SlideShare a Scribd company logo
1 of 14
Dynamic Website Login Screen Check's By Using Various Verification Technique's:
The User Interface of any good Dynamic website should be designed based on the following check's and user
verification,
1. After entering the password for the User ID, there should be a SMS with pin code sent to user registered
and verified mobile number, which the user can enter for logging in to dynamic website system. These days the
landlines are also able to receive SMS so they can also used for this type of verification.
This type of verification is named and is available in email logging these days, as 'Two Step Verification'.
2. Face recognition technique can also be used to login into dynamic website after registering and verifying
yourself in face recognition database that is through face tracking enabled camera's or verifying the live user
face through camera or using a live picture and then comparing it with registered user picture using face
recognition technique.
3. A Dynamic website can use voice recognition technique after entering User ID and a password to login into
Dynamic website system, the voice pattern is compared with the registered User voice pattern after logging in
the User ID and Password with the stored User voice registered and verified voice sample or pattern and then
given access accordingly. The voice recognition pattern can also be used as a password that can be saved in the
database and compared and then giving access to the user.
4. The palm or thumb or hand prints or Finger Prints can also be used to login to any dynamic website after
registering and saving the User details and registering and verifying them while giving access to the dynamic
website. The User's Palm Prints or Thumb or Finger Prints are stored in a database as an image and that image
can be compared when the User login's to the Dynamic website system after entering there login credentials
and moving onto the next page for verification.
5. Eye or Retina Recognition User Authentication technique can also be used to login into and verifying a a User
to any Dynamic website on web and or MAN / LAN.
6. The other very sophisticated verification technique's which can be used for User Authentication while
logging in to any highly intelligent Dynamic system are,
Blood Matching, Hair Matching & Nail Matching. The Electro1nic device's need to be installed on PC's where
you want to login. These same technique's can also be for User Authentication on Customized Desktop or
Centralized or Distributed Software's Systems used in companies or shops or mall's, airline's, airport's,
railway's, police station's, Interpol, NATO Force's, Country Army, etc.
7. One of the coding technique / method which can be used for avoiding any User ID getting misused on the
World Wide Web is we use MAC Address Filtering option, coded and implemented in the Dynamic website user
interface web page. By MAC Address Filtering I mean that we create a table with fields in the database to
hold records of user devices through which they login into the Dynamic website system, that is there PC's /
iPad or TABLETS / Phablets / Smart Phones / PDA's / Smart TV's Adaptor MAC Addresse's can be added,
registered and verified and then they can only be able to login into web based Dynamic system by using the
registered MAC address device's. But USB adaptor's should not be registered as they can be used on any USB
port enabled PC. The MAC Address router filtering can also be added as the devices connected to that
particular router on a LAN or WiFI NETWORK WILL GET AUTHENTICATED and the dynamic system can only
be used on that particular router connected devices. This option can be entered as self by the user itself if
the user is using an intelligent super smart dynamic system on the web. If you want to add more technicalities
then you can add more options like serial numbers of processor, motherboard, modem and even the browser
version in the DBMS and authenticate the user on the basis of stored information in the database's like
ORACLE / MS SQL Server / MS Access / MySQL. And do proper logging that who tried to login and got
authenticated or not. And put option to inform the Administrator and the User itself by an email or SMS alert
of any failed authentication. You can set routers with MAC Address Filtering so that only registered device's
in the router's get connected to the web connection and will be able to use the Smart / Intelligent Dynamic
Web Based System.
Media News ! Customized Systems Measures To Be Taken Before & While Developing
& Implementing A System For A Client ! Security Tips
Main Database Management System Server should have a user id & a password settled for use by system
designers or administrator of that particular system at the client side.
The Database itself should have a separate/different User ID and a Password to be used by the
developer/programmer fo the system at the client side.
User Interface (The Presentation Layer which is used to communicate with the database (or DBMS) for
storing or retrieving data from it (Client Side System/Web Interface)), should have a different user id and a
password for each user.
The User ID and the Password should be different for logging into windows to use the customized client
system through a browser installed in windows OS.
Modems (Internet / Dial-Up / Mobile) / LAN Switches And Routers (Any Type { WIFI / LIFI }), the gateway
user ID and password should be altered by the networking engineer and should not be kept to default settings
( Manufacturer Settings by default is user id: admin / Password: admin ).
The Firewalls also comes built-in with the communication devices like Modems, Routers and Switches, which
should be enabled for outside network penetration by hackers if the customized system is over the internet
using a domain for accessing it.
Antivirus should be properly installed and logging to it is to be with the separate user id and password. There
are various types of antivirus systems software available in the market. That is stand alone (single use on a PC
or a tablet or a mobile device which has an OS or runs using an OS{Operating System}), secondly the Antivirus
can have a separate server and the clients just have an interface to it, so when the antivirus server gets
updated by the antivirus software company, the clients gets updated themselves.
Customized firewalls can also be installed and used by the clients for extra protection. These can be an
Artificial Intelligent System designed based on decision support system that is, firewall decide whether to
give access to this particular user in an outside company or not. Like for example the client can be a lame user
over the internet, so the client id will have this information of what type of information can be accessed and
specially the internet connection which the lame user is using will have this details too. So the firewall (this
functionality can be coded in an Antivirus system using centralized terminology) can decide whether to give
access to the client or not.
Windows defender is the stand alone firewall and an antivirus in Microsoft Windows 10, and it gets updated
through the internet. But this antivirus/firewall uses the client system memory as it continuously or timely
using separate .exe programs bind with the software, checks for an update using the internet and connects to
that particular antivirus company server where known virus / trojan's information is kept.
Use encryption keys / methods to encrypt confidential data while saving data into a database, like using hashes
for example save a data and encrypt it using hash and save it on a different server probably data center
server (connected to actual DBMS) and just save it address in the database table.
Use proper security modules customized for client side data access and entering it, I mean separate
credentials for that particular client / End-User / Employee / Boss / Company (System) Owner with different
and approved privileges, and proper logging should be used for who did what and when.
Design/Set the Network using the Latest Technology available in the local or international market, which
includes Networking Devices like Modems, LAN Switches, Routers (Wireless {WIFI / { LIFI (Use Optical Fiber
Technology for data transfer at Lightening Speed)}}), Servers (Both Operating Systems and the computer
configuration itself) and in the last the clients systems (PC's / Phablet's / Tablets / Mobiles / PDA's / etc.
and their OS).
Remember never to keep the User Details / Password / User ID's / Encryption techniques Used and the
Encryption Keys itself used for saving/retrieving data from a database through a DBMS connected to a data
center behind, on a separate stand alone computer / PC or a USB Hard Drive or a pen drive kept in a vault
safely by an unknown computer engineer who is not known to the system user's.
Remote monitoring software should be installed on the main system server and on client PC's for remote
desktop services.
Proper back up's of the systems and its database and its clients credentials should be taken by using automatic
back up techniques or manually by that particular software engineer who is not known to the company user's/
employee's. The Back Up's can be taken on a daily / Weekly / Monthly Basis or what ever the company owner
decides, it depends on how important the data is to the company.
The main gateway which connects the system server to the internet should be settled up very carefully,
enabling/using all types of options like Firewalls, device gateway interface user id / password, should be
altered by the system engineer and not to kept as default to manufacturer settings.
If the system is on a domain over the internet, then please make sure only those services and ports are
enabled which are related to that particular system needs or if the domain is saving the data on a different
data center on any other remote location, connecting the data center database through a domain web site
(pages / portal) using different credentials, then proper ports and services should be enabled which are
related to the company activities where the system is being implemented and installed for clients and
employees of that company. The web pages have the connection values hiding inside the encapsulated
programming language known to the domain server or system server. The web pages kept on a domain will be
used through a web browser or an application for mobile (iOS application / Android Application), to connect to
the company system used by various types of user's. The users can be employees and company clients also or
even the boss or the owner itself, will just need separately privileged user id's and password for connecting to
the system.
The clients will not have direct access to the system itself as they are connecting to it through a domain page
which is connected in relay may be to the data center where the database is kept.
Now same goes for Email Exchange Servers / Software's, either you can buy an Exchange Server Software
with Computer systems as needed to run the Exchange OS itself, confidentiality kept on a private facility used
by the company employee's for day to day activities. for this the company has to buy a dedicated line with an
fixed IP address if you set your own emails exchange server. This option is best suited for government firms
and multinational companies as if they use other company services like email accounts provided when you
register a domain with a web hosting firm. Can be costly or less costly, it depends on the company activities
and client span.
Separate exchanges are needed by those companies where the company does not want to share their
information with the web hosting services provided. Fixed IP can be used with domain forwarding services.
etc..
The complicate the system, the greater maintenance services and procedures are required to run it which
includes proper data back up's.
The Employee's should be able to use their personal devices which can connect to the company system in
company premises, devices like USB Modem's (Wingle), or their personal mobile itself.
All USB port's should be monitored for data copying or theft by the employee's themselves or the USB ports
should be kept disabled by checking if their is need for it by the employee using the PC as this can be a
problem when somebody puts an virus affected USB hard Drives or other USB devices available or a USB
wingle device which can use to hack the company network as the wingle device will be connected to the
telecommunication company. So, they can download or upload company information by hacking the company
network from inside using a USB Wingle with internet enabled on it.
Bluetooth Device must be kept on and or hidden always, as when it is kept on the device doesn't stay's idle and
the port's used by the device will not be open to hackers. Just the other mobile device connecting, the
employee should know who it is connecting, I mean the employee can give access to the hacker requesting to
connect to the Bluetooth device of that particular PC or mobile or a tablet.
As these days the Laptops and Other Personal Computers are coming with built-in USB ports, so what you can
also do is to request the computer companies to make customized PC's and servers for that particular end-user
company. Inside a multinational company there are various devices these days which are forbidden to take
inside and take some company property outside like a computer, so what you can do is to use proper locking
tables and cupboard's (for LAN/WAN Switches / Routers / Mobile Devices), to keep your device out of reach
of unauthorized user. Because the Devices can be connected physically like connecting to LAN Switch directly
using a Laptop and accessing its Interface using the gateway and if the unauthorized personnel is lucky then,
the default user id and password for that modem router or switch is at default setting so admin and admin will
be the user id and password to connect to it. If you want to see the password written in the **** form, so
there are various software's to see this too, like Wheel to drag a wheel on to the **** password and it will
come in a text box in the wheel software, I use to use.
Remember to use the POST method while transferring the form data (POST Method hides the values of
passed parameters to the other scripting language web page for it to processed by that particular scripting
page {like PHP (Personal Home Page, file extension .php and/or simple script's like VB or java script's, etc.)})
instead of transferring the form data using the GET (GET method passes the parameter values openly in a web
browser link normally known as URL (Uniform Resource Locator), which is seen by in the browser where the
website address is typed, after the question mark {?} all are parameter values passed to other pages for may
be fetching data from a DB for a particular employee or customer) method by passing the parameters values,
in an HTML 5 Form (Responsive HTML). In GET Method the data transmitted to another page or program gets
hided/encapsulated inside a packet which is not seen at the presentation layer i.e. in the browser website
address link bar. And https web url's are used by bank's and other financial firm's to communicate between
and among the customer's and themselves as employee's. For designing a good web page or a website you can
use software's like Blue Griffon, Microsoft Visual Studio .Net (ASP .Net), Flex for iOS, Linux (Red Hat /
Ubuntu / Mandarin) for Android, Macromedia Dreamweaver, etc.
Microsoft Visual Studio .Net 2017 can be used for making 3D games using enhanced programming
terminologies.
And always make sure the programming engine which you are using to run your website like for example if you a
website or a customized desktop system use's CLR (.Net Engine) to process it's code's at the client side, then
it should be regularly updated by subscribing to the Microsoft Website's for this particular software. Or if
