May 12, 2014

What is TCP/IP?

TCP/IP stands for Transmission Control Protocol / Internet Protocol. It defines how electronic devices (like computers) should be connected over the Internet, and how data should be transmitted between them.
TCP - Transmission Control Protocol
TCP is responsible for breaking data down into small packets before they can be set over a network, and for assembling the packets again when they arrive.
IP - Internet Protocol
IP takes care of the communication between computers. It is responsible for addressing, sending and receiving the data packets over the Internet.

IP is Connection-Less

TCP/IP Protocol for WEB

Web browsers and servers use TCP/IP protocols to connect to the Internet. Common TCP/IP protocols are:
HTTP - Hyper Text Transfer Protocol
HTTP takes care of the communication between a web server and a web browser. HTTP is used for sending requests from a web client (a browser) to a web server, returning web content (web pages) from the server back to the client.
HTTPS - Secure HTTP
HTTPS takes care of secure communication between a web server and a web browser. HTTPS typically handles credit card transactions and other sensitive data.
FTP - File Transfer Protocol
FTP takes care of transmission of files between computers.


Domain Names

A name is much easier to remember than a 12 digit number.
Names used for TCP/IP addresses are called domain names.

TCP/IP Protocols for Email

E-mail programs use TCP/IP for sending and receiving e-mails. The TCP/IP protocols for email are:
SMTP - Simple Mail Transfer Protocol
 SMTP takes care of sending emails. Often emails are sent to an email server (SMTP server), then to other servers, and finally to its destination. SMTP can only transmit pure text. It cannot transmit binary data like pictures, sounds or movies.
MIME - Multi-purpose Internet Mail Extensions
The MIME protocol lets SMTP transmit multimedia files including voice, audio, and binary data across TCP/IP networks. The MIME protocol converts binary data to pure text, before it is sent.
POP - Post Office Protocol
The POP protocol is used by email programs to retrieve emails from an email server. If your email program uses POP, all your emails are downloaded to your email program (also called email client), each time it connects to your email server.
IMAP - Internet Message Access Protocol
The IMAP protocol works much like the POP protocol. The main difference is that the IMAP protocol will not automatically download all your emails each time your email program connects to your email server.
The IMAP protocol allows you to look through your email messages at the email server before you download them. With IMAP you can choose to download your messages or just delete them. This way IMAP is perfect if you need to connect to your email server from different locations, but only want to download your messages when you are back in your office.     

ASP.NET Web Forms

There are three kinds of server controls:
  • HTML Server Controls - Traditional HTML tags
  • Web Server Controls - New ASP.NET tags
  • Validation Server Controls - For input validatio

ASP.NET - HTML Server Controls

HTML server controls are HTML tags understood by the server.
HTML elements in ASP.NET files are, by default, treated as text. To make these elements programmable, add a runat="server" attribute to the HTML element. This attribute indicates that the element should be treated as a server control. The id attribute is added to identify the server control. The id reference can be used to manipulate the server control at run time.

ASP.NET - Web Server Controls

Web server controls are special ASP.NET tags understood by the server.
Like HTML server controls, Web server controls are also created on the server and they require a runat="server" attribute to work. However, Web server controls do not necessarily map to any existing HTML elements and they may represent more complex elements.


ASP.NET - Validation Server Controls

Validation server controls are used to validate user-input. If the user-input does not pass validation, it will display an error message to the user.
Each validation control performs a specific type of validation (like validating against a specific value or a range of values).
By default, page validation is performed when a Button, ImageButton, or LinkButton control is clicked. You can prevent validation when a button control is clicked by setting the CausesValidation property to false.



All server controls must appear within a <form> tag, and the <form> tag must contain the runat="server" attribute.

Note: The form is always submitted to the page itself. If you specify an action attribute, it is ignored. If you omit the method attribute, it will be set to method="post" by default. Also, if you do not specify the name and id attributes, they are automatically assigned by ASP.NET.

Note: An .aspx page can only contain ONE <form runat="server"> control!

The ViewState indicates the status of the page when submitted to the server. The status is defined through a hidden field placed on each page with a <form runat="server"> control. 
Maintaining the ViewState is the default setting for ASP.NET Web Forms.If you want to NOT maintain the ViewState, include the directive <%@ Page EnableViewState="false" %> at the top of an .aspx page or add the attribute EnableViewState="false" to any control.

ASP.NET MVC

MVC Folders

Application information
Properties
References
Application folders
App_Data Folder
Content Folder
Controllers Folder
Models Folder
Scripts Folder
Views Folder
Configuration files
Global.asax
packages.config
Web.config


  • The Models Folder contains the classes that represent the application model.  



