Sunday, June 30, 2019

High-Risk Vulnerabilities in iOS, Android Apps

Image result for High-Risk Vulnerabilities in iOS, Android Apps

The vast majority of mobile apps store data insecurely, according to Positive Technologies researchers who discovered high-risk security vulnerabilities in 38% of iOS apps and 43% of Android apps.
“But this difference is not significant, and the overall security level of mobile application clients for Android and iOS is roughly the same. About a third of all vulnerabilities on the client side for both platforms are high-risk ones,” according to the annual report Vulnerabilities and Threats in Mobile Applications, 2019.
Researchers analyzed mobile apps tested last year and found that 76% of mobile apps store data insecurely. While insecure data storage was the most common vulnerability, 89% of the vulnerabilities discovered could be exploited by malware.
“Developers pay painstaking attention to software design in order to give us a smooth and convenient experience. People gladly install mobile apps and provide personal information, but rarely stop to think about the security implications,” the report said.
Rooted and jailbroken devices had a higher risk of infection, even though malware has the ability to escalate privileges and access user data or even send data to the attackers if permission is granted.
“In 2018, mobile apps were downloaded onto user devices over 205 billion times. Developers pay painstaking attention to software design in order to give us a smooth and convenient experience and people gladly install mobile apps and provide personal information,” said Leigh-Anne Galloway, cyber-security resilience lead at Positive Technologies.
“However, an alarming number of apps are critically insecure, and far less developer attention is spent on solving that issue. Stealing data from a smartphone usually doesn’t even require physical access to the device.”
Mobile users are advised to pay closer attention when applications request access to phone functions or data because cyber-criminals rely on user’s inattention, which enables them to escalate privileges. Additionally, the report noted that "protection mechanisms are the weak spot in mobile applications. Most of the discovered vulnerabilities were introduced during the design stage and result from failure to 'think through' security-related questions."

command line arguments in java

command line arguments in java
Image result for command line arguments in java

Command line argument in Java. The command line argument is the argument passed to a program at the time when you run it. To access the command-line argument inside a java program is quite easy, they are stored as string in String array passed to the args parameter of main() method.

What is JS used for ?


Saturday, June 29, 2019

What is Python used for ?


Checked exceptions in java

Checked exceptions in java
Image result for checked exceptions in java
It is up to the programmers to be civilized, and specify or catch the exceptions. In Java exceptions under Error and Run time Exception classes are unchecked exceptions, everything else under throw able is checked. ... The compiler allows it to compile, because Arithmetic Exception is an unchecked exception.

Friday, June 28, 2019

Trojan Panda Banker / Zeus Panda

Trojan Panda Banker / Zeus Panda

Image result for Trojan Panda Banker / Zeus Panda

This latest computer virus is very much identical to top computer virus Zeus banking trojan malware. It’s a malware that uses web to inject malware and to steal users banking information and credentials.
It basically is distributed through exploit kits, such as Ngler exploit kit, Nuclear exploit kit, and Neutrino exploit kit.
Not only from exploit kits, this is spread through social networking sites, spam emails, and adult sites as well.
After getting installed on system, it starts searching for the information such as antivirus, spyware, username, password, etc. This information is passed on to C2 server. And, once this is done, it starts to steal banking credentials, transaction information and other info as well.
– Regular backup of important data and files.
– Update operating system and applications.
– Block attachments of file types,

Thanatos Ransomware

Thanatos Ransomware

It’s a new computer virus named ‘Thanatos’, which is distributed through malvertisements, spam emails with malicious attachments and file types, etc. This is very similar to most famous computer virus that is ILOVEYOU computer virus.
The most complicated part is to decrypt the data been encrypted by this ransomware. This is because, it generates different keys every time for encryption and does not save these keys anywhere making it difficult to recover.
top computer virus
After this, it drops payload in user’s system in form of .exe file or .txt file, which is set for auto run and opens every time the system is restarted. This payload starts encrypting files and add ‘.thanatos’ extension to encrypted files. Soon, user receives a ransom pay message on its system.
– Disable macros and Activex when using MS Office products.
– Keep a regular backup of data and files.
– Update operating system and applications.

Thursday, June 27, 2019

Is the CCNA Security Worth It


Is the CCNA Security Worth It?

