Posts

Showing posts from March, 2017

Note - Google cookies

1.Preference            Most Google will have preference cookie called "NID"  in their browser. A browser sends NID to Google sites and there is an ID in it. and it helps to keep a track of the languages we use and some activities we do.   2.Security            Security cookie for authenticate users and prevent fraudulent use of login and protect user data from unauthenticated parties. 3.Process            Make website work and deliver services that website visitors expect. 4.Advertising            Help to customize ads on Google properties.  5.Session state 6.Analytics            Google's analytics tool that helps website and app owners to understand how their visitors engage with their properties. content - Google_cookies

Note - Servelets and JSPs

Request - response model Cleint is basically something or some one who is requesting for some resource. Server is basically a machine which serves the request.                         Client request for a static page and server serves a static page,cause webserver can serve only static HTML pages. Then to handle Dynamic requests? Here, Servelets come to the picture.                     Helper application for dynamic requests is nothing but a "Servelet". What is a web container?                      Client sends a GET request to the server and server sends a request to the servelet to build the dynamic page. Servlet is a special java programme which has no main method but call back methods.                 In the middle of the server and servlet there is  the web container as the bridge. Web container is a servlet engine and it helps web server to communicate with the servlet. And also it is responsible for the invoking methods on the servlet and servlets live and die

Note -Google user pattern recognition

Google uses pattern recognition to make the sense of image                        Facial detection is used and and this technology that helps Google to protect the privacy on services like Street View, where computers try to detect and then blur the faces of any people that may have been standing on the street as the Street View car drove by.                      It is also what helps services like Google+ photos suggest that when tagging a photo or video, since it seems like there might be a face present. Facial detection won’t tell  whose face it is, but it can help to find the faces in the photos. Google page

Note - Networking

Networking      Involves connecting computers to create a local area network. For sharing information and resources For sharing hardware and software For Provide centralized administration and support There are two major types of network LAN           In LAN there are several topologies. They are, Mesh topology Star topology             Advantages to the star topology are                     -central wiring hubs ease the task of managing moves , additions and changes                    -central cabling points provide faster troubleshooting                    -independent point to point links prevent cable problems on any given link from affecting other links                    -central equipment hubs can provide easier migration to new topologies                    -physical security Tree topology   Bus topology Ring topology     2. WAN MAC - Medium Access Control  ALOHA    Mainly used in satellite systems Simplest possible medium access protoc

Software Testing - session from TiQRI

The session on the web testing was on 25th(Saturday) March 2017, in the Computing department,Faculty of Engineering, University of Peradeniya. and we could have a basic idea of the web testing.

Note - Day 2 - Tangible hardware...

In a  computer ,physically connected to the computer , something tangible. full list of component of a computer chassis Disc drive : CD ROM,CD-RW,DVD,Blu-Ray Expansion card Fan Floppy Drive Hard Drive Mother Board Power Cable Power Supply Processor Includes or can install these components Flat Panel Display Monitor  Keyboard Mouse(coodless,foot mouse,intellimouse,j mouse,joystick,mechanical,optical,touch pad, touchball, touchpoint) printers scanner CD -ROM DVD CPU - brain of a computer HardDrive - storage of a computer Mother Board RAM - main memory ,primary memory, random access memory, system memory Sound card Video card modem(Internal,external,removable) NIC-network interface card (content was taken from "Learn computer in 30 days" in appstore)

Self satisfaction - collection of certificates and medals 😊

Image
The collection of certificates i have with me and when i see these.. it makes me feel better.here we ago... Medals-house meet certificates-2012 house meet certificates-2008 house meet certificates-2010 house meet championship cups-house meets- senior prefect in science section Left-colors from school Right-badge from Athletic society certificates-left-invited participation Right-primary school Medals-divisional meet certificate-divisional school meet 2006 certificate-divisional school meet 2007 certificates-divisional club meets 2008 certificate-divisional school meet 2009 certificates-divisional meets certificates-divisional school meet 2010 certificates-divisional school meet 2012 certificates - District meet-Milo Netball 2008,2009,2011 certificate-District club meet 2008 certificate- District youth club meet 2011

Note - Day 1 - Computer

Computer is a electronic device manipulates information or data. Also ability to store,retrieve and process data    Desktop computers    Laptop computers - battery or AC powered personal computers    Tablet computers    Servers - servers up information to other computers on a network Components basically specialized computers    Mobile phones    Game consoles    Tv Operating system is the most important software on a computer, manages computer's memory process and it's hardware and software. Mostly used operating systems are Mac OS , Windows and Linux. Personal computers are PC s typically include Windows operating system, introduced in 1981 and there are  client versions( for PCs,laptops,desktop computers) server versions(for servers) device versions(for mobile phones,appliances,embedded devices)  and also some versions which are canceled out. MAC computers use operating system,Mac OS X was introduced in 1984 and the powered by Apple. Mac OS 

Note - Java Collections

 A collection is an object that groups multiple elements into a single unit and used to store, retrieve,manipulate, and communicate aggregate data.  Collections framework Interfaces All the core collection interfaces are generic.     Set is a special kind of collection and that can not have duplicate elements.     List(sometimes called a sequence) can contain duplicate elements.     Queue -FIFO manner, and provides insertion, extraction and inspection operations     Deque - both FIFO and LIFO, and provides insertion, extraction and inspection operations     Map -  has key and values, can not contain duplicate values  Implementations Implements are the data objects used to store the collections.     General purpose implementations     Special purpose implementations     Concurrent implementations     Wrapper implementations     Convenient implementations     Abstract implementations Algorithms      Sorting      Shuffling      Routing Data Manipulation      Se

Note - Hijacking

Many web-based applications use session management and the sessions are stores on servers, is functioned with respective users by "session Id's". This is an attractive target for attackers by "Hijacking Users' ID's". There are three techniques employed by server to protect session ID's from these three attacks, 1.Interception 2.Prediction 3.Brute force attack and also another attack called "session fixation" is done and it is about the attacker fix user ID before user logs in. Three widely used methods for maintain sessions in web-environment 1.URL arguenments 2.Hidden form fields 3.Cookies "Cookies" is the most convenient and also least insure of the three. The most appealing method for attackers is making session IDs.In many cases, attacker manages to obtain a valid session ID to enter a session directly without user's suspicion. In browsers the session ID's are stored. then the attacker manages to gain access to the use

Satisfaction...collection of pencil arts-part 2

Image
All the pictures are drawn when i feel bored and when my mind force me to.. and there are few pictures , drew with the pen