Posts

Understanding AWS WAF

Image
     AWS WAF is a web application firewall that helps protect your web applications or APIs against common web exploits that may affect availability, compromise security, or consume excessive resources. AWS WAF allows you to create rules to filter web traffic based on conditions that you define. AWS WAF operates by inspecting incoming web requests to your applications and comparing them against the configured rules. When a request matches a rule, AWS WAF takes the specified action, which could be allowing the request, blocking it, or counting it for further analysis. By continuously monitoring and updating your rules, you can adapt to evolving threats and ensure the security of your web applications. There are numerous advantages to incorporating AWS WAF into your security strategy: Enhanced Security : AWS WAF offers a multi-layered defense, protecting your applications from various attack vectors. Reduced Complexity : AWS Managed Rules provide pre-configured security rules that you ca

What is Fringe Science?

Image
     Fringe science is a branch of science that departs from the mounted clinical theories. Unlike pseudo-science , it nevertheless makes use of the clinical method, however is notably speculative. Fringe science has its foundation in mounted science , however explores and research regions on the very boundaries, and is frequently poorly funded and under-resourced. Whilst fringe science commonly leads upon a street to nowhere, once in a while a department blossoms into a totally established field, and can even result in a   paradigm shift . Chaos concept operated on the edge of well-known physics, the use of computer systems and era begged, borrowed or stolen from different departments. The younger scientists who labored upon it had been instructed that they could have problem locating funding, that different physicists could refuse to study their work, and they could by no means flow upwards. Fortunately, they persisted and arrived at a concept, that's extensively well-known

What is Digital Forensics?

Image
     Digital forensics or digital forensic science is a branch of forensic science focused on the recovery and investigation of material found in digital devices and cybercrimes.  Rapid technological development has given rise to cybercrimes. More often than not, criminals use technology in planning and committing other kinds of crime. Computers, smartphones, flash drives, and cloud data storage are among many types of devices that keep digital evidence.  The main application of forensics is the analysis and investigation of events that include computer information as an object of an attack, a computer as a tool of committing a crime, and collecting, storing, and protecting any digital evidence. Digital forensics investigations commonly consist of four stages: Seizure : Prior to actual examination digital media is seized. In criminal cases, this will be performed by law enforcement personnel to preserve the chain of custody. Acquisition : Once exhibits are seized, a forensic duplicate

Brief Introduction to Image Segmentation

Image
    Image segmentation  is a technical process which can divide an  image  into regions with certain and special characteristics and extract the objectives interested from them.  Image segmentation is typically used to locate objects and  boundaries  (lines, curves, etc.) in images.  More precisely,   image segmentation is the process of assigning a label to every pixel in an image such that    pixels with the same label fall under a category where they have some or the other thing common in them.      Segmentation in Image Processing is being used in the medical industry for efficient and faster diagnosis, detecting diseases, tumors, and cell and tissue patterns from various medical imagery generated from radiography, MRI, endoscopy, thermography, ultrasonography, etc. Also  i mage segmentation has a massive application area in robotics, like RPA, self-driving cars, etc. Security images can be processed to detect harmful objects, threats, people and incidents using image segmentation.

Reinforcement Learning

Image
      Reinforcement Learning(RL) is a type of machine learning technique that enables an agent to learn in an interactive environment by trial and error using feedback from its own actions and experiences.  Though both supervised and reinforcement learning use mapping between input and output, unlike supervised learning where feedback provided to the agent is correct set of actions for performing a task, reinforcement learning uses rewards and punishment as signals for positive and negative behavior.      As compared to unsupervised learning, reinforcement learning is different in terms of goals. While the goal in unsupervised learning is to find similarities and differences between data points, in reinforcement learning the goal is to find a suitable action model that would maximize the total cumulative reward of the agent. The figure below represents the basic idea and elements involved in a reinforcement learning model. Here are some important terms used in Reinforcement AI: Agent: 

Diffie–Hellman Key Exchange

Image
Traditional secret/single key cryptography uses one key that is shared by both sender and the receiver. But if this key is disclosed, all the communications are compromised. One of the solution to this problem is Diffie-Hellman key exchange. The Diffie-Hellman Key Exchange Protocol is a key agreement protocol that allows authenticated parties to exchange keying material over an unsecured connection. This protocol is widely used in protocols like IPSec and SSL/TLS. Using this protocol, sending and receiving devices in a network derive a secret shared key using which data can be encrypted. To implement Diffie-Hellman, the two end users A and B, while communicating over a channel they know to be private, mutually agree on positive whole numbers  p  and  q , such that  p  is a  prime number  and  q  is a generator of  p . The generator  q  is a number that, when raised to positive whole-number powers less than  p , never produces the same result for any two such whole numbers. The v

Time Travel

Image
    Time travel has been a popular topic for science fictions, films & TV series for decades. Before going to the time travel topic we should understand what is meant by the time.  While most people think of time as a constant, physicist  Albert Einstein   showed that time is an illusion.  Einstein's theory of special relativity says that time slows down or speeds up depending on how fast you move relative to something else. According to most of the scientist t ravel into the past is probably impossible. Even if it were possible, Hawking and others have argued that you could never travel back before the moment your time machine was built.       The easiest and most practical way to get to the far future is to go fast. According to Einstein’s theory of special relativity,  if one were to leave Earth in a spacecraft travelling at an appreciable fraction of light-speed, turn around and come back, only a few years might have passed on board but many years could have gone

Cyber Security

Image
   What is Cyber-Security? Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks. A successful cyber security approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks. Elements of Cyber-Security Ensuring cybersecurity requires the coordination of efforts throughout an information system, which includes: Network security includes activities to protect the usability, reliability, integrity and safety of the network. Effective network security targets a variety of threats and stops them from entering or spreading on the network. Application security  focuses on keeping software and devices free of threats. A compromised application could provide a

What is Ethernet?

Image
     Ethernet is a certain type of a local area network (LAN) which was developed in 1972 in the renowned PARC-research facility of Xerox in Palo Alto by Robert Metcalfe.  Ethernet is a standard communications protocol used to connect devices including computers, routers, and switches in a wired or wireless network. As a  data-link layer  protocol in the TCP/IP stack, Ethernet describes how network devices can format and transmit data packets so other devices on the same local or campus area network segment can recognize , receive and process them.         Ethernet was originally standardized as IEEE 802.3 with a data transmission rate of 10 Mb/s. Newer versions of Ethernet were introduced lately to offer higher data rates.  In  today's Gigabit Ethernet supports speeds of up to 1,000 Mbps. Though it's currently limited to businesses on the cutting edge of the tech world, 10 Gigabit Ethernet with speeds of up to 10,000 Mbps is also on the way.  The basic terminologies used

What is Quantum Computing?

Image
T he field of quantum computing was initiated by the work of  Paul Benioff  and  Yuri Manin  in 1980,  Richard Feynman  in 1982, and  David Deutsch  in 1985.The typical computer uses a series of zeros and ones to communicate information. While today's computers are quite powerful, they still have considerable limitations that make it difficult to process challenging machine-learning problems. In quantum computing, a qubit (short for quantum bit) is a unit of quantum information—similar to a classical bit. Where classical bits hold a single binary value such as a 0 or 1, a qubit can hold both values at the same time in what's known as a superposition state. When multiple qubits act coherently, they can process multiple options simultaneously. This allows them to process information in a fraction of the time it would take even the fastest nonquantum systems.   We can ready for the quantum era by becoming a quantum developer. By learning a quantum-focused programming