When it comes down to taking any IT or cyber security certification, people will at some point ask themselves if the certification is really worth the time and effort that it takes to pass the exam.  While most people in the cyber security field have heard of the very popular Cisco Certified Network Associate (CCNA), many people don’t know that this certification actually consists of many different tracks.  What that means is that you can earn a CCNA certification in a variety of disciplines.
While the most common CCNA track is certainly Routing and Switching, one of the other very common tracks is Security.  Many people ask if the CCNA Security certification is of value and worth the time and investment required.
Is the Cisco CCNA Security certification worth it? The Cisco CCNA Security certification is worth the effort if you currently have or intend to have a career in computer networking, regardless of whether your company uses Cisco products.  This is especially true if your position involves security tasks.
While that may seem straightforward, you may wonder why the CCNA Security exam is worth the time and effort you would need to put into it, and if it’s the best choice for networking and security professionals, especially if you don’t work in a Cisco environment.  Let’s look at a few of the reasons why I recommend the CCNA Security as a certification for current and future networking professionals.
Experience Recommended for CCNA Security
Most exams that you will look at in the field will have a recommended amount of experience you should have before sitting for an exam. While Cisco doesn’t explicitly state that you need prior experience besides the CCENT, CCNA Routing and Switching (routing and switching), or any CCIE certification, I recommend that you have around two years of experience, whether that be through prior work experience of schooling. This will provide you with a decent background of knowledge including knowledge of things such as the TCP/IP and OSI models basic routing protocols.
Prerequisites for the CCNA Security Exam
One thing that makes the CCNA Security exam stand out is that you must have other certifications to take the exam. The certifications that you can hold to qualify to take the CCNA Security exam is the CCENT, CCNA Routing and Switching, or any CCIE exam.  You’ll notice from this prerequisite requirement that Cisco wants to make sure you’ve been down the routing and switching track before you venture over into the security realm (unless of course they see you as an expert in Cisco technology with the CCIE.)  We can assume that this is because you’ll need a solid base of networking knowledge, on which routing and switching is built, before you can apply security to that network.
CCNA Security is Only One Exam
One factor that the CCNA Security has over some other CCNA flavors is that you only need to take one exam to get your certification. While this may require more studying at one time than a two-exam certification, it is still very manageable. It is also a big relief for me because I will have the certification once I pass the first exam, rather than having to go in to take the next half.  This is why we always recommend cyber security beginners go after certifications that only require one exam, as this moves you that much faster into a certified status, which can help open up employment and internship opportunities faster than if you had to take multiple exams to earn a certification.
CCNA Security is Reasonably Priced
For those on a short budget, in college, or just starting out in the field, the cost of the CCNA Security exam might be a turn-off, but in relation to other exams, it is reasonably priced. The current cost of the CCNA Security exam is $300, which is on average with most intermediate level certification in the cybersecurity field (consider for example that the Certified Ethical Hacker certification can cost around $1,200.) The price of the exam will be more than worth it though if you decide to pursue a job in cyber security or network security.
CCNA Security is Recognized by the U.S. Government
When looking at the value of a certification, you should see if it is accepted by the United States government, especially if you are in or are attempting to enter into government-related cyber security work.   Employers tend to value certifications that are recognized by the U.S. federal government more than similar certifications that are not. The U.S. Department of Defense (DoD) created the 8570 directive which provides guidance for the training, certification, and management of the DoD workforce.  The DoD has approved the CCNA Security certification as an Information Assurance Technical (IAT) level one and two. The CCNA Security certification is also recognized by the NSA and Committee on National Security Systems (CNSS) as a CNSS 4011 training standard, a national training standard for information systems security professionals.  These are all very good things for you if you choose to pursue the CCNA Security, even if you’re not planning on working with the government or with a government contracting agency.
How Long Will It Take to Learn CCNA Security?
You may be wondering what the expected timeline is to earn the Cisco CCNA Security certification.  This is all up to how much time you can dedicate to studying, your knowledge retention, previous knowledge, and if you are focused on getting the CCNA Security certification or are dedicating a lot of your time to work and therefore have to balance your study time.
If you are thinking about sitting for this exam and you already have a Cisco CNA Routing and Switching certification, you should give yourself a minimum of 2 months’ worth of studying to prepare. If you have previous experience in the field, you might be able to get away with less, but I highly recommend setting aside enough time you think you need plus 2 or 3 weeks.