you are using java as the programming engine at the client side, then JVM (Java Virtual Machine) should be
regularly and updated by subscribing to their information website or software update system. The security
patches do come now and then so it is a must to have a very fast internet connection and fully activated
windows operating system (copy righted), the OS should not be pirated, even though I learn all this by using
pirated software's during my university course, but I never tried to earn from it by selling it may be.
Media News ! Communication 2.6 ! Bluetooth Technology ! Device ! Security Tips & News
Internet Speed Measurement's as compared to actual files on computer hard drive's
Internet Speed Measurement ! Megabytes Per Second (MBps) Vs Megabit Per Second (Mbps) MBps and Mbps
speed measurements are available in calculating the speed of downloading and uploading a file from over the
Internet onto a PC or a server or a mobile or a Tablet, etc. The downloaded or uploaded file itself, I mean it's
size is calculated in (capital MB) Megabytes (MB) not Megabits (Mb). That is how a computer store's a
downloaded or copied file on to itself, from any type of source it is connected to.
Latest Technologies like 4G (Fourth Generation) have a very high range of speed of upto 150 MBps (Megabytes
Per Second) From minimum 1 MBps (Megabytes Per Second). This is what you need to be make sure that the
Internet connection you are taking and it's package should be in capital MBps not in small Mbps. If it say's in
small 2 Mbps (Megabits Per Second) then in actual it is 256 KBps (Kilobytes Per Second), which is 0.220 MBps
(Megabytes Per Second) in actual.
Unlimited data packages provided by ISP's these day's have an internet connection speed in small Mbps
(Megabits Per Second) i.e. how they earn through this, but this package has a benefit that it has a very high
data download/upload limit, i.e. it might be 150 GB monthly.
There are more measurement speed's available like Bytes, Kilobytes, Megabytes, Gigabytes, Terabytes and in
small Bits, kilobits, Megabits, Gigabits and may be Terabits.
Remember that the file when it get's stored onto a PC's hard drive, its file size is calculated in capital
measurement's like Bytes, Kilobytes, Megabytes, Gigabytes, Terabytes.
These Two available download and upload a file speed measurement's are used only over the internet,
Bits, kilobits, Megabits, Gigabits and may be Terabits:
This will be slow while downloading and uploading a file over the internet, the reason for this is the file itself in
actual is in capital measurement's like in Bytes, Kilobytes, Megabytes, Gigabytes and Terabytes, so the file will
take time to get uploaded or downloaded.
Bytes, Kilobytes, Megabytes, Gigabytes, Terabytes:
This will be fast/actual/real while downloading and uploading a file over the internet, the reason for this is the
file itself is in already in capital measurement's like in Bytes, Kilobytes, Megabytes, Gigabytes and Terabytes,
so the file will take the same time to get uploaded or downloaded as the speed of internet connection and the
file size itself is in same calculation measurement. That is the data transfer rate and the file itself uses the
same measurement's i.e. for example: if you download a 2 MB (Megabytes) file on a 2 MBps connection, it will
take 2 seconds to get downloaded.
And if you download a 2 MB file using a 2 Mbps internet connection, it will take 16 Seconds to get downloaded,
approximately.
And there are some other related details like if on an 2 MBps Internet connection, if you download several or
more than one 2 MB files simultaneously (at one given time), so the bandwidth i.e. 2 MBps will be shared among
the downloading files. And there are some other things like when you download a file from a server over the
Internet, so isn't that server also connected to the Internet and using some Internet speed package and data
limit package or unlimited data package and the machine configuration is also been dealt with as if that is a
server over the Internet keeping that file you might be downloading, then it is for sure that the file you are
downloading, other user's might also be downloading the same file, so ultimately the server speed also comes
in. But server's these day's are of very high configuration and speed both machine and Internet Connection
Speed, And Data Limit's, so if you want to check just by downloading a single file then if your connection speed
is 2 MBps then the downloaded file will get downloaded in 2 seconds if its size is 2 MB.
The more the number of Internet user's over one single connection, the Bandwidth of that connection shared
among the devices the end-user's are using over the same network.
In distributed system's this terminology is used as the the Database is kept on various server's and the
table's inside the database are kept in a distributed format like distributing the field's for example of
customer in separate table's with same primary key's so one can access some part of data quickly without
searching the whole database and fetching the whole record of that particular customer. Keeping such type of
table's and record's give us a high access speed to fetch that record from a table if there thousand's of
record's in a table. This is called optimization of a Database.
Keeping records or a database centrally has the benefit that it's maintenance is easily done but the record's
fetching speed might degrade as while searching all the database record's are searched, so if there are
thousand's of records in a table of a database, the a very high server, network and Internet connection is
needed. There are various other method's of saving data, one is directly saving a record with it's hash address
like memory address or hard drive address, so just keep it's file path or this hash address in a table database
or one other idea is to give that hash address to the customer or client who passes parameter's to the system
for fetching records, so if the client has the hash address or memory address or hard drive address of a
cylinder in a track, then the system can directly access the record and show it to the end user but fetching
using hash address or memory address should only be through the system interface not by any other means.
While transferring the parameters from a web page to another program or a web programming language web
page, we need to take care that when we transfer values using parameter's, the value's are seen on the
browser url textbox. These value's can be like http://www.xxxxxxxx.com/index.asp?customerid='1'. The
parameter value of a customer id is seen in the weblink. One of the security loophole is that it can run sub
query, like for example, http://www.xxxxxxxx.com/index.php?customerid='select * from customer where
customerid ='1', and status='active';' and press enter. Similarly these subquery has other functionalities built-
in the DBMS, i.e. many function's are available to get stored database information using DBMS function's and
object's. This method of passing values is known as GET method. While POST method hide's the parameter's
value's while transferring or calling or executing to another web page with scripting languages like php and asp
.net.
Make sure to check for if there any services or port's opened and not needed by the customized system for
that particular company, who's system you are making, need's to be closed or be disabled and not remain idle
or opened. Open Service's or port's are vulnerable for hacker's getting access to it may be by using brute
forcing i.e. even if it is password protected.
FING (available in iOS by Apple (Mobile/Computer's/Tablet's/Watche's, etc. Company)) can be used to check
what are the services provided on a domain or an IP Address over the Internet.
Well hacking is not Ok if it is not ethical, that is the hacker's should not harm the system or any other device
or it's data stored or it's peripheral's or BIOS or it's software's or browser's history or the account's its
use like Email's, Social Networking Website's, blog's, User's bank details over Internet Banking over the
Internet. There are various Ethical Hacking Courses available in the market. Metasploit Project is also a very
nice coding software to get information on the OS vulnerabilities or like for example what services or port's
are available for getting access to it.
Click Here for More Info on Harmless Hacking Known as Ethical Hacking for World / Continent / Country /
City / Area or Any crime done by an individual to check or monitor it's activities,
Click Here for More Info on Harmless Hacking Known as Ethical Hacking Sample Exam
Click Here for The Microsoft Press Store (eBooks For Programmers / Software / Network Engineer's / Etc.) !
Microsoft Virtual Academy
Click Here for The Microsoft Courses ! Microsoft Virtual Academy
One of the given options in Database from Microsoft, named as Microsoft Access, comes with Microsoft
Office Software's, currently known as Office 365, is that you can hide the whole table inside a database, like
for example hiding a User ID's and Password's table from the application user or the interface itself i.e. when
or if the user of application have access to the database even with the password protected Database, you can
hide the table separately from the user and only access that table through the user interface that is the
application through which you are entering or retrieving the data and processing it through the application
engine for company business activities.
To Download Latest Microsoft Office, click here
For Free Download's And Security Update's For Microsoft Product's, click here
For Microsoft Education / Product's, click here
Latest Windows From Microsoft
Database User's:
Unrestricted administrative accounts There are two administrative accounts (Server admin and Active
Directory admin) that act as administrators. To identify these administrator accounts for your SQL server,
open the Azure portal, and navigate to the properties of your SQL server.
Server admin:
When you create an Azure SQL server, you must designate a Server admin login. SQL server creates that
account as a login in the master database. This account connects using SQL Server authentication (user name
and password). Only one of these accounts can exist.
Azure Active Directory admin:
One Azure Active Directory account, either an individual or security group account, can also be configured as
an administrator. It is optional to configure an Azure AD administrator, but an Azure AD administrator must
be configured if you want to use Azure AD accounts to connect to SQL Database. For more information about
configuring Azure Active Directory access, see Connecting to SQL Database or SQL Data Warehouse By Using
Azure Active Directory Authentication and SSMS support for Azure AD MFA with SQL Database and SQL
Data Warehouse.
The Server admin and Azure AD admin accounts has the following characteristics:
These are the only accounts that can automatically connect to any SQL Database on the server. (To connect to
a user database, other accounts must either be the owner of the database, or have a user account in the user
database.)
These accounts enter user databases as the dbo user and they have all the permissions in the user databases.
(The owner of a user database also enters the database as the dbo user.)
These accounts do not enter the master database as the dbo user and they have limited permissions in master.
These accounts are not members of the standard SQL Server sysadmin fixed server role, which is not
available in SQL database.
These accounts can create, alter, and drop databases, logins, users in master, and server-level firewall rules.
These accounts can add and remove members to the dbmanager and loginmanager roles.
These accounts can view the sys.sql_logins system table.
Configuring the firewall
When the server-level firewall is configured for an individual IP address or range, the SQL server admin and
the Azure Active Directory admin can connect to the master database and all the user databases. The initial
server-level firewall can be configured through the Azure portal, using PowerShell or using the REST API.
Once a connection is made, additional server-level firewall rules can also be configured by using Transact-
SQL.
Administrator access path
When the server-level firewall is properly configured, the SQL server admin and the Azure Active Directory
admin can connect using client tools such as SQL Server Management Studio or SQL Server Data Tools. Only
the latest tools provide all the features and capabilities. The following diagram shows a typical configuration
for the two administrator accounts.
For More details Kindly have a look at the following web link from Microsoft on SQL Server Database's
This means very high class of web based and desktop based system's can be developed using all type's of
options available in the front-end {(C# .Net, ASP .Net, PHP, VB .Net, etc.)} and {back-end (Microsoft Access,
SQL Server, MySQL, etc.)} programming languages and RDBMS.
The Database user's should be used only by the developer's, I mean the client's should not be able to connect
to the DBMS directly by using SQL Server Management Studio for SQL Server Database(s), the client's
should only be able to connect through the front-end (presentation layer) interface developed for them by the
Programmer's.
You can also use web function's or API's from other web site's like facebook.com, outlook.com, twitter.com
and google.com, etc., to validate a user in your system, the benefit of this is that you don't have to keep
complete user information for your system and guarding all type's of Password's and bank details, only logging
will be needed that is who did what after logging in and when it logged out. And only valid user's who are
genuinely over the internet will be able to log in your system.
Some Details on How To Adjust Windows 10 Firewall Rules And Settings : In Windows 10, the Windows
Firewall hasn’t changed very much since Vista. Overall, it’s pretty much the same. Inbound connections to
programs are blocked unless they are on the allowed list. Outbound connections are not blocked if they do not
match a rule. You also have a Public and Private network profile for the firewall and can control exactly which
program can communicate on the private network as opposed to the Internet.
Click here for more Information on how to control Inbound and Outbound Data On a Private or Public Network
using Microsoft Windows 10
The Inbound and Outbound Data can also be setted on a pure Windows Server also, through using policies and
active directory /port's. Even a computer with Microsoft Windows 10 Minimum version should be Professional
or higher version should be Enterprise, can also be used as a server for desktop or web based system on a LAN
or WAN. If on WAN then leased lines with registered IP address is needed to run it without registering a
domain. If using a domain then it is a must that interface (coded pages with script's and HTML probably HTML
5 if using latest HTML version) designed to access the database should be on that hosting server where the
domain is registered.
You can also control the inbound and outbound traffic over the Public / Private network using McAfee
solutions, McAfee solutions deliver complete virus protection and internet security. Download McAfee anti-
virus and anti-spyware software to protect against the latest ....
One of the best Antivirus / Firewall, I have used to block hacker's even on the same network i.e. inside a LAN
is Norton Antivirus. Click here for more details on Norton Product's
Click here for more details on Norton Mobile Security for your Mobile Device's like Phone's and Tablet's
Click here for more details on Norton WiFi ! Protect your data with a no-log virtual private network (VPN) that
encrypts your personal information and doesn’t track or store your online activity or location.
