Posts

Showing posts from 2021

Data Analyst Vs Business Analyst Vs Data Engineer Vs BI Specialist

Image
  Data Science - Complete Track • Step 1 - Identify the business problem/value addition/question – ( Data Insights ) this has to be the starting point. • Step 2 - Data availability ( Data Governance ) - Have the structure of your data set defined – The real challenge starts here-                o Do we have the data?                o Do we have access to the required data? • Step 3 -Getting Data ( Data Mining / Data Pipeline ) – How to collect the data from different sources in the system • Step 4 - Data preparation (ETL / ELT) – Once you have data there will be lot of cleaning and preparation required, reduce/increase/combine/split the predictors, determine and eliminate outliers, populate missing values convert few categorical variables into numerical etc. • Step 5 –Exploratory Data Analysis (EDA) – In this step we do descriptive and diagnostic analysis of the existing data. We build multiple graphs that give us direction towards the next steps of predictive analytics. We migh

How to Start a Cyber Security Career

Image
  What is Cybersecurity? Cybersecurity is a practice of protecting the systems, networks from digital attacks. Now that many of the companies, financial sectors, government organizations are looking forward to protecting their data from hackers or cybercriminals .  These attacks must be handled by engineers, pen testers, security testers and other professionals to prevent the attack.  Why Cybersecurity is important? Cybersecurity is important across different sectors such as government organizations, startups, mid and large enterprises and even for personal use. But why do think security is very important? Gone are the days of simple firewalls and antivirus software being your sole security measures.  Cyber threats can come at any level of your organization So, educating your employees about simple scams like phishing, ransomware attacks or other malware designed to steal intellectual property or personal data.  Cybersecurity risk is increasing and without its help, your organiz

PASSIVE Vs ACTIVE INFORMATION GATHERING FOR WEBSITE RELIABILITY

Image
  Information Gathering is the First Step of Ethical Hacking. Penetration Tester or even Hackers Gather Information on their target victims.  Every Attack Begins with Information Gathering. There are two types of Information Gathering that anyone can perform: Active Information Gathering Passive Information Gathering Passive Information Gathering Passive Information Gathering is when anyone gather information about a target without directly interacting with the target.  This means that anyone do not send any type of request to the target and therefore the target has no way of knowing that anyone is gathering information on them.  Generally passive information gathering uses public resources that have information on that target. Using public resources to gather information is called Open source intelligence (OSINT).  Using OSINT anyone can gather things such as: Victim IP addresses Domain Name Information Technologies used by the website/web applications Other websites on the same serve

First Commands After Installing Kali Linux

Image
IMPORTANT POINTS TO BE NOTED: Sudo stands for either “substitute user do” or “super user do” "root" (aka "superuser") is the name of the system administrator account. Root user has user id 0 and nominally has unlimited privileges. Root can access any file, run any program, execute any system call, and modify any setting. The "sudo" command lets you execute commands with superuser privileges as long as your user id is in the sudoers file, giving you the necessary authorization. Enable Root Login and Set Kali Root Password: Check Login User                                                   whoami                                                   sudo apt update                                                   sudo apt install kali-root-login Login as Root in the Terminal                                                   sudo -i Check Login User Again                                      whoami Set the Kali Linux Root Password                         

Windows Like Linux

Image
  Windowsfx 11 Windows Like Linux A whole Linux Flavored like Windows 11 Meet The “Unique Linux OS” That Looks Shockingly Similar To “Windows 11” Its a g ateway into “ Linux for Windows users” , or merely an “ Ubuntu clone” with a clever Windows skin ! For the most part, it honestly feels like using Windows 11 until anyone start digging deep into customization menus or the bundled software store. Windowsfx 11 Characteristics: Kernel Linux 5.11 LTS. Base package: Ubuntu 20.04 LTS Neon. Desktop environment: KDE Plasma / Cinnamon / WxDesktop Windows executable support: Fx (build) Wine 6 for .exe and .msi. Tema: Linuxfx WxDesktop Windows 11 Theme. Voice assistants: Helloa and Google. Windowsfx 11 Versions: There are two different versions anyone can use, the free or the professional version .  The free edition includes all operational features and a 30-day trial of  all WxDesktop resources .  The professional edition ($20) includes: All operational features. WxDesktop system settings and