For those that only have the CCENT, I recommend that you focus on studying for the CCNA Routing and Switching before going for this exam. If you want to go directly for the CCNA Security certification with only a CCENT, you should set aside around 3 – 4 months to study the material. There are multiple studying mediums and finding the one best for you will make this process much smoother. There is plenty of material out there for you to study on any platform. You can even buy a CCNA Security lab kit for around $1,000 to do the physical configurations, but of course your best option is to get hands-on with live Cisco equipment if you have that option.
What to Expect On The CCNA Security Exam
Cisco, like most other companies, creates the exam topics which will be in their exam at their own direction.  Cisco claims that the CCNA Security exam has seven topics areas or domains: security concepts, secure access, VPN, secure routing and switching, Cisco firewall technologies, IPS, and content and endpoint security. Within these exam topic areas, there are of course many more sub-topics which give you a general basis of what to expect. Each of these includes different security controls that you will have to know about and also know how to implement them onto Cisco equipment. The exam consists of 60 – 70 questions with a time limit of 90 minutes.  Cisco does not reveal what the point values are for each exam question, and you should also keep in mind that a few questions that you’ve seen will be simulations or even tester questions that may not even be scored.
CCNA Security Salaries
When it comes to figuring out how much a certification is worth, it’s important to see how much it could increase your salary or the salary that you could command in the open job market.  According to the U.S. Bureau of Labor Statics, a network architect can make a little bit over $100,000 in many parts of the country. This all depends on where you get a job, the amount of experience that you have and how valuable you are to their company, based on your skill set and their particular needs. More realistically speaking, you will probably earn around $80,000 if you decide to get a job in that field, once you’ve built established experience and have certifications to support that knowledge.
While the CCNA Security might not directly increase your salary, it will, however, increase your perceived value to a corporation. Having the CCNA Security certification will also help to give you an edge over your peers because it combines knowledge of CCNA Routing and Switching in addition to how to implement proper security controls on that equipment.
Is the Cisco CCNA Security Hard?
Is the Cisco CCNA Security Hard?  The Cisco CCNA Security certification is a difficult intermediate-level certification because it requires solid knowledge of routing and switching network configurations in addition to network security concepts, which must be configured on Cisco equipment in a practical manner.
The CCNA Security is regarded as being rather difficult, and in fact just as difficult as the CCNP Routing and Switching exam. This is because of the level of the exams; you need to know the fundamentals which you learn in for the CCNA Routing and Switching exam for both exams.
 Is the Cisco CCNA Security Harder than the CCNA?
Is the Cisco CCNA Security Harder Than The CCNA?  The CCNA Security certification is more difficult than the Cisco CCNA because it builds on the routing and switching knowledge covered in the CCNA exam and applies security principles to those concepts.  Candidates must have routing and switching knowledge before they can sit for the CCNA Security exam.
With the CCNA Security exam being on par with the CCNP Routing and Switching exam, even people that have been working with Cisco equipment for 5 or more years have still struggled to pass this exam. It is a difficult exam and one that you need a large amount of time to learn every detail about the exam topics. As mentioned before, I would recommend setting up either a physical lab to help prepare yourself with the configurations.
How Does CCNA Security Compare to Similar Exams?
Like most other CCNA exams, the CCNA Security includes having a base knowledge level of CCNA Routing and Switching because it is the base where each pathway stems from. While most other flavors of the CCNA will include bits of security, the CCNA Security differs from those because it focuses on security above everything else. You will still have to know how to set up and configure basic networks, but the focus is on security controls and how to implement them properly.
CCNA Security’s Value
If you have ever looked at networking jobs, you will see a very common trend among employers, which is that they often want someone with a Cisco CCNA. The problem with the CCNA Security certification is that it is not as well known as the CCNA Routing and Switching certification. With that being said, it is still a highly valued certification that is backed by Cisco and similar enough to the standard CCNA Routing and Switching certification.  It also tends to be a better door opener for networking positions than the CompTIA Security+ exam because it includes implementation of the security control you need to know for CompTIA Security+ exam in addition to the configuration of equipment.  This practicality makes the exam more valuable in many employers eyes than the theoretical nature of the CompTIA Security+.  Also, with the CCNA Security being recognized by the U.S. government (the Security+ is as well), it further increases the value is holds within the networking field.