Click here for more details on Introducing Norton Core — The secure router for your connected home ! the
ultimate in WiFi security for the connected home ! Norton Core secure WiFi router protects your digital life,
while delivering the highest level of performance. All the WiFi coverage you need—even prioritize speed to any
device you want. Powerful tools for parents to monitor and manage screen time, control time limits and set
content filters. Iconic design that is beautiful from every angle; no need to hide this work of art.
Norton AntiVirus Basic ! Powerful Security ! Simply Affordable
Norton ! Internet Security
Firewall these day's have the options to login remotely to other computer's with the same version of firewall
from the same company. So, managing it is very convenient from the developer's premises. It uses IP
Addresses and Password's may be User ID's too, to connect remotely. All Network traffic can be managed
remotely even by using remote desktop connection even on a Windows 10 OS Professional/Enterprise Version
PC / Server.
You can get a domain registered using any host too, and get it forwarded to a leased/Permanent IP Address on
a Private server, i.e. the code can also be kept on a different server than the domain hosting server with a
forwarder on that domain through cPanel for example. The example link will be like this
http://alkahaftechnologies.com and when you enter it on web browser and enter it, it might forward you to
this link with leased IP Address, http://10.52.58.1/index.html, and it will open the main index page may be for
that particular web browser based company system linked to their database.
Microsoft Windows Operating System Security Feature:-
Just right click on the drive or a folder or a single file itself, and select the tab with the text security.
You will be seeing the local windows user's and microsoft outlook email user's of the window's on this tab.
Now, select the user you wan to give access to your files or the drive itself.
don't change the setting of system user, because system user needs full control in order to boot the operating
system. Just change the setting for the administrator's, local or Standard User's or simpl y user's, and then
your outlook email user's.
if you make your outlook email user full control and remove the full control from other user's like
administrator's, local or Standard User's or simply user's or any other outlook email user, then only you wi ll
have access to the files in a drive or folder or a file itself.
These day's the thumb or finger print login facility or option is there so if you setup your system like this then
only you can access your file's.
And if for some reason the hacker's gain access to your system through the internet then even they cannot
edit or delete or copy your file if you have shut control's like read, edit, delete, create, full control to the
other user's apart from your own outlook email user or local user. But I haven't seen the thumb login facility
using the local windows user.
Just one thing you have to keep in mind, if you setup your PC using the outlook email option, then you can setup
any number of PC's using the same user ID of your outlook email address. But what if somebody have access to
your outlook email address and set it up on a pc, so when it will gain access to all your file's on cloud, and if it
use's that pc to hack your this PC where you have setted up the security feature, so as the hacker will have
the same user installed in it's system, the hacking software will give it access to your PC. So, in order to
escape this you should never give your outlook ID to anyone for anything I mean the id password, and the
recovery code's or the two step verification code if it's set. So, the best method is to use thumb login option
that use fingerprints to login, as finger prints are unique so only you can access your system using your ID.
How to Save Images and Videos In A Database Like MySQL for PHP, Microsoft SQL
Server For ASP.Net and Other Programming Languages like C# .Net, VB .Net, etc.
If we use this option to save Images and Videos instead of their file paths in the server where they are
actually saved will lead to high level of security because then we can use various encryption methods apart
from the encryption options given by the Database (Server) itself.
Using encryption methods like this even if the web server or data center server gets hacked the files if videos
of images if encrypted using databases like MySQL and MS SQL Server and Oracle, the chances of getting
the information leaked gets highly less because even if the database file gets stolen or leaked or hacked the
encyotion keys or methods will not let it get open.
The encryption methods used should be designed and kept on a different server or a stand alone pc may be
where the web system is being designed.
For Example in MySQL we can use LONGBLOB field type for that particular Table created in the MySQL
Database.
For Example,
Table Creation SQL Script:-
CREATE TABLE media (GAME_ID INTEGER NOT NULL PRIMARY KEY, name VARCHAR (20), VIDEO
LONGBLOB );
SQL Statement For Insert Video In MySQL Table named as media:-
INSERT INTO media values ('File_Name',LOAD_FILE("C:UsersPublicVideosSample
Videoao.mp4"));
insert into media(GAME_ID,name,VIDEO) values (1,'testVideoUploadInDB',
load_file('C:UsersMohsinVideosAny Video ConverterYoutubetestvideo.mp4'))
insert into media(GAME_ID,name,VIDEO) values (2,'testVideoUploadInDB',
load_file('C:UsersMohsinDesktoptestvideofile.mp4'))
PHP Code:-
$sql = "insert into media(GAME_ID,name,VIDEO) values (1,'testVideoUploadInDB',
load_file('C:UsersMohsinVideosAny Video ConverterYoutubetestvideo.mp4'))n" . "";
For Fetching Video From Database:-
$query1=mysql_query("SELECT * FROM media where GAME_ID=2");
while($qry1=mysql_fetch_array($query1)) { $vid=$qry1['VIDEO'];
echo $query1;
For Detalis on storing Images and Videos in Microsoft SQL Server Database kindly click on the following link:-
https://docs.microsoft.com/en-us/sql/relational-databases/blob/binary-large-object-blob-data-sql-server
Table Encryption is yet to study by me if the option is available in the databases but putting encryption of such
type needs a internet connection with a very high speed, I mean atleast 30 MBps will be needed to use or to
fetch data from database quickly from the database using such security techniques which includes database
passwords.
Fiber Optic Cable Connection And / Or Lifi Hotspot:
Mostly Recommended:
As per the technology market for the Internet (Wireless and Ethernet) Communication Device's with Normal
Copper Wire Dial-up, DSL / ADSL and Wifi Capabilities, I would be recommending if the Internet speed /
bandwidth varies from 64 KBps (Kilobytes Per Second) to 300 MBps (Megabytes Per Second), using Modem's
which do not transmit data using Light signal's or packet's over a copper communication cable (DSL/ADSL) or
Wireless (Wifi) or Mobile network's like 1G/2G/3G.
The router's used with network's with Copper (Dial-Up/DSL/ADSL) / Mobile (HSPA/1G/2G/3G/4G/5G) / Wifi
Hotspot capabilities should have the following option's or functionalities,
1. WAN Port's for Connecting to a separate Modem (Dialup / DSL / ADSL) / CPE (WiMax Internet connection),
for using the Internet on all the device's connected to the router. 2. LAN Port's for Connecting Personal
Computer's to the Internal Network. LAN Port should also be used for connecting to an external server with
Internet sharing and other network capabilities another company server with other local user's for may be
authentication or logging into the network. 3. Mobile Carrier SIM Card Slot for Connecting to Internet if not
using WAN ethernet port for connecting to the Internet or keepingthe SIM Card installed as back up if
Internet is not functional using the WAN Ethernet port connected to a Modem. 4. WIFI Hotspot capability to
connect a mobile or any type of wireless device like using Wifi Adaptor for a Desktop / Laptop PC or Tablet /
Phablet, to the WIFI Hotspot network.
For more detail's on Wifi Networks kindly click on the following link Wifi Hotspot's
Highly Recommended:
As per the technology market for the Internet (Wireless and Ethernet) Communication Device's with Fiber
and Lifi Capabilities, I would be recommending if the Internet speed / bandwidth varies from 100 MBps
(Megabytes Per Second) to 1+ GBps (Gigabytes Per Second), using Modem's which transmit's data using Light
signal's with packet's over a fiber communication cable or wireless (Lifi) or Mobile Network's (4G/5G).
The Difference between a Fiber and a copper wire connection is that Fiber transmits data using Light so
ultimately the data travel's inside the communication cable with the speed of Light, and copper wire transmit
data using the small amount of electricity, so electricity doesn't travels as fast as Light speed.
The router's used with network's with Fiber (Modem connected directly to the exchange using the Fiber Optic
Cable) / Mobile (4G/5G+) / Lifi Hotspot capabilities should have the following option's or functionalities,
1. WAN Port's for Connecting to a separate Modem (Fiber Optic Modem) / CPE (WiMax Internet connection),
for using the Internet on all the device's connected to the router. 2. LAN Port's for for Connecting Personal
Computer's to the Internal Network. LAN Port should also be used for connecting to an external server with
Internet sharing and other network capabilities another company server with other local user's for may be
authentication or logging into the network. 3. Mobile Carrier SIM Card Slot for Connecting to Internet if not
using WAN ethernet port for connecting to the Internet or keepingthe SIM Card installed as back up if
Internet is not functional using the WAN Ethernet port connected to a Modem. 4. LIFI Hotspot capability to
connect a mobile or any type of wireless device like using Lifi Adaptor for a Desktop / Laptop PC or Tablet /
Phablet, to the LIFI Hotspot network.
For more detail's on Lifi Networks kindly click on the following link Lifi Hotspot's
Some web link's on WiMax Technology For Reference
WiMax Overview, Sanida Omerovic, Faculty of Electrical Engineering, University of Ljubljana, Slovenia
Tutorials Point
WiMAX: Technology for Broadband Wireless Access
Introduction to WiMAX Dr. Piraporn Limpaphayom
WiMAX, The First 4G Technology
WiMAX TECHNOLOGY
Security Measures Example: WIMAX Modem Without Wifi Hotspot For Internet
Connectivity Devices:
First of all, check that what is the gateway address for your modem, in my case I have a Qubee WIMAX
Internet Modem, so and the company uses default gateway address like 192.168.x.1 (x might range from 1 to
255). This gateway tends to be the interface for the device to control and set its features and use it in
accordance with the ISP's settings given by the Internet Service Provider.
First of all login using the default password for the Modem, which is 12345, otherwise it is given on the device
itself or on its instruction or user manual. And change it to your liking because when you use websites over the
internet your IP (Internet Protocol) Address is being shared with that website hosting server which can be
seen by the website owner through cPanel and other options, so kindly change the password for your device.
Secondly, what you can do is activate or enable the built-in firewall for your device for extra protection apart
from your windows firewall.
Thirdly, you can enable MAC(Machine Address) Address filtering, which are given on the device and its manual.
Enabling this option will not let anyone else connect to your device apart from the MAC addresses given in the
MAC Filtering List for that particular device.
Fourthly, you can change the password to your liking for your user id provided by your ISP, for connecting the
device to the Internet Server. This you can do by logging on the ISP's web portal by going to their customer
care support page and checking your details of connection and status of your connection and package you are
using. I mean the password is generated by the administrator and given to you by the local customer care
officer of that particular shop or office, so it might know your details and can use the your details on any
other device by providing your credentials i.e. user id and password using the same device settings provided by
the ISP.
Fifthly you can keep your device in a locked container like tv trolleys and tables or computer devices switches
so that in your absence anyone can access it through the LAN port or Ethernet Port Physically, for hacking
something or doing some wrong doing like using somebody's debit card for shopping from the internet.
For MBB Hotspots
ZONG 4G Mobile Broadband (Mobile Hotspot - Huawei)
First of all, check that what is the gateway address for your modem, in my case I have a Huawei For ZONG 4G
MBB Internet Modem Hotspot, so and the company uses default gateway address like 192.168.8.1 (it might
range from 1 to 255 which can be altered by user liking). This gateway tends to be the interface for the device
to control and set its features and use it in accordance with the ISP's settings given by the Internet Service
Provider.
First of all login using the default user id and password for the Modem, which is admin, otherwise it is given on
the device itself or on its instruction or user manual. And change it to your liking because when you use
websites over the internet your IP (Internet Protocol) Address is being shared with that website hosting
server which can be seen by the website owner through cPanel and other options, so kindly change the
password for your device.
Secondly, what you can do is activate or enable the built-in firewall for your device for extra protection apart
from your windows firewall.
Thirdly, you can enable MAC(Machine Address) Address filtering, which are given on the device and its manual.
Enabling this option will not let anyone else connect to your device apart from the MAC addresses given in the
MAC Filtering List for that particular device.
Fourthly, you can change the password to your liking for your user id provided by your ISP, for connecting the
device to the Internet Server. This you can do by logging on the ISP's web portal by going to their customer
care support page and checking your details of connection and status of your connection and package you are
using. I mean the password is generated by the administrator and given to you by the local customer care
officer of that particular shop or office, so it might know your details and can use the your details on any
other device by providing your credentials i.e. user id and password using the same device settings provided by
the ISP.
Fifthly you can keep your device in a locked container like tv trolleys and tables or computer devices switches
so that in your absence anyone can access it through the LAN port or Ethernet Port Physically, for hacking
something or doing some wrong doing like using somebody's debit card for shopping from the internet.
Media News ! Communication 2.6 ! Security Tips & News ! For Further Enhancing Security Measures,
Apart From These measures end-users can use customized Firewalls and Antivirus like Windows Defender in
Microsoft Windows 10, Mcaffe and Norton Security, Avast, etc. You can buy these softwares through us, we
provide all legal copies registered and bought by our company Debit Card. or you can use their free trial or
free versions by going at the following URL Filehippo
Or contact us directly through the following URL, AL-Kahaf Technologies Inc.
Best Regards,
Muhammad Mohsin Naeem
My Online Web Domain: http://alkahaftechnologies.com
My Mobile # +92 316 2998 439
My Bio Data Web Link: http://alkahaftechnologies.com/BioData/index.html
Contact Number's:
+92 342 818 4057, +92 340 926 6409, +92 340 124 2369, +92 340 039 8249, +92 316 299 8439
SMS Number's:
+92 342 818 4057, +92 340 926 6409, +92 340 124 2369, +92 340 039 8249, +92 316 299 8439, +92
340 039 8249
Sent from Mail for Windows 10