Wireshark and its Filters

Image
  Powerful Wireshark Filters ip.addr == x.x.x.x ip.src == x.x.x.x ip.dst == x.x.x.x ip.addr == x.x.x.x && ip.addr == x.x.x.x  ip.src == xxxx && ip.dst == xxxx http or dns tcp.port==xxx udp.port==xxx tcp.srcport==80 && tcp.dstport==80 tcp contains xxx e.g.   tcp contains google http.request tcp.port eq 25 or icmp

what is a port in network?

Image
  A port is a virtual point where network connections start and end.  Ports are software-based and managed by a computer's operating system .  A port is associated with a specific process or service (Internet Browsing, Email, VoIP etc.) Ports allow a single host  with a single IP address to run network services.  Each port number identifies a distinct service . Each host can have 65535 ports per IP address.  Ports are regulated by the Internet Corporation for Assigning Names and Numbers ( ICANN ).  By ICANN there are three categories for ports: From 0 to 1023 – well known ports assigned to common protocols and services From 1024 to 49151 – registered ports assigned by ICANN to a specific service From 49152 to 65 535 – dynamic (private, high) ports range from 49,152 to 65,535. Ports can be used by any service on an ad hoc basis .  Ports are assigned when a session is  established , and released when the session ends. Well-Known Ports Are:

OSI MODEL Vs TCP-IP MODEL

Image
TCP/IP and OSI are the 2 most widely used networking models for communication.  OSI is a conceptual model which is not practically used for communication. TCP/IP is used for establishing a connection and communicating through the network. OSI model mainly emphasis on the services, interfaces and protocols . TCP model is not able to distinctly describe the above concepts. TCP/IP enables  Only connectionless ( UDP ) communication mode in the network layer . Connectionless ( UDP ) and connection-oriented ( TCP ) in the transport layer . OSI model enables Supports UDP and TCP communication over the network layer . In Transport layer, TCP communication is merely allowed.

Life-Saving Covid Treatment

Image
  What is a monoclonal antibody and how does it work? The body’s immune system generates antibodies — specific protein molecules — as a defense mechanism against unfamiliar molecules, called antigens. Molecules from pathogens like bacteria and viruses can act as antigens, prompting the production of antibodies that bind to antigens. This tells specialized cells of the immune system to kill the invading pathogen. Monoclonal antibodies work specifically against a particular portion on an antigen called the epitope, thereby exerting very targeted action. The Role of Antigens & Antibodies in Vaccinations Vaccines contain antigens which stimulate the B lymphocytes of the immune system to respond by producing plasma cells which secrete disease specific antibodies. Some of the B cells become memory B cells , which will recognize future exposure to the disease. This results in a faster and more intense production of antibodies, which effectively work to eliminate the diseas

Covid 19 Rapid Antigen Test Kit

Image
  Antibody tests are useful to help track the spread of a contagious disease , disease that is readily spread. It can be very useful to identify those who should be vaccinated urgently, and to select the donors for convalescent plasma therapy. Antigens are molecules capable of stimulating or encouraging an immune system response. Each antigen has distinct surface features or structures called epitopes, generating specific responses. What are Antibody and Antigen ? An antibody (Ab), also known as an immunoglobulin (Ig), is a large, Y-shaped protein used by the immune system to identify and remove foreign objects such as pathogenic bacteria and viruses.  These antibodies are produced by B cells of the immune system due to exposure to antigens. Each antibody contains a paratope which recognizes a specific 'epitope' on an antigen, acting like a lock and key binding mechanism. This binding makes possible to eliminate antigens from the body, either by direct neutralization or by ‘tag