps mostly games to Social media such as Facebook for accessing photos,  medias etc...some people also link it without having the right knowledge just because they see the option. And here comes the most dangerous part. If by chance anyone gains the access to your social media account with a bad intention he/she can easily get the access to everything linked with it. And to get that is super easy...           And as a result of getting the access to your account the person will change your acco...

What is Blind SQL Injection?

Image
Blind SQL Injection is a type of SQL ( Structured QueryLanguage )  injection attack that asks the database questions related to True  Or  False and then determines the answer based on the application's response.  This attack is done when the application is configured to show generic error messages, but has not mitigated the code that is vulnerable to SQL Injection.  Sometimes when exploiting SQL Injection to a Web Application it shows error messages saying that the syntax of  SQL query is incorrect and Blind SQL is almost same as the normal SQL Injection. In this case the only difference is the way of retrieving Data from the DATABASE.  In case the database doesn't output the Data then the attacker has to force it out by asking the database a series of questions related to True  or False. Now in the of Blind SQL Injection   the risk factor of a Web Application is the same as of normal SQL Injection.  Here the attacker may verify th...

What is SQL Injection ?

Image
SQL Injection is a method of injecting codes.  This technique is used to insert malicious codes or statements of SQL in data-driven applications into it's entry field to get executed.  SQL injection may exploit a vulnerability of a software in case the user's input is incorrectly filtered for string literal escape characters in the statement or when the user input is not correctly typed & is executed unexpectedly. SQL Injection is also called the attack vector but can be used for attacking any type of SQL database. SQL Injection attack allows attackers to mess with the database, to spoof identity, tampering with the existing data and many more which the ba guys can do also to totally disclose all data on the system, and become the administrator of that data server.                      - Thank You            All The Best!                Stay Safe ...

What is SQL?

Image
SQL stands for  Structured Query Language also called See- Quel. This is a domain specific language used for programming and designed for managing data held in the relational database management system or simply the ( RDBMS ) and also for the stream processing in a Relational Database Management System or ,(RDBSMS). It is used for handling Structured Data. SQL consists of many types of statements which can be informally classed as Sublanguages : A Data Query Language, A Data Definition Language, A Data Control Language, and A Data Manipulation Language. The scope of SQL includes Data Query, Data Definition, Data Acess Control. SQL is a Declarative Language, it also includes procedural Elements.  The first relational language to be utilized in E.F.Codd's relational model was SQL. That model was described in his influential paper of the late 1970's.  Although it was not entirely adhered to the relational model described by E.F.Codd , it became the most widely used DATA...

What is Database

Image
What is Database ? For understanding a Database, Let's see what is a Data. A Data is an any kind of information. For eg: the data of a person is his/her height, weight, gender etc.  In the same way a Database can be defined as a systematic collection of data which supports electronic storage and manipulation of data. To give an example of a database a telephone directory is the best ex. So, in that stays all the details of a person. Wright!  In a relational database stays the details of a person in rows and columns & tables which make it easier to find with SQL & NOSQL queries . As of this writing SPARQL is the only querry accepted by the World Wide Web or simply the (www). Types of DATABASE.  Databases have evolved with time . Earlier in the late 1980s it was with Object-Oriented Database and today with SQL & NOSQL & CLOUD DATABASE .  Relational Database. A Relational Database , invented in the IBM by Sir E.F.Codd in 1970 so that it can be accessed...