More Related Content

What's hot

Java project titles
Java project titlesJava project titles
Java project titlesAshly Liza
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Syed Ubaid Ali Jafri
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to SolusSolus
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authenticationZTech Proje
 
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCA
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCAFinal year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCA
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCAprojectsepark
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7EAE
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication IJMER
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationTELKOMNIKA JOURNAL
 
MechaTronix + Online Selling Process
MechaTronix + Online Selling ProcessMechaTronix + Online Selling Process
MechaTronix + Online Selling ProcessSaad Hussain
 

What's hot (18)

Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Java project titles
Java project titlesJava project titles
Java project titles
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
Introducing ThinkPhone
Introducing ThinkPhoneIntroducing ThinkPhone
Introducing ThinkPhone
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
A A A
A A AA A A
A A A
 
App Authentication
App AuthenticationApp Authentication
App Authentication
 
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCA
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCAFinal year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCA
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCA
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual Authentication
 
VBOT
VBOTVBOT
VBOT
 
MechaTronix + Online Selling Process
MechaTronix + Online Selling ProcessMechaTronix + Online Selling Process
MechaTronix + Online Selling Process
 

Similar to A Complete Software Engineer With Hardware / Networking Skill's

Jag Techno’s JT-Spot
Jag Techno’s JT-Spot Jag Techno’s JT-Spot
Jag Techno’s JT-Spot aniket jagtap
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finaljasonlan
 
Real estate management system
Real estate management systemReal estate management system
Real estate management systemSouvikSarkar75
 