Wednesday, June 26, 2019

Use the Format Painter

Format Painter
Use the Format Painter on the Home tab to quickly apply the same formatting, such as color, font style and size, and border style, to multiple pieces of text or graphics. The format painter lets you copy all of the formatting from one object and apply it to another one – think of it as copying and pasting for formatting.
  1. Select the text or graphic that has the formatting that you want to copy.
  2. On the Home tab, click Format Painter.
    Format Painter
    The pointer changes to a paintbrush icon.
  3. Use the brush to paint over a selection of text or graphics to apply the formatting. This only works once. To change the format of multiple selections in your document, you must first double-click Format Painter.
  4. To stop formatting, press ESC.

Magniber Ransomware

Magniber Ransomware

Image result for Magniber Ransomware

This latest computer virus is mostly active in Asian countries. Magniber is spread through malvertisements, infected websites that redirects user to Magnitude exploit kit page. It is the oldest serving malicious browser toolkit that is still in use to distribute the ransomware.
As soon as Magniber enters into the system, it starts encrypting the data and files with the use of a unique key. Once encrypted, it adds the .dyaaghemy extension to all the files encrypted.
– Regular backup of data and files.
– Update operating system and applications.
– Block the file extensions 

Kuik Adware

Kuik Adware

Image result for kuik adware

This is one of the top computer virus in the form of a malware & adware dubbed as ‘Kuik’. It acts as legitimate Adobe Flash Player update by masking itself.
This dangerous computer virus comes with three modules that are legitimate flash player, certificate and .exe file named ‘upp.exe’.
Once the virus enters in system, it communicates with all established network interface and adds the DNS 18.219.162.248.
After this, it starts collecting personal information and data from the user’s system and forwards it to the hosting domain ‘kuikdelivery.com’. As soon as the information reaches domain server, it activates various other malicious tasks on system that also includes chrome extension from unknown sources, coin miners, etc.
– Regular backup of important data and files.
– Enable authentic antivirus and spyware.
– Restrict from spam emails and also from attachments of file types,

Monday, June 24, 2019

Format Worksheet Tabs

Format Worksheet Tabs
Image result for Format Worksheet Tabs

To change worksheet tab color in Excel, select the worksheet tab whose tab color you wish to change. Then click the “Format” button in the “Cells” button group. Then roll your mouse pointer down to the “Tab Color” command. In the side menu that appears, then click the color you want to apply to the worksheet tab.

Difference between struture and union in C Language









STRUCTURES
UNION
Struct keyword is used to declare the structure
Union keyword is used to declare the Union
Structure variable will allocate memory for all the structure members separately.
Union variable will allocate common memory for all the union members.
Example:
struct Employee{

int age;

char name[50];

float salary;

};
Example:
union Employee{

int age;

char name[50];

float salary;

};
Structures will occupy more memory space.Memory_Size = addition of all the structure members sizes.
Memory_Size = int + char array [50] + float
Memory_Size = 2 + 50 + 4 Bytes
Memory_Size = 56 Byte
Union will occupy less memory space compared to structures.Memory_Size = Size of the largest Union member. From the above example, Largest Union member is char array so, Memory_Size = 50 Bytes
It allows us to access any or all the members at any time.
It allows us to access only one union member at a time.
C Program to find Difference between Structure and Union
In this program, we are going to declare the structure and union with same data type members and then we are going to calculate the size of union and structure using sizeof function.
CODE
/* C Program to find difference between Structure and Union */
#include <stdio.h>

struct Employee
{
  int age; 
  char Name[50];
  char Department[20];
  float Salary;
};

union Person
{
  int ag; 
  char Nam[50];
  char Departent[20];
  float Salar;
};

int main()
{
  struct Employee emp1;
  union Person Person1;
   
  printf(" The Size of Employee Structure = %d\n", sizeof (emp1) );
  printf(" The Size of Person Union = %d\n", sizeof (Person1));

  return 0;
}


Customize the Quick Access Toolbar

Customize the Quick Access Toolbar

Image result for Customize the Quick Access Toolbar
Change the order of the commands on the Quick Access Toolbar
  1. Right-click the Quick Access Toolbar, and then click Customize the Quick Access Toolbar on the shortcut menu.
  2. Under Customize Quick Access Toolbar, click the command you want to move, and then click the Move Up or Move Down arrow.

Friday, June 21, 2019

Trojan Glupteba

Trojan Glupteba

This is one of the worst computer virus that has several variants with different functionalities.
This trojan reaches the system through a file dropped by other malware or by exploit kits. It activates as a service and enables processes on the system pretending to be a legit or authentic software. Glupteba directly communicates to IP addresses and ports to collect user’s information. It diverts the traffic and users towards various unknown domains such as ostdownload.xyz, travelsreview.wo, rldbigdesign.website, sportpics.xyzkinosport.top.
top computer virus
– Enable web and email filters.
– Restrict macros in Microsoft Office products.
– Practice safe browsing.

Difference between Array and Arraylist

Array Vs Array List In Java :




Array
Array List
Arrays are static in nature. Arrays are fixed length data structures. You can’t change their size once they are created.

Array List is dynamic in nature. Its size is automatically increased if you add elements beyond its capacity.


Arrays can hold both primitives as well as objects.


Array List can hold only objects.
Arrays can be iterated only through for loop or for-each loop.


Array List provides iterators to iterate through their elements.
The size of an array is checked using length attribute.
The size of an Array List can be checked using size() method.
Array gives constant time performance for both add and get operations.


Array List  also gives constant time performance for both add and get operations provided adding an element doesn’t trigger resize.

Arrays don’t support generics.
Array List supports generics.

Arrays are not type safe.
Array List are type safe.

Arrays can be multi-dimensional.
Array List can’t be multi-dimensional.

Elements are added using assignment operator.
Elements are added using add() method.

Which Python course is best for beginners?

Level Up Your Python Prowess: Newbie Ninjas: Don't fret, little grasshoppers! Courses like "Learn Python 3" on Codecade...