May 9, 2014

Ethical Hacking

1. Forward Discovery:

Learn computer forensics, incident response and digital investigation from those who were on the front lines. Forward claims to have instructors who have taught at the military, federal, state, local, and corporate levels. Few things that you can learn on Forward includes information protection and risk mitigation, digital investigations and computer forensics, data incident response, electronic discovery and vulnerability assessment.

2. 7SAFE

7Safe provides post graduate level and 11 certificate cources on different aspects of ethical hacking. The Postgraduate Qualifications includes: MSc Professional Practice in Digital Forensics and Security, Postgraduate Certificate in Computer Security and Forensics, MSc Computer Security and Forensics. The certification courses includes: CSTA Ethical Hacking Training, CSTP Ethical Web Application Hacking Training, CAST Application Security Training, CWSA Wireless Security Training, CFIP Forensic Investigation Training, CMI Malware Investigation Training, CSIS Incident Response Training, CMFS Mac Forensics Training, PCI DSS Implementation, CIIP Implementing ISO 27001, and Incident Response & Computer Forensics Awareness Training. The courses offered are authored and delivered by the expert practicing consultants of 7Safe.

3.Hacker Academy

The Hacker Academy provides training courses in infosec from the hacker’s perspective. The Hacker Academy not only provides the necessary skills to the students but also polishes them by providing required knowledge to practice, implement, and deploy what they have learned. It works on Learn-Practise-Use module where whatever you learn is practiced immediately.

It provides courses on Ethical Hacking, Penetration Testing, Digital Forensics and Reverse Engineering. You can even go for a free trial.

4. InfoSec Institute

The infosec institute have been training Information Security and IT Professionals since 1998 with a diverse lineup of relevant training courses. The institute have trained over 18,000 professionals by now. The institute offers a vast range of certifications courses a few popular ones out of which are: Advanced Ethical Hacking & Advanced Persistent Threat, Reverse Engineering, SCADA Security, Advanced Computer Forensics, Web Application Penetration Testing, Penetration Testing, Mobile Device Penetration Testing, Advanced Reverse Engineering Malware, Reverse Engineering Android, Expert Penetration Testing etc.

5. International Council of Electronic Commerce Consultants

The International Council of Electronic Commerce Consultants is already a known name amongst IT security professionals seeking certifications. The ECC council provides many popular certifications including: Certified Ethical Hacker, Computer Hacking Forensic Investigator – CHFI, Certified Chief Information Security Officer – CCISO, Licensed Penetration Tester – LPT, EC-Council Certified Security Analyst – ECSA, EC-Council Network Security Administrator – ENSA, EC-Council Certified Incident Handler – ECIH, EC-Council Disaster Recovery Professional – EDRP, Certified Secure Computer User – CSCU, Certified Network Defense Architect – CNDA, EC-Council Certified Security Specialist – ECSS, EC-Council Certified Secure Programmer – ECSP, EC-Council Certified VoIP Professional.

6. Logical Security

The Logical Security provides comprehensive and varied educational solutions while offering private, on-site classes for organizations. They also provide Self-Study Solution Packages, Computer Based Training, On-Line Training, and customized training tailored for your needs. Logical security is the place to get video and online tutorials for various security certificates like CEH, Security+, SSCP and CISSP.

7. Mile2

The developer and provider of proprietary vendor neutral professional certifications for the cyber security industry, Mile2 administers its certification exams through the MACS (Mile2 Assessment and Certification System) system. It provides Information Assurance services meeting the military, government, private sector and institutional standards and specifications. The certification courses are programmed to teach the fundamental and advance principles of cyber security and follows a course/certification track that leads to advanced hands on skills training for penetration testing, Disaster Recovery, Incident handling and Network Forensics.

8. PaulDotCom

PaulDotCom Enterprises is an organisation dedicated to security, hacking, and education. It encompasses weekly podcasts, monthly webcasts, security consulting, and numerous articles, papers, and presentations.

9. SANS Institute

The SANS Institute was established in 1989 as a cooperative research and education organisation. Its programs now reach more than 165,000 security professionals around the world. A range of individuals from auditors and network administrators, to chief information security officers are sharing the lessons they learn and are jointly finding solutions to the challenges they face. SANS training can be taken in a classroom setting from SANS-certified instructors, self-paced over the Internet, or in mentored settings in cities around the world.

What's interesting is SANS runs continuous competitions for security instructors around the world to find the best teachers in each topic.