Time and attendance software
Time and attendance softwareTime and attendance software
Time and attendance softwarepftecsoft
 
E-Commerce Mobile Sale System
E-Commerce Mobile Sale SystemE-Commerce Mobile Sale System
E-Commerce Mobile Sale SystemAbhishek Kumar
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET Journal
 
Sara electronics presentation
Sara electronics presentationSara electronics presentation
Sara electronics presentationMaxpromotion
 
Sara electronics presentation 1
Sara electronics presentation 1Sara electronics presentation 1
Sara electronics presentation 1Maxpromotion
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPNetwork_security
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPJavier Arrospide
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTrihedral
 
A Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe managementA Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe managementsvrohith 9
 
Lighting Automation- A Web-Based Approach
Lighting Automation- A Web-Based ApproachLighting Automation- A Web-Based Approach
Lighting Automation- A Web-Based ApproachApoorva Chandra
 
Webhawk as-software
Webhawk as-softwareWebhawk as-software
Webhawk as-softwareDivyanisetia
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersjasonlan
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET Journal
 

Similar to A Complete Software Engineer With Hardware / Networking Skill's (20)

Jag Techno’s JT-Spot
Jag Techno’s JT-Spot Jag Techno’s JT-Spot
Jag Techno’s JT-Spot
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23final
 
Real estate management system
Real estate management systemReal estate management system
Real estate management system
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
Time and attendance software
Time and attendance softwareTime and attendance software
Time and attendance software
 
E-Commerce Mobile Sale System
E-Commerce Mobile Sale SystemE-Commerce Mobile Sale System
E-Commerce Mobile Sale System
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
 
Sara electronics presentation
Sara electronics presentationSara electronics presentation
Sara electronics presentation
 
Sara electronics presentation 1
Sara electronics presentation 1Sara electronics presentation 1
Sara electronics presentation 1
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUPREMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
REMOVABLE STORAGE CENTRALIZED CONTROL FOR WINDOWS LAN, WAN, OR WORKGROUP
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile Users Managing Passwords for Mobile Users
Managing Passwords for Mobile Users
 
Managing Passwords for Mobile Users
Managing Passwords for Mobile UsersManaging Passwords for Mobile Users
Managing Passwords for Mobile Users
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
A Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe managementA Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe management
 
Lighting Automation- A Web-Based Approach
Lighting Automation- A Web-Based ApproachLighting Automation- A Web-Based Approach
Lighting Automation- A Web-Based Approach
 
Webhawk as-software
Webhawk as-softwareWebhawk as-software
Webhawk as-software
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
IPCOM000242565D
IPCOM000242565DIPCOM000242565D
IPCOM000242565D
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

