What is IP Spoofing in Web Security?
/ June 27, 2018

Criminals have long employed the tactic of masking their true identity, from disguises to aliases to caller-id blocking. It should come as no surprise then, that criminals who conduct their nefarious activities on networks and computers should employ such techniques. IP spoofing is one of the most common forms of on-line camouflage. In IP spoofing, an attacker gains unauthorized access to a computer or a network by making it appear that a malicious message has come from a trusted machine by “spoofing” the IP address of that machine. In this article, we will examine the concepts of IP spoofing: why it is possible, how it works, what it is used for and how to defend against it. Basic Overview IP Spoofing IP Spoofing is a technique used to gain unauthorized access to machines, whereby an attacker illicitly impersonates another machine by manipulating IP packets. IP Spoofing involves modifying the packet header with a forged (spoofed) source IP address, a checksum, and the order value. Internet is a packet switched network, which causes the packets leaving one machine may be arriving at the destination machine in different order. The receiving machine resembles the message based on the order value embedded in…

What is Web Personalization and its needs and benefits ?
/ June 26, 2018

In the recent few decades the World Wide Web has become the biggest and most popular way of communication and information dissemination. World Wide Web is a huge repository of web pages and links and the volume of information available on the internet is increasing exponentially as approximately one million pages are added daily. The existence of such abundance of information, in combination with the dynamic and heterogeneous nature of the web, makes web site exploration a difficult process for the average end user. So in spite of the fact that users are provided with more information and service options, the average end users may not get the “right” information only, in what they are interested in. with the explosive growth of the number and the complexity of information resources and the advent of e-services; it has become more difficult to access relevant information from the Web. Definition of Web Personalization Web Personalization is the process of creating customized experiences for visitors to a website. Rather than providing a single, broad experience, web personalization allows companies to present visitors with unique experiences tailored to their needs and desires. Personalization is by no means a new concept. Waiters will often greet…

What is Green Computing?
Technology & Science / June 25, 2018

The term ‘Green Computing’ is the study and practices that covers the computing life-cycle from cradle to grave. It start from design to manufacturing to use of equipment and then safely disposing-off computers, related devices, networking and communications equipment’s efficiently and effectively with negligible or no impact on the environment. Today’s computing vision is utility based Consumers only need to pay provider only when and how they access, they need not to invest much and there is no need to develop a complex and costly infrastructure, this model of computing is cloud computing. Basic Overview of Green Computing Green computing is receiving more and more attention with increasing energy cost and growing environmental disquiets. Green Computing is a latest movement in IT industry towards scheming, building, and operating computer systems to be energy proficient. Green computing is environmentally sustainable to use of computers and related resources efficiently and effectively. Green computing also called green technology whose goals are to diminish the use of perilous materials, maximize energy effectiveness during the lifetime of the product, and encourage the recyclability or Biodegradability of obsolete products and waste of factory. Green computing or green IT, refers to environmentally sustainable computing or IT. Green…

Technology & Science / June 24, 2018

There’s always a time in our life when we look for a vacation to seek blessings of God, console our depressed souls and find the strength to face all the challenges. And trust me this once in a lifetime experience can be rejuvenating and it may change the course of your life. So, If you’re spiritually inclined and seeking a tour to reconnect with God, and fill your mind with positivity, then Madhya Pradesh is a must visit place for you. Madhya Pradesh is a melting pot that embraces people professing different religions. Thus, the state is home to many important worship places in India. The religious places strewn across the state are popular for their mystical overtones as well as for their architectural magnificence. Some of the most splendid temples in India adorn the landscape of Madhya Pradesh and heighten its popularity amongst religious travelers. Every year, many devotees flock to these religious destinations across the state, for offering their homage to Divinity. Hindu Religious Place to Visit in MP 1. Mahakaleshwar Jyotirlinga, Ujjain Ujjain, considered to be one of the holiest cities of India, is an ancient city situated on the eastern bank of the Shipra River in…

What is Red Green Blue (RGB) Color Model?
/ June 23, 2018

Colors are important for human for communicating with the daily encountered objects as well as his species, these colors should be represented formally and numerically within a mathematical formula so it can be projected on device/ computer storage and applications, this mathematical representation is known as color model that can hold the color space, by the means of color’s primary components (Red, Green, and Blue) the computer can visualizes what the human does in hue and lightness. Color Model Color models play an important role in real world applications such as computer graphics, image processing, television broadcasting, etc. Each color model has its own significance and applicable in different application domains. One of the interesting areas of digital image processing is to improve the image information for better processing image. Color model is a method for specifying colors in a standard way and the color model is represented by three dimensional coordinate system where each color is represented by single point within three dimensional systems. In case of human visual system, rods cells (in the eye) are sensitive to low intensity light waves recognizing binary images whereas cones cells are sensitive to red, green and blue light waves , thus,…

