Security of Digital Assets Using BlockChain

Overview 

As a body of technologies, processes and practices cybersecurity is designed to protect networks, computers, programs and data from attack, damage or unauthorized access. But, One of the most problematic elements of cybersecurity is the quickly and constantly evolving nature of security risks.

Adam Vincent, CTO-public sector at Layer 7 Technologies, describes the problem:

“The threat is advancing quicker than we can keep up with it. The threat changes faster than our idea of the risk. It’s no longer possible to write a large white paper about the risk to a particular system. You would be rewriting the white paper constantly…”

 Analytics: Network Breach Activities

In 93 percent of cases, it takes attackers few minutes or even less to compromise systems. However, organizations can take weeks or more to discover a breach even occurred.

It is important for our government organization to have a real-time analytics platform in place that helps continuously detect potential breaches inside and outside the firewall.

According to Forbes, the global cybersecurity market reached $75 billion for 2015 and is expected to hit $170 billion in 2020. Now, when a huge amount is at stake for even more valuable data, Is it any good to say that the threat will always be there ? Not if, there is a technology like Blockchain available.

Read More

Karl Pearson’s Algorithm in Python

Karl Pearson’s Correlation:

To deduce the degree of correlation between two variables, Karl Pearson deduced a formula in 1896.

To break this up, it means ” Pearson’s Correlation co-efficient” is :-

  •  useful to measure how strong a relationship is between two variables,
  •  commonly used in linear regression.

..basically it concerns with collection, manipulation, management, organization and analysis of numeric data.

What is it used for ?

Much used for data fitting in all sciences, to tell how related two or more variables under consideration are:-
Ok, alright !! When you,

  1. Want to see relation between your diet and weight? ….Use Karl Pearson’s correlation
    This is a positive relationship as variables change in same direction. So is, the relationship between your height and weight (yes !!…I just judged you.) and also between your diet and weight
  2. Want to see relation between Price and quantity in demand ? ….Use Karl Pearson’s correlation
    This is a negative relationship as variables change in opposite direction.  So is, alcohol consumption and driving ability.

Read More

Anatomy of a DNS zone file

Example of a DNS zone file: automationserver.com

$TTL indicates a DNS node tree and the starting point of a DNS zone file and default expiration time of all resource records without their own TTL value which is 1 week in this case.

SOA record – The Start of Authority record is a required option for each zone.

– contains the name of the zone ,

– email address of the entity responsible for administering the domain’s zone file (not used here),

– current serial number of the zone,

Read More

List to create

POSTS:

Must look like above, points to consider:-

  1. The font size
  2. The image
  3. Animated gif : must animate only once

Interview quests add-on: asking which commands in SQL confused then more with a poll or a particular question on a topic as well.

NETWORKing: how it works?

https://superuser.com/a/675129/882274
ABOUT page idea:

http://blog.thedigitalcatonline.com/pages/about.html

All types of testing:

FOR:load, stress, volume (make it look like a conversation)…

great blogs: http://inkbotdesign.com/100-best-design-blogs/

abduzeedo.com

LOOSE (for social interactions)

Make chrome a notepad

(if time provide other tweaks as well)

making a chrome plugin

=======SUBDOMAIN===

create another subdomain…add WP ….

first tutorial on blog— installing WP on ur domain…2nd doing the same on subdomain that I created

========JAVA TRICKY====

Some of the trickiest Java Questions :-

  • What will happen if you put return statement or System.exit () on try or catch block? Will finally block execute?

This is a very popular tricky Java question and it’s tricky because many programmers think that no matter what, but the finally block will always execute. This question challenge that concept by putting a return statement in the try or catch block or calling System.exit() from try or catch block. Answer of this tricky question in Java is that finally block will execute even if you put a return statement in the try block or catch block but finally block won’t run if you call System.exit() from try or catch block.

  • Does Java support multiple inheritances?

This is the trickiest question in Java if C++ can support direct multiple inheritances than why not Java is the argument Interviewer often give. Answer of this question is much more subtle then it looks like, because Java does support multiple inheritances of Type by allowing an interface to extend other interfaces, what Java doesn’t support is multiple inheritances of implementation.

  • If a method throws NullPointerException in the superclass, can we override it with a method which throws RuntimeException?

One more tricky Java questions from the overloading and overriding concept. The answer is you can very well throw superclass of RuntimeException in overridden method, but you can not do same if its checked Exception.

  • How do you ensure that N thread can access N resources without deadlock?

If you are not well versed in writing multi-threading code then this is a real tricky question for you. This Java question can be tricky even for the experienced and senior programmer, who are not really exposed to deadlock and race conditions. The key point here is ordering, if you acquire resources in a particular order and release resources in the reverse order you can prevent deadlock.

  • What is the difference between StringBuffer and StringBuilder in Java?

Classic Java questions which some people think tricky and some consider very easy. StringBuilder in Java was introduced in JDK 1.5 and the only difference between both of them is that StringBuffer methods e.g. length(), capacity() or append() are synchronized while corresponding methods in StringBuilder are not synchronized.

Because of this fundamental difference, concatenation of String using StringBuilder is faster than StringBuffer. Actually, it’s considered the bad practice to use StringBuffer anymore, because, in almost 99% scenario, you perform string concatenation on the same thread.

  • What do the expression 1.0 / 0.0 will return? will it throw Exception? any compile time error?

This is another tricky question from Double class. Though Java developer knows about the double primitive type and Double class, while doing floating point arithmetic they don’t pay enough attention to Double.INFINITY, NaN, and -0.0 and other rules that govern the arithmetic calculations involving them. The simple answer to this question is that it will not throw ArithmeticExcpetion and return Double.INFINITY.

  • What will happen if we put a key object in a HashMap which is already there?

This tricky Java question is part of another frequently asked question, How HashMap works in Java. HashMap is also a popular topic to create confusing and tricky question in Java. Answer of this question is if you put the same key again then it will replace the old mapping because HashMap doesn’t allow duplicate keys. The Same key will result in the same hashcode and will end up at the same position in the bucket.

Have a nice day

Thank you.

You can learn more form here :

http://googleweblight.com/i?u=ht…

http://googleweblight.com/i?u=ht…

http://googleweblight.com/i?u=ht…

http://googleweblight.com/i?u=ht…