A Complete Software Engineer With Hardware / Networking Skill's

  • 1. Dynamic Website Login Screen Check's By Using Various Verification Technique's: The User Interface of any good Dynamic website should be designed based on the following check's and user verification, 1. After entering the password for the User ID, there should be a SMS with pin code sent to user registered and verified mobile number, which the user can enter for logging in to dynamic website system. These days the landlines are also able to receive SMS so they can also used for this type of verification. This type of verification is named and is available in email logging these days, as 'Two Step Verification'. 2. Face recognition technique can also be used to login into dynamic website after registering and verifying yourself in face recognition database that is through face tracking enabled camera's or verifying the live user face through camera or using a live picture and then comparing it with registered user picture using face recognition technique. 3. A Dynamic website can use voice recognition technique after entering User ID and a password to login into Dynamic website system, the voice pattern is compared with the registered User voice pattern after logging in the User ID and Password with the stored User voice registered and verified voice sample or pattern and then given access accordingly. The voice recognition pattern can also be used as a password that can be saved in the database and compared and then giving access to the user. 4. The palm or thumb or hand prints or Finger Prints can also be used to login to any dynamic website after registering and saving the User details and registering and verifying them while giving access to the dynamic website. The User's Palm Prints or Thumb or Finger Prints are stored in a database as an image and that image can be compared when the User login's to the Dynamic website system after entering there login credentials and moving onto the next page for verification. 5. Eye or Retina Recognition User Authentication technique can also be used to login into and verifying a a User to any Dynamic website on web and or MAN / LAN. 6. The other very sophisticated verification technique's which can be used for User Authentication while logging in to any highly intelligent Dynamic system are, Blood Matching, Hair Matching & Nail Matching. The Electro1nic device's need to be installed on PC's where you want to login. These same technique's can also be for User Authentication on Customized Desktop or Centralized or Distributed Software's Systems used in companies or shops or mall's, airline's, airport's, railway's, police station's, Interpol, NATO Force's, Country Army, etc. 7. One of the coding technique / method which can be used for avoiding any User ID getting misused on the World Wide Web is we use MAC Address Filtering option, coded and implemented in the Dynamic website user interface web page. By MAC Address Filtering I mean that we create a table with fields in the database to hold records of user devices through which they login into the Dynamic website system, that is there PC's / iPad or TABLETS / Phablets / Smart Phones / PDA's / Smart TV's Adaptor MAC Addresse's can be added, registered and verified and then they can only be able to login into web based Dynamic system by using the registered MAC address device's. But USB adaptor's should not be registered as they can be used on any USB port enabled PC. The MAC Address router filtering can also be added as the devices connected to that particular router on a LAN or WiFI NETWORK WILL GET AUTHENTICATED and the dynamic system can only be used on that particular router connected devices. This option can be entered as self by the user itself if the user is using an intelligent super smart dynamic system on the web. If you want to add more technicalities then you can add more options like serial numbers of processor, motherboard, modem and even the browser version in the DBMS and authenticate the user on the basis of stored information in the database's like
  • 2. ORACLE / MS SQL Server / MS Access / MySQL. And do proper logging that who tried to login and got authenticated or not. And put option to inform the Administrator and the User itself by an email or SMS alert of any failed authentication. You can set routers with MAC Address Filtering so that only registered device's in the router's get connected to the web connection and will be able to use the Smart / Intelligent Dynamic Web Based System. Media News ! Customized Systems Measures To Be Taken Before & While Developing & Implementing A System For A Client ! Security Tips Main Database Management System Server should have a user id & a password settled for use by system designers or administrator of that particular system at the client side. The Database itself should have a separate/different User ID and a Password to be used by the developer/programmer fo the system at the client side. User Interface (The Presentation Layer which is used to communicate with the database (or DBMS) for storing or retrieving data from it (Client Side System/Web Interface)), should have a different user id and a password for each user. The User ID and the Password should be different for logging into windows to use the customized client system through a browser installed in windows OS. Modems (Internet / Dial-Up / Mobile) / LAN Switches And Routers (Any Type { WIFI / LIFI }), the gateway user ID and password should be altered by the networking engineer and should not be kept to default settings ( Manufacturer Settings by default is user id: admin / Password: admin ). The Firewalls also comes built-in with the communication devices like Modems, Routers and Switches, which should be enabled for outside network penetration by hackers if the customized system is over the internet using a domain for accessing it. Antivirus should be properly installed and logging to it is to be with the separate user id and password. There are various types of antivirus systems software available in the market. That is stand alone (single use on a PC or a tablet or a mobile device which has an OS or runs using an OS{Operating System}), secondly the Antivirus can have a separate server and the clients just have an interface to it, so when the antivirus server gets updated by the antivirus software company, the clients gets updated themselves. Customized firewalls can also be installed and used by the clients for extra protection. These can be an Artificial Intelligent System designed based on decision support system that is, firewall decide whether to give access to this particular user in an outside company or not. Like for example the client can be a lame user over the internet, so the client id will have this information of what type of information can be accessed and specially the internet connection which the lame user is using will have this details too. So the firewall (this functionality can be coded in an Antivirus system using centralized terminology) can decide whether to give access to the client or not. Windows defender is the stand alone firewall and an antivirus in Microsoft Windows 10, and it gets updated through the internet. But this antivirus/firewall uses the client system memory as it continuously or timely using separate .exe programs bind with the software, checks for an update using the internet and connects to that particular antivirus company server where known virus / trojan's information is kept.
  • 3. Use encryption keys / methods to encrypt confidential data while saving data into a database, like using hashes for example save a data and encrypt it using hash and save it on a different server probably data center server (connected to actual DBMS) and just save it address in the database table. Use proper security modules customized for client side data access and entering it, I mean separate credentials for that particular client / End-User / Employee / Boss / Company (System) Owner with different and approved privileges, and proper logging should be used for who did what and when. Design/Set the Network using the Latest Technology available in the local or international market, which includes Networking Devices like Modems, LAN Switches, Routers (Wireless {WIFI / { LIFI (Use Optical Fiber Technology for data transfer at Lightening Speed)}}), Servers (Both Operating Systems and the computer configuration itself) and in the last the clients systems (PC's / Phablet's / Tablets / Mobiles / PDA's / etc. and their OS). Remember never to keep the User Details / Password / User ID's / Encryption techniques Used and the Encryption Keys itself used for saving/retrieving data from a database through a DBMS connected to a data center behind, on a separate stand alone computer / PC or a USB Hard Drive or a pen drive kept in a vault safely by an unknown computer engineer who is not known to the system user's. Remote monitoring software should be installed on the main system server and on client PC's for remote desktop services. Proper back up's of the systems and its database and its clients credentials should be taken by using automatic back up techniques or manually by that particular software engineer who is not known to the company user's/ employee's. The Back Up's can be taken on a daily / Weekly / Monthly Basis or what ever the company owner decides, it depends on how important the data is to the company. The main gateway which connects the system server to the internet should be settled up very carefully, enabling/using all types of options like Firewalls, device gateway interface user id / password, should be altered by the system engineer and not to kept as default to manufacturer settings. If the system is on a domain over the internet, then please make sure only those services and ports are enabled which are related to that particular system needs or if the domain is saving the data on a different data center on any other remote location, connecting the data center database through a domain web site (pages / portal) using different credentials, then proper ports and services should be enabled which are related to the company activities where the system is being implemented and installed for clients and employees of that company. The web pages have the connection values hiding inside the encapsulated programming language known to the domain server or system server. The web pages kept on a domain will be used through a web browser or an application for mobile (iOS application / Android Application), to connect to the company system used by various types of user's. The users can be employees and company clients also or even the boss or the owner itself, will just need separately privileged user id's and password for connecting to the system. The clients will not have direct access to the system itself as they are connecting to it through a domain page which is connected in relay may be to the data center where the database is kept. Now same goes for Email Exchange Servers / Software's, either you can buy an Exchange Server Software with Computer systems as needed to run the Exchange OS itself, confidentiality kept on a private facility used by the company employee's for day to day activities. for this the company has to buy a dedicated line with an fixed IP address if you set your own emails exchange server. This option is best suited for government firms and multinational companies as if they use other company services like email accounts provided when you
  • 4. register a domain with a web hosting firm. Can be costly or less costly, it depends on the company activities and client span. Separate exchanges are needed by those companies where the company does not want to share their information with the web hosting services provided. Fixed IP can be used with domain forwarding services. etc.. The complicate the system, the greater maintenance services and procedures are required to run it which includes proper data back up's. The Employee's should be able to use their personal devices which can connect to the company system in company premises, devices like USB Modem's (Wingle), or their personal mobile itself. All USB port's should be monitored for data copying or theft by the employee's themselves or the USB ports should be kept disabled by checking if their is need for it by the employee using the PC as this can be a problem when somebody puts an virus affected USB hard Drives or other USB devices available or a USB wingle device which can use to hack the company network as the wingle device will be connected to the telecommunication company. So, they can download or upload company information by hacking the company network from inside using a USB Wingle with internet enabled on it. Bluetooth Device must be kept on and or hidden always, as when it is kept on the device doesn't stay's idle and the port's used by the device will not be open to hackers. Just the other mobile device connecting, the employee should know who it is connecting, I mean the employee can give access to the hacker requesting to connect to the Bluetooth device of that particular PC or mobile or a tablet. As these days the Laptops and Other Personal Computers are coming with built-in USB ports, so what you can also do is to request the computer companies to make customized PC's and servers for that particular end-user company. Inside a multinational company there are various devices these days which are forbidden to take inside and take some company property outside like a computer, so what you can do is to use proper locking tables and cupboard's (for LAN/WAN Switches / Routers / Mobile Devices), to keep your device out of reach of unauthorized user. Because the Devices can be connected physically like connecting to LAN Switch directly using a Laptop and accessing its Interface using the gateway and if the unauthorized personnel is lucky then, the default user id and password for that modem router or switch is at default setting so admin and admin will be the user id and password to connect to it. If you want to see the password written in the **** form, so there are various software's to see this too, like Wheel to drag a wheel on to the **** password and it will come in a text box in the wheel software, I use to use. Remember to use the POST method while transferring the form data (POST Method hides the values of passed parameters to the other scripting language web page for it to processed by that particular scripting page {like PHP (Personal Home Page, file extension .php and/or simple script's like VB or java script's, etc.)}) instead of transferring the form data using the GET (GET method passes the parameter values openly in a web browser link normally known as URL (Uniform Resource Locator), which is seen by in the browser where the website address is typed, after the question mark {?} all are parameter values passed to other pages for may be fetching data from a DB for a particular employee or customer) method by passing the parameters values, in an HTML 5 Form (Responsive HTML). In GET Method the data transmitted to another page or program gets hided/encapsulated inside a packet which is not seen at the presentation layer i.e. in the browser website address link bar. And https web url's are used by bank's and other financial firm's to communicate between and among the customer's and themselves as employee's. For designing a good web page or a website you can use software's like Blue Griffon, Microsoft Visual Studio .Net (ASP .Net), Flex for iOS, Linux (Red Hat / Ubuntu / Mandarin) for Android, Macromedia Dreamweaver, etc. Microsoft Visual Studio .Net 2017 can be used for making 3D games using enhanced programming
