Skip to main content

Posts

Showing posts from 2017

Priority Based Cab Search Engine Using Rest API

I am honored to present my first published technical paper. PAPER TITLE:-Priority Based Cab Search Engine Using Rest API ABSTRACT In last two years, the rapid development of Internet based ride-sharing has brought great changes to travel pattern of residents. By comparing the trip records of OLA and UBER [2][3], two indicators, the distribution characteristics of vehicle volume and the balanced patterns of time, are selected to identify the ride-sharing cars from private cars. REST (Representational State Transfer) which uses Uniform Resource Identifier for web applications and web resources which use HTTP, as it was original which is simpler than SOAP or XML-RPC [4]. This paper in lights the working of comparison of the price, distance and by car selection. Authors :- Prof. Javed Khan Sheikh, Akshay Kharmale, Taha Pipewala, Quid Zohar Morbiwala, Shanawaz Shaikh Volume/Issue:  Volume 2 Issue 8 Published in :- IJISRT DIGITAL LIBRARY :- http://ijisrt.com/priority-based-ca

SQL INJECTION

What is SQL INJECTION SQL INJECTION is getting Unauthorized access to database. After successful authentication by SQL injection attacker tries to harm or dispose or cause any type of harm to a database.   A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system.  SQL injection we try to use SQL comments or using logical Boolean relational algebra i.e (OR & AND clause) to get data from db. How to Perform basic SQL injection Make a basic html form page without providing front end validation. Make a Folder in your local host directory as test HTML FORM AS index.html in your localhost directory(var/WWW/html/test) or in ht docs in XAMPP then add this HTML simple form as index.html <!

DDos attack

DDoS attack - Distributed Denial of Service DISTRIBUTED DENIAL OF SERVICE ATTACK (DDOS) DEFINITION A distributed denial of service (DDoS) attack is a malicious attempt to make an online service unavailable to users, usually by temporarily interrupting or suspending the services of its hosting server. Broadly speaking, DoS and DDoS attacks can be divided into three types: Volume Based Attacks Includes UDP floods, ICMP floods, and other spoofed-packet floods. The attack’s goal is to saturate the bandwidth of the attacked site, and magnitude is measured in bits per second (Bps). Protocol Attacks Includes SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and more. This type of attack consumes actual server resources, or those of intermediate communication equipment, such as firewalls and load balancers, and is measured in packets per second (Pps). Application Layer Attacks Includes low-and-slow attacks, GET/POST floods, attacks tha

UPD Attack in Python

UDP flood attack A UDP flood attack is a denial-of-service (DoS) attack using the User Datagram Protocol (UDP), a sessionless/connectionless computer networking protocol. Using UDP for denial-of-service attacks is not as straightforward as with the Transmission Control Protocol (TCP). However, a UDP flood attack can be initiated by sending a large number of UDP packets to random ports on a remote host. As a result, the distant host will: Check for the application listening at that port; See that no application listens at that port; Reply with an ICMP Destination Unreachable packet. Thus, for a large number of UDP packets, the victimized system will be forced into sending many ICMP packets, eventually leading it to be unreachable by other clients. The attacker(s) may also spoof the IP address of the UDP packets, ensuring that the excessive ICMP return packets do not reach them, and anonymizing their network location(s). Most operating systems mit

Columnar Transposition Cipher

Columnar Transposition Cipher Introduction  The columnar transposition cipher is a fairly simple, easy to implement cipher. It is a transposition cipher that follows a simple rule for mixing up the characters in the plaintext to form the ciphertext. Although weak on its own, it can be combined with other ciphers, such as a substitution cipher, the combination of which can be more difficult to break than either cipher on it's own. The  ADFGVX cipher uses a columnar transposition to greatly improve its security. Example  The key for the columnar transposition cipher is a keyword e.g.  GERMAN . The row length that is used is the same as the length of the keyword. To encrypt a piece of text, e.g. defend the east wall of the castle we write it out in a special way in a number of rows (the keyword here is  GERMAN ): G E R M A N d e f e n d t h e e a s t w a l l o f t h e c a s t l e x x In the above example, the plaintext has been padded so that it neatly fits in a

Digital Signal Processing - Circular Convolution

Convolution<title> <meta name="description" content="Digital Signal Processing (Linear Circular Convolution Using Circular Method),basics of convolution"> <meta name="keywords" content="Digital Signal Processing, Linear Circular Convolution Using Circular Method,Convolution,DSP"> </h1> <div> <div class="separator" style="clear: both; text-align: center;"> </div> <div style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"> <a href="about:invalid#zClosurez" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a><a href="about:invalid#zClosurez" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a>Convolution is a mathematical way of combining two signals to form a third signal. It is the s

How To Clear or Remove Elements From a list in Python

How To Clear or Remove Elements From a list in Python Sometimes When We add Elements in a list it becomes Troublesome to remove elemnts from the list so that we can use them again in our code or console. So to remove Elements from a list there are 3 ways 1)Re initialization of List 2)Using Pop function 3)Using del function 4)Using Remove function 1)Re initialization Reintialing the list clears up the whole list for reuse of the elements or variables so if my list is full of elements eg. A=[1,2,3,4,5,6] and i want A as an empty list we simply re initialize a list A=[] gives us an Empty list which clears up the whole variable 2)Pop function It removes the last element if unspecified or removes the specified indexed element from a list or array so if my list is full of elements eg. A=[1,2,3,4,5,6] A.pop() 6 numbers = arr.array('i', [10, 11, 12, 12, 13]) print(numbers.pop(2)) # Output: 12 print(numbers) # Output: array('i', [10, 11, 13]) T

Column Wise Multiplication of Two matrix in python

Tutorial for Column Wise Multiplication of Two matrix by lists in python suppose we want to multiply two lists of different lengths in python how to do it? Well there are many ways of Doing it from itertools we can use map but it multiples lists of equal length only using numpy but creating numpy arrays are not so useful it includes complicated stuff here ill show you  can do it simply using logic Suppose i have a 2d array and i want to multiply it column wise [ 1 2 3  ]     [1]     [1, 4, 7] [  4 5 6 ] *  [2] =  [2, 5, 8] [  7 8 9 ]     [3]     [3, 6, 9] So in python we create a list inside a list a=[[1,2,3],[4,5,6],[7,8,9]] b=[1,2,3] for row in range(len(a)): print([a[col][row] for col in range(len(b)) ]) [1, 4, 7] [2, 5, 8] [3, 6, 9] mul=[[1, 2, 3, 4, 0, 0], [0, 1, 2, 3, 4, 0], [0, 0, 1, 2, 3, 4], [4, 0, 0, 1, 2, 3], [3, 4, 0, 0, 1, 2], [2, 3, 4, 0, 0, 1]] hn=[-3, 2, 1, 0, 0, 0] so the ans should be [[-3, 0, 0, 0, 0, 0], [-6, 2, 0, 0, 0, 0], [-