Programming Learning Management System

Learning Management System

This project works as a learning management system where you can have below options, at the end of this post I have attached the GIT location for the source code. Creating a Student / Teacher Create exams Creating Quizzes and assign to Exams Assigning Exams to Students Managing Profile Facing Examinations High Level Architecture of …

Read Article Read More

Java Dynamic Triangle in a Circle

Dynamic Triangle in a Circle

“Draw a circle with three random points on the circle” is a very famous assignment in your university or school. the scenario as below, Draw a circle with three random points on the circle. Connect the points to form a triangle. Display the angles in the triangle. Use the mouse to drag a point along …

Read Article Read More

Information Security SSL/TLS

SSL/TLS

The SSL (Secure Sockets Layer) or know as TLS (Transport Layer Security) is a building block and not just a standalone application. It is the foundation for secure communication in a lot of networked applications. Netscape Communications developed the SSL originally. In 1995, version 2.0 was released and the first version made available publicly. In …

Read Article Read More

Information Security Asymmetric-key Cryptography (Public Key Encryption)

Asymmetric-key Cryptography (Public Key Encryption)

Asymmetric key encryption is a cryptographic system that uses pairs of keys. Public keys can be distributed widely. Private keys can only be known to the owner. This achieves encryption and authentication, where the public key verifies a holder of the paired private key. Any user can encrypt a message by using the receiver’s public …

Read Article Read More

Information Security Symmetric-Key Cryptography (Private Key Encryption)

Symmetric-Key Cryptography (Private Key Encryption)

Symmetric key encryption is the oldest and best-known technique. It can be utilized to secure communication between two or more parties with a shared same secret key. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the …

Read Article Read More

Information Security Cryptography

Cryptography

It is the study and practice of secure communication against the third party attackers. Cryptography is used to inventing and analyzing protocols that stopped third parties from accessing the transmitted messages. It is fulfilling the below functions. Confidentiality – The information in the message can access only to people who are authorized to access it. …

Read Article Read More

Application Security SQL Injection

SQL Injection

This article shows you another popular attack on websites and APIs today with relevant simple examples. Furthermore, you can learn how to identify and how to prevent SQL Injection attacks. What is SQL Injection SQL injection is a Web security vulnerability that facilitates an attacker to modify the SQL queries that an application sends to …

Read Article Read More

Application Security Cross-site request forgery (CSRF or XSRF)

Cross-site request forgery (CSRF or XSRF)

Cross-site request forgery, known as CSRF, XSRF, Sea Surf or Session Riding is also one of famous web security vulnerability which facilitates attacker to gain over fully access victims’ account when the user logged in particular account like Online Banking, otherwise can define as it attacks a web application in which they’re currently authenticated. The …

Read Article Read More

Application Security Cross-site scripting (XSS)

Cross-site scripting (XSS)

Cross-site scripting we known as XSS is a one of famous web security vulnerability which facilitates attacker or the hacker to compromise users those who are working with vulnerable applications. Basically it allows an attacker to run their bad script or malicious code on our web browser or the web application. XSS usually allows access …

Read Article Read More