  • 5. terminologies. And always make sure the programming engine which you are using to run your website like for example if you a website or a customized desktop system use's CLR (.Net Engine) to process it's code's at the client side, then it should be regularly updated by subscribing to the Microsoft Website's for this particular software. Or if you are using java as the programming engine at the client side, then JVM (Java Virtual Machine) should be regularly and updated by subscribing to their information website or software update system. The security patches do come now and then so it is a must to have a very fast internet connection and fully activated windows operating system (copy righted), the OS should not be pirated, even though I learn all this by using pirated software's during my university course, but I never tried to earn from it by selling it may be. Media News ! Communication 2.6 ! Bluetooth Technology ! Device ! Security Tips & News Internet Speed Measurement's as compared to actual files on computer hard drive's Internet Speed Measurement ! Megabytes Per Second (MBps) Vs Megabit Per Second (Mbps) MBps and Mbps speed measurements are available in calculating the speed of downloading and uploading a file from over the Internet onto a PC or a server or a mobile or a Tablet, etc. The downloaded or uploaded file itself, I mean it's size is calculated in (capital MB) Megabytes (MB) not Megabits (Mb). That is how a computer store's a downloaded or copied file on to itself, from any type of source it is connected to. Latest Technologies like 4G (Fourth Generation) have a very high range of speed of upto 150 MBps (Megabytes Per Second) From minimum 1 MBps (Megabytes Per Second). This is what you need to be make sure that the Internet connection you are taking and it's package should be in capital MBps not in small Mbps. If it say's in small 2 Mbps (Megabits Per Second) then in actual it is 256 KBps (Kilobytes Per Second), which is 0.220 MBps (Megabytes Per Second) in actual. Unlimited data packages provided by ISP's these day's have an internet connection speed in small Mbps (Megabits Per Second) i.e. how they earn through this, but this package has a benefit that it has a very high data download/upload limit, i.e. it might be 150 GB monthly. There are more measurement speed's available like Bytes, Kilobytes, Megabytes, Gigabytes, Terabytes and in small Bits, kilobits, Megabits, Gigabits and may be Terabits. Remember that the file when it get's stored onto a PC's hard drive, its file size is calculated in capital measurement's like Bytes, Kilobytes, Megabytes, Gigabytes, Terabytes. These Two available download and upload a file speed measurement's are used only over the internet, Bits, kilobits, Megabits, Gigabits and may be Terabits: This will be slow while downloading and uploading a file over the internet, the reason for this is the file itself in actual is in capital measurement's like in Bytes, Kilobytes, Megabytes, Gigabytes and Terabytes, so the file will take time to get uploaded or downloaded. Bytes, Kilobytes, Megabytes, Gigabytes, Terabytes: This will be fast/actual/real while downloading and uploading a file over the internet, the reason for this is the file itself is in already in capital measurement's like in Bytes, Kilobytes, Megabytes, Gigabytes and Terabytes, so the file will take the same time to get uploaded or downloaded as the speed of internet connection and the file size itself is in same calculation measurement. That is the data transfer rate and the file itself uses the same measurement's i.e. for example: if you download a 2 MB (Megabytes) file on a 2 MBps connection, it will take 2 seconds to get downloaded.
  • 6. And if you download a 2 MB file using a 2 Mbps internet connection, it will take 16 Seconds to get downloaded, approximately. And there are some other related details like if on an 2 MBps Internet connection, if you download several or more than one 2 MB files simultaneously (at one given time), so the bandwidth i.e. 2 MBps will be shared among the downloading files. And there are some other things like when you download a file from a server over the Internet, so isn't that server also connected to the Internet and using some Internet speed package and data limit package or unlimited data package and the machine configuration is also been dealt with as if that is a server over the Internet keeping that file you might be downloading, then it is for sure that the file you are downloading, other user's might also be downloading the same file, so ultimately the server speed also comes in. But server's these day's are of very high configuration and speed both machine and Internet Connection Speed, And Data Limit's, so if you want to check just by downloading a single file then if your connection speed is 2 MBps then the downloaded file will get downloaded in 2 seconds if its size is 2 MB. The more the number of Internet user's over one single connection, the Bandwidth of that connection shared among the devices the end-user's are using over the same network. In distributed system's this terminology is used as the the Database is kept on various server's and the table's inside the database are kept in a distributed format like distributing the field's for example of customer in separate table's with same primary key's so one can access some part of data quickly without searching the whole database and fetching the whole record of that particular customer. Keeping such type of table's and record's give us a high access speed to fetch that record from a table if there thousand's of record's in a table. This is called optimization of a Database. Keeping records or a database centrally has the benefit that it's maintenance is easily done but the record's fetching speed might degrade as while searching all the database record's are searched, so if there are thousand's of records in a table of a database, the a very high server, network and Internet connection is needed. There are various other method's of saving data, one is directly saving a record with it's hash address like memory address or hard drive address, so just keep it's file path or this hash address in a table database or one other idea is to give that hash address to the customer or client who passes parameter's to the system for fetching records, so if the client has the hash address or memory address or hard drive address of a cylinder in a track, then the system can directly access the record and show it to the end user but fetching using hash address or memory address should only be through the system interface not by any other means. While transferring the parameters from a web page to another program or a web programming language web page, we need to take care that when we transfer values using parameter's, the value's are seen on the browser url textbox. These value's can be like http://www.xxxxxxxx.com/index.asp?customerid='1'. The parameter value of a customer id is seen in the weblink. One of the security loophole is that it can run sub query, like for example, http://www.xxxxxxxx.com/index.php?customerid='select * from customer where customerid ='1', and status='active';' and press enter. Similarly these subquery has other functionalities built- in the DBMS, i.e. many function's are available to get stored database information using DBMS function's and object's. This method of passing values is known as GET method. While POST method hide's the parameter's value's while transferring or calling or executing to another web page with scripting languages like php and asp .net. Make sure to check for if there any services or port's opened and not needed by the customized system for that particular company, who's system you are making, need's to be closed or be disabled and not remain idle or opened. Open Service's or port's are vulnerable for hacker's getting access to it may be by using brute forcing i.e. even if it is password protected.
  • 7. FING (available in iOS by Apple (Mobile/Computer's/Tablet's/Watche's, etc. Company)) can be used to check what are the services provided on a domain or an IP Address over the Internet. Well hacking is not Ok if it is not ethical, that is the hacker's should not harm the system or any other device or it's data stored or it's peripheral's or BIOS or it's software's or browser's history or the account's its use like Email's, Social Networking Website's, blog's, User's bank details over Internet Banking over the Internet. There are various Ethical Hacking Courses available in the market. Metasploit Project is also a very nice coding software to get information on the OS vulnerabilities or like for example what services or port's are available for getting access to it. Click Here for More Info on Harmless Hacking Known as Ethical Hacking for World / Continent / Country / City / Area or Any crime done by an individual to check or monitor it's activities, Click Here for More Info on Harmless Hacking Known as Ethical Hacking Sample Exam Click Here for The Microsoft Press Store (eBooks For Programmers / Software / Network Engineer's / Etc.) ! Microsoft Virtual Academy Click Here for The Microsoft Courses ! Microsoft Virtual Academy One of the given options in Database from Microsoft, named as Microsoft Access, comes with Microsoft Office Software's, currently known as Office 365, is that you can hide the whole table inside a database, like for example hiding a User ID's and Password's table from the application user or the interface itself i.e. when or if the user of application have access to the database even with the password protected Database, you can hide the table separately from the user and only access that table through the user interface that is the application through which you are entering or retrieving the data and processing it through the application engine for company business activities. To Download Latest Microsoft Office, click here For Free Download's And Security Update's For Microsoft Product's, click here For Microsoft Education / Product's, click here Latest Windows From Microsoft Database User's: Unrestricted administrative accounts There are two administrative accounts (Server admin and Active Directory admin) that act as administrators. To identify these administrator accounts for your SQL server, open the Azure portal, and navigate to the properties of your SQL server. Server admin: When you create an Azure SQL server, you must designate a Server admin login. SQL server creates that account as a login in the master database. This account connects using SQL Server authentication (user name and password). Only one of these accounts can exist. Azure Active Directory admin: One Azure Active Directory account, either an individual or security group account, can also be configured as an administrator. It is optional to configure an Azure AD administrator, but an Azure AD administrator must be configured if you want to use Azure AD accounts to connect to SQL Database. For more information about
  • 8. configuring Azure Active Directory access, see Connecting to SQL Database or SQL Data Warehouse By Using Azure Active Directory Authentication and SSMS support for Azure AD MFA with SQL Database and SQL Data Warehouse. The Server admin and Azure AD admin accounts has the following characteristics: These are the only accounts that can automatically connect to any SQL Database on the server. (To connect to a user database, other accounts must either be the owner of the database, or have a user account in the user database.) These accounts enter user databases as the dbo user and they have all the permissions in the user databases. (The owner of a user database also enters the database as the dbo user.) These accounts do not enter the master database as the dbo user and they have limited permissions in master. These accounts are not members of the standard SQL Server sysadmin fixed server role, which is not available in SQL database. These accounts can create, alter, and drop databases, logins, users in master, and server-level firewall rules. These accounts can add and remove members to the dbmanager and loginmanager roles. These accounts can view the sys.sql_logins system table. Configuring the firewall When the server-level firewall is configured for an individual IP address or range, the SQL server admin and the Azure Active Directory admin can connect to the master database and all the user databases. The initial server-level firewall can be configured through the Azure portal, using PowerShell or using the REST API. Once a connection is made, additional server-level firewall rules can also be configured by using Transact- SQL. Administrator access path When the server-level firewall is properly configured, the SQL server admin and the Azure Active Directory admin can connect using client tools such as SQL Server Management Studio or SQL Server Data Tools. Only the latest tools provide all the features and capabilities. The following diagram shows a typical configuration for the two administrator accounts. For More details Kindly have a look at the following web link from Microsoft on SQL Server Database's This means very high class of web based and desktop based system's can be developed using all type's of options available in the front-end {(C# .Net, ASP .Net, PHP, VB .Net, etc.)} and {back-end (Microsoft Access, SQL Server, MySQL, etc.)} programming languages and RDBMS. The Database user's should be used only by the developer's, I mean the client's should not be able to connect to the DBMS directly by using SQL Server Management Studio for SQL Server Database(s), the client's should only be able to connect through the front-end (presentation layer) interface developed for them by the Programmer's. You can also use web function's or API's from other web site's like facebook.com, outlook.com, twitter.com and google.com, etc., to validate a user in your system, the benefit of this is that you don't have to keep complete user information for your system and guarding all type's of Password's and bank details, only logging will be needed that is who did what after logging in and when it logged out. And only valid user's who are genuinely over the internet will be able to log in your system. Some Details on How To Adjust Windows 10 Firewall Rules And Settings : In Windows 10, the Windows Firewall hasn’t changed very much since Vista. Overall, it’s pretty much the same. Inbound connections to programs are blocked unless they are on the allowed list. Outbound connections are not blocked if they do not match a rule. You also have a Public and Private network profile for the firewall and can control exactly which