10. Security University

Security University is one of the popular providers of Qualified Hands-On Cybersecurity Education, Information Assurance Training and Certifications for IT and Security Professionals. The University offers various certification courses including a few like Qualified/ Ethical Hacker Certification, Qualified/ Security Analyst Pen Tester Cert., Qualified/ Penetration Tester License, Qualified/ Forensic Expert Certification, Qualified/ Network Defender Certification.



For more information don't forget to check the site...........

Teach You All About C++

1.C++ In Action

In this book you won't find examples of boring payroll applications or programs for grading students. Instead you'll witness the development of a simple parser and a symbolic calculator from a simple command-line program to a GUI Windows application. In the process you'll learn how to use C++ like a real pro.

2.C++ Demystified

This hands-on, step-by-step resource will guide you through each phase of C++ programming, providing you with the foundation to discover how computer programs and programming languages work.

3.The Boost C++ Libraries

This book is an introduction to the Boost C++ Libraries which complement the C++ standard by adding functions helpful in practice. As the Boost C++ Libraries are based on the C++ standard, they are implemented using state-of-the-art C++. They are platform independent and are supported on many operating systems including Windows and Linux by a large developer community.

4.Open Data Structures (in C++)

This book is intended to teach the design and analysis of basic data structures and their implementation in an object-oriented language. In this edition, the language happens to be C++.

5.Software Design Using C++

These web pages attempt to provide the material needed for three complete computer science courses: what are typically called CS 1, CS 2, and a data structures course, all using C++ as the programming language.

6.Data Structures and Algorithms with Object-Oriented Design Patterns in C++

This book is about the fundamentals of data structures and algorithms--the basic elements from which large and complex software artifacts are built. This book also illustrates object-oriented design and it promotes the use of common, object-oriented design patterns. The algorithms and data structures in the book are presented in the C++ programming language.

7.Learn C++

LearnCpp.com is a totally free website devoted to teaching you to program in C++. Whether you’ve had any prior experience programming or not, the tutorials on this site will walk you through all the steps you’ll need to know in order to create and compile your programs.

8.Software optimisation resources

This series of five manuals describes everything you need to know about optimising code for x86 and x86-64 family microprocessors, including optimisation advices for C++ and assembly language, details about the micro-architecture and instruction timings of most Intel, AMD and VIA processors, and details about different compilers and calling conventions. 



For more information don't forget to check the site         

May 8, 2014

10 ready coded HTML UI kits


1. Flat design UI – HTML5 + CSS3

This is a free flat design UI kit where you will find the HTML5 and CSS3 codes for free.

2. Responsive Flat UI kit – HTML

This UI kit allows you to work alongside the latest version of Bootstrap.

3. Light UI Kit in CSS & HTML

If it's features that you want, this UI kit has plenty to offer.

4. Bootflat – Flat UI kit for Bootstrap

BOOTFLAT is an open source Flat UI KIT based on Bootstrap 3.1.1 CSS framework.

5. Free PSD & HTML Flat UI kit

This is a flat design UI kit that is available in both PSD and HTML forms to suit your needs.

6. Flat Admin UI kit

This is another flat UI kit that you can use. Unlike other options though, this one is meant especially for administrators.

7. Email UI kit Dashboard

This is a very useful UI kit that was first designed to be used for email user's interfaces. It has dashboard elements.

8. Free PSD/HTML Web UI Elements Kit

This is a web user interface that is available in PSD, HTML, CSS and jQuery formats.

9. Futurico UI HTML

This is a web user interface for designers and developers, which is based on the free version of the Futurico web UI.

10. Web UI CSS kit

A lightweight and modular front-end framework for developing fast and powerful web interfaces.

May 6, 2014

Hosting Websites on Google Drive

Almost everyone who owns a computer also owns at least one website these days. Be it personal or professional. There are a number of hosting services available on the web for us to host our websites but most of them cost money.  A simple and efficient way to host websites can be Google Drive. With its free storage space of up to 15 GB, you can host a fairly large website without any cost.
Google Drive can be used to host basic websites or even complex JavaScript-based web apps. You may publish any kind of static content on your website including HTML pages, images, CSS, icons, audio, video etc.
Note: However, Google Drive does not support web resources that make use of server-side scripting languages like PHP.
Here's how:
1)Create a public file folder.
2) Put your website i.e.the HTML, CSS, Javascript files inside it.
3)Open the HTML file and preview it.
4) Share the URL that looks like "www.googledrive.com/host/..." from the preview window.
To create a public folder:  For this, you simply need to go to folders, create a new folder, and rename it to whatever name you want. Following which, you select the checkbox next to the New folder. Click the "Sharing settings" icon. Then click "Change" and make your folder "Public on the web".


For more information don't forget to check the site...................