What is Hue Saturation Value (HSV) color Model?
/ June 22, 2018

To utilize color as a visual cue in multimedia, image processing, graphics and computer vision applications, an appropriate method for representing the color signal is needed. The different color specification systems or color models address this need. Color spaces provide a rational method to specify order, manipulate and effectively display the object colors taken into consideration. The purpose of a color model is to facilitate the specification of colors in some standard generally accepted way. In essence, a color model is a specification of a 3-D coordinate system and a subspace within that system where each color is represented by a single point. Basic Overview of HSV color Model Hue, Saturation, and Value (HSV) are a color model that is often used in place of the RGB color model in graphics and paint programs. In using this color model, a color is specified then white or black is added to easily make color adjustments. HSV may also be called HSB (short for hue, saturation and brightness). This color space describes colors (hue or tint) in terms of their shade (saturation or amount of gray) and their brightness value. The HSV color space (Hue, Saturation, Value) is often used by people…

International Yoga Day
/ June 21, 2018

The richness of a culture is always traced by looking at its longevity and prevalence of its practice in a society and to enrich this culture there is always need to promote and propagate this culture both within the society and to the outside world. In the same way to further enrich the yoga philosophy, there is the need to reach out to those who hitherto remained deprived of this heavenly bliss. The yogis of India have to enrich this yogic culture in the same way the way Swami Vivekananda propounded the modern yoga philosophy to the west. All about Yoga Day Every year June 21 is observed as an international yoga day, declared by the United Nations vide its resolution no 69/131 and the credit goes to India for introducing the draft resolution in the UNGA on December 11, 2014. “Yoga is an invaluable gift of ancient Indian tradition. It embodies unity of mind and body; thought and action; restraint and fulfillment; harmony between man and nature and a holistic approach to health and well-being. Yoga is not about exercise but to discover the sense of oneness with ourselves, the world and Nature. By changing our lifestyle and creating…

What is 3D Secure Protocol in Web Security?
/ June 20, 2018

E-commerce represents a web-based Internet economy that has risen from zero, to over a trillion dollars worldwide, in just seventeen years. However, the security challenges faced by the world’s largest open (and effectively anonymous) network, have meant that the growth of the Internet – and e-commerce – has been met with an equally rapid growth in the activities of those intent on using the Internet as a vehicle for malicious and criminal activities online. 3D Secure is a security protocol that is designed to provide an additional layer of security for online credit card and debit card transactions. It allows shoppers to create and assign a password to their card that is then verified whenever a transaction is processed through a site that supports the use of the scheme. The addition of password protection allows extra security on transactions that are processed online. Basic Overview of 3D Secure Protocol 3D Secure (3-domain secure), also known as Payer Authentication is a security protocol to prevent fraud in transactions with credit and debit cards online. Currently, this service is provided by Visa and MasterCard under the name Verified by Visa and MasterCard SecureCode, respectively. Payer Authentication is a three-part process. The parties involved…

What is different Steganography Technique in Image Steganography?
/ June 19, 2018

Steganography is the idea of hiding private or sensitive data or information within something that appears to be nothing out of the normal. The word steganography comes from the Greek Steganos, which mean covered or secret and –graphy mean writing or drawing. Therefore, steganography means, literally, covered writing Over the past few years, numerous steganography techniques that embed hidden messages in multimedia objects have been proposed. Different Techniques There have been many techniques for hiding information or messages in images in such a manner that the alterations made to the image are perceptually indiscernible. Common approaches are including: Figure 1 Different Steganography Technique Least Significant Bit (LSB) Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover image. The least significant bit (in other words, the 8th bit) of some or all of the bytes inside an image is changed to a bit of the secret message. When using a 24-bit image, a bit of each of the red, green and blue colour components can be used, since they are each represented by a byte. In other words, one can store 3 bits in each pixel. An 800 × 600 pixel image, can thus store…

Happy Father’s Day
/ June 17, 2018

Fathers, do not provoke or irritate or fret your children [do not be hard on them or harass them], lest they become discouraged and sullen and morose and feel inferior and frustrated. Do not break their spirit. One of the greatest gifts a father can give his child is time! Time spent playing, reading, talking, laughing. Children crave that attention and become downcast when it doesn’t happen. Father’s Day is celebrated worldwide to recognize the contribution that fathers and father figures make to the lives of their children. This day celebrates fatherhood and male parenting. Although it is celebrated on a variety of dates worldwide, many countries observe this day on the third Sunday in June. Public Background Honoring thy father is a concept that dates back to the very roots of human civilization. Father’s Day isn’t just a day for dads to get more ties. It’s celebrated on the third Sunday of June to honor dads, grandfathers, step-dads and all men who act as a father figure. Like most holidays that go way back, the origin is hard to trace but most people will agree that Sonora Dodd played a big part in starting the holiday. This year Father’s…

Insert math as
$${}$$