  • 9. program can communicate on the private network as opposed to the Internet. Click here for more Information on how to control Inbound and Outbound Data On a Private or Public Network using Microsoft Windows 10 The Inbound and Outbound Data can also be setted on a pure Windows Server also, through using policies and active directory /port's. Even a computer with Microsoft Windows 10 Minimum version should be Professional or higher version should be Enterprise, can also be used as a server for desktop or web based system on a LAN or WAN. If on WAN then leased lines with registered IP address is needed to run it without registering a domain. If using a domain then it is a must that interface (coded pages with script's and HTML probably HTML 5 if using latest HTML version) designed to access the database should be on that hosting server where the domain is registered. You can also control the inbound and outbound traffic over the Public / Private network using McAfee solutions, McAfee solutions deliver complete virus protection and internet security. Download McAfee anti- virus and anti-spyware software to protect against the latest .... One of the best Antivirus / Firewall, I have used to block hacker's even on the same network i.e. inside a LAN is Norton Antivirus. Click here for more details on Norton Product's Click here for more details on Norton Mobile Security for your Mobile Device's like Phone's and Tablet's Click here for more details on Norton WiFi ! Protect your data with a no-log virtual private network (VPN) that encrypts your personal information and doesn’t track or store your online activity or location. Click here for more details on Introducing Norton Core — The secure router for your connected home ! the ultimate in WiFi security for the connected home ! Norton Core secure WiFi router protects your digital life, while delivering the highest level of performance. All the WiFi coverage you need—even prioritize speed to any device you want. Powerful tools for parents to monitor and manage screen time, control time limits and set content filters. Iconic design that is beautiful from every angle; no need to hide this work of art. Norton AntiVirus Basic ! Powerful Security ! Simply Affordable Norton ! Internet Security Firewall these day's have the options to login remotely to other computer's with the same version of firewall from the same company. So, managing it is very convenient from the developer's premises. It uses IP Addresses and Password's may be User ID's too, to connect remotely. All Network traffic can be managed remotely even by using remote desktop connection even on a Windows 10 OS Professional/Enterprise Version PC / Server. You can get a domain registered using any host too, and get it forwarded to a leased/Permanent IP Address on a Private server, i.e. the code can also be kept on a different server than the domain hosting server with a forwarder on that domain through cPanel for example. The example link will be like this http://alkahaftechnologies.com and when you enter it on web browser and enter it, it might forward you to this link with leased IP Address, http://10.52.58.1/index.html, and it will open the main index page may be for that particular web browser based company system linked to their database. Microsoft Windows Operating System Security Feature:- Just right click on the drive or a folder or a single file itself, and select the tab with the text security.
  • 10. You will be seeing the local windows user's and microsoft outlook email user's of the window's on this tab. Now, select the user you wan to give access to your files or the drive itself. don't change the setting of system user, because system user needs full control in order to boot the operating system. Just change the setting for the administrator's, local or Standard User's or simpl y user's, and then your outlook email user's. if you make your outlook email user full control and remove the full control from other user's like administrator's, local or Standard User's or simply user's or any other outlook email user, then only you wi ll have access to the files in a drive or folder or a file itself. These day's the thumb or finger print login facility or option is there so if you setup your system like this then only you can access your file's. And if for some reason the hacker's gain access to your system through the internet then even they cannot edit or delete or copy your file if you have shut control's like read, edit, delete, create, full control to the other user's apart from your own outlook email user or local user. But I haven't seen the thumb login facility using the local windows user. Just one thing you have to keep in mind, if you setup your PC using the outlook email option, then you can setup any number of PC's using the same user ID of your outlook email address. But what if somebody have access to your outlook email address and set it up on a pc, so when it will gain access to all your file's on cloud, and if it use's that pc to hack your this PC where you have setted up the security feature, so as the hacker will have the same user installed in it's system, the hacking software will give it access to your PC. So, in order to escape this you should never give your outlook ID to anyone for anything I mean the id password, and the recovery code's or the two step verification code if it's set. So, the best method is to use thumb login option that use fingerprints to login, as finger prints are unique so only you can access your system using your ID. How to Save Images and Videos In A Database Like MySQL for PHP, Microsoft SQL Server For ASP.Net and Other Programming Languages like C# .Net, VB .Net, etc. If we use this option to save Images and Videos instead of their file paths in the server where they are actually saved will lead to high level of security because then we can use various encryption methods apart from the encryption options given by the Database (Server) itself. Using encryption methods like this even if the web server or data center server gets hacked the files if videos of images if encrypted using databases like MySQL and MS SQL Server and Oracle, the chances of getting the information leaked gets highly less because even if the database file gets stolen or leaked or hacked the encyotion keys or methods will not let it get open. The encryption methods used should be designed and kept on a different server or a stand alone pc may be where the web system is being designed. For Example in MySQL we can use LONGBLOB field type for that particular Table created in the MySQL Database. For Example, Table Creation SQL Script:-
  • 11. CREATE TABLE media (GAME_ID INTEGER NOT NULL PRIMARY KEY, name VARCHAR (20), VIDEO LONGBLOB ); SQL Statement For Insert Video In MySQL Table named as media:- INSERT INTO media values ('File_Name',LOAD_FILE("C:UsersPublicVideosSample Videoao.mp4")); insert into media(GAME_ID,name,VIDEO) values (1,'testVideoUploadInDB', load_file('C:UsersMohsinVideosAny Video ConverterYoutubetestvideo.mp4')) insert into media(GAME_ID,name,VIDEO) values (2,'testVideoUploadInDB', load_file('C:UsersMohsinDesktoptestvideofile.mp4')) PHP Code:- $sql = "insert into media(GAME_ID,name,VIDEO) values (1,'testVideoUploadInDB', load_file('C:UsersMohsinVideosAny Video ConverterYoutubetestvideo.mp4'))n" . ""; For Fetching Video From Database:- $query1=mysql_query("SELECT * FROM media where GAME_ID=2"); while($qry1=mysql_fetch_array($query1)) { $vid=$qry1['VIDEO']; echo $query1; For Detalis on storing Images and Videos in Microsoft SQL Server Database kindly click on the following link:- https://docs.microsoft.com/en-us/sql/relational-databases/blob/binary-large-object-blob-data-sql-server Table Encryption is yet to study by me if the option is available in the databases but putting encryption of such type needs a internet connection with a very high speed, I mean atleast 30 MBps will be needed to use or to fetch data from database quickly from the database using such security techniques which includes database passwords. Fiber Optic Cable Connection And / Or Lifi Hotspot: Mostly Recommended: As per the technology market for the Internet (Wireless and Ethernet) Communication Device's with Normal Copper Wire Dial-up, DSL / ADSL and Wifi Capabilities, I would be recommending if the Internet speed / bandwidth varies from 64 KBps (Kilobytes Per Second) to 300 MBps (Megabytes Per Second), using Modem's which do not transmit data using Light signal's or packet's over a copper communication cable (DSL/ADSL) or Wireless (Wifi) or Mobile network's like 1G/2G/3G. The router's used with network's with Copper (Dial-Up/DSL/ADSL) / Mobile (HSPA/1G/2G/3G/4G/5G) / Wifi Hotspot capabilities should have the following option's or functionalities, 1. WAN Port's for Connecting to a separate Modem (Dialup / DSL / ADSL) / CPE (WiMax Internet connection), for using the Internet on all the device's connected to the router. 2. LAN Port's for Connecting Personal Computer's to the Internal Network. LAN Port should also be used for connecting to an external server with
  • 12. Internet sharing and other network capabilities another company server with other local user's for may be authentication or logging into the network. 3. Mobile Carrier SIM Card Slot for Connecting to Internet if not using WAN ethernet port for connecting to the Internet or keepingthe SIM Card installed as back up if Internet is not functional using the WAN Ethernet port connected to a Modem. 4. WIFI Hotspot capability to connect a mobile or any type of wireless device like using Wifi Adaptor for a Desktop / Laptop PC or Tablet / Phablet, to the WIFI Hotspot network. For more detail's on Wifi Networks kindly click on the following link Wifi Hotspot's Highly Recommended: As per the technology market for the Internet (Wireless and Ethernet) Communication Device's with Fiber and Lifi Capabilities, I would be recommending if the Internet speed / bandwidth varies from 100 MBps (Megabytes Per Second) to 1+ GBps (Gigabytes Per Second), using Modem's which transmit's data using Light signal's with packet's over a fiber communication cable or wireless (Lifi) or Mobile Network's (4G/5G). The Difference between a Fiber and a copper wire connection is that Fiber transmits data using Light so ultimately the data travel's inside the communication cable with the speed of Light, and copper wire transmit data using the small amount of electricity, so electricity doesn't travels as fast as Light speed. The router's used with network's with Fiber (Modem connected directly to the exchange using the Fiber Optic Cable) / Mobile (4G/5G+) / Lifi Hotspot capabilities should have the following option's or functionalities, 1. WAN Port's for Connecting to a separate Modem (Fiber Optic Modem) / CPE (WiMax Internet connection), for using the Internet on all the device's connected to the router. 2. LAN Port's for for Connecting Personal Computer's to the Internal Network. LAN Port should also be used for connecting to an external server with Internet sharing and other network capabilities another company server with other local user's for may be authentication or logging into the network. 3. Mobile Carrier SIM Card Slot for Connecting to Internet if not using WAN ethernet port for connecting to the Internet or keepingthe SIM Card installed as back up if Internet is not functional using the WAN Ethernet port connected to a Modem. 4. LIFI Hotspot capability to connect a mobile or any type of wireless device like using Lifi Adaptor for a Desktop / Laptop PC or Tablet / Phablet, to the LIFI Hotspot network. For more detail's on Lifi Networks kindly click on the following link Lifi Hotspot's Some web link's on WiMax Technology For Reference WiMax Overview, Sanida Omerovic, Faculty of Electrical Engineering, University of Ljubljana, Slovenia Tutorials Point WiMAX: Technology for Broadband Wireless Access Introduction to WiMAX Dr. Piraporn Limpaphayom WiMAX, The First 4G Technology WiMAX TECHNOLOGY Security Measures Example: WIMAX Modem Without Wifi Hotspot For Internet Connectivity Devices: First of all, check that what is the gateway address for your modem, in my case I have a Qubee WIMAX Internet Modem, so and the company uses default gateway address like 192.168.x.1 (x might range from 1 to 255). This gateway tends to be the interface for the device to control and set its features and use it in accordance with the ISP's settings given by the Internet Service Provider.
  • 13. First of all login using the default password for the Modem, which is 12345, otherwise it is given on the device itself or on its instruction or user manual. And change it to your liking because when you use websites over the internet your IP (Internet Protocol) Address is being shared with that website hosting server which can be seen by the website owner through cPanel and other options, so kindly change the password for your device. Secondly, what you can do is activate or enable the built-in firewall for your device for extra protection apart from your windows firewall. Thirdly, you can enable MAC(Machine Address) Address filtering, which are given on the device and its manual. Enabling this option will not let anyone else connect to your device apart from the MAC addresses given in the MAC Filtering List for that particular device. Fourthly, you can change the password to your liking for your user id provided by your ISP, for connecting the device to the Internet Server. This you can do by logging on the ISP's web portal by going to their customer care support page and checking your details of connection and status of your connection and package you are using. I mean the password is generated by the administrator and given to you by the local customer care officer of that particular shop or office, so it might know your details and can use the your details on any other device by providing your credentials i.e. user id and password using the same device settings provided by the ISP. Fifthly you can keep your device in a locked container like tv trolleys and tables or computer devices switches so that in your absence anyone can access it through the LAN port or Ethernet Port Physically, for hacking something or doing some wrong doing like using somebody's debit card for shopping from the internet. For MBB Hotspots ZONG 4G Mobile Broadband (Mobile Hotspot - Huawei) First of all, check that what is the gateway address for your modem, in my case I have a Huawei For ZONG 4G MBB Internet Modem Hotspot, so and the company uses default gateway address like 192.168.8.1 (it might range from 1 to 255 which can be altered by user liking). This gateway tends to be the interface for the device to control and set its features and use it in accordance with the ISP's settings given by the Internet Service Provider. First of all login using the default user id and password for the Modem, which is admin, otherwise it is given on the device itself or on its instruction or user manual. And change it to your liking because when you use websites over the internet your IP (Internet Protocol) Address is being shared with that website hosting server which can be seen by the website owner through cPanel and other options, so kindly change the password for your device. Secondly, what you can do is activate or enable the built-in firewall for your device for extra protection apart from your windows firewall. Thirdly, you can enable MAC(Machine Address) Address filtering, which are given on the device and its manual. Enabling this option will not let anyone else connect to your device apart from the MAC addresses given in the MAC Filtering List for that particular device. Fourthly, you can change the password to your liking for your user id provided by your ISP, for connecting the device to the Internet Server. This you can do by logging on the ISP's web portal by going to their customer care support page and checking your details of connection and status of your connection and package you are using. I mean the password is generated by the administrator and given to you by the local customer care officer of that particular shop or office, so it might know your details and can use the your details on any other device by providing your credentials i.e. user id and password using the same device settings provided by the ISP.
  • 14. Fifthly you can keep your device in a locked container like tv trolleys and tables or computer devices switches so that in your absence anyone can access it through the LAN port or Ethernet Port Physically, for hacking something or doing some wrong doing like using somebody's debit card for shopping from the internet. Media News ! Communication 2.6 ! Security Tips & News ! For Further Enhancing Security Measures, Apart From These measures end-users can use customized Firewalls and Antivirus like Windows Defender in Microsoft Windows 10, Mcaffe and Norton Security, Avast, etc. You can buy these softwares through us, we provide all legal copies registered and bought by our company Debit Card. or you can use their free trial or free versions by going at the following URL Filehippo Or contact us directly through the following URL, AL-Kahaf Technologies Inc. Best Regards, Muhammad Mohsin Naeem My Online Web Domain: http://alkahaftechnologies.com My Mobile # +92 316 2998 439 My Bio Data Web Link: http://alkahaftechnologies.com/BioData/index.html Contact Number's: +92 342 818 4057, +92 340 926 6409, +92 340 124 2369, +92 340 039 8249, +92 316 299 8439 SMS Number's: +92 342 818 4057, +92 340 926 6409, +92 340 124 2369, +92 340 039 8249, +92 316 299 8439, +92 340 039 8249 Sent from Mail for Windows 10