Posts

Cyber Security : Intrusion Detection System(Snort, WireShark)

🔍 Understanding Intrusion Detection Systems: Snort and Wireshark In today’s digital world, cybersecurity plays a crucial role in protecting networks and data from unauthorized access. One of the most important tools in this field is the Intrusion Detection System (IDS) — a technology designed to monitor network traffic, detect suspicious activities, and alert administrators of potential attacks. 🛡️ What is an Intrusion Detection System (IDS)? An IDS analyzes network packets and system activities for signs of malicious behavior. It helps identify threats such as port scanning, DoS attacks, malware infections, and policy violations. IDS solutions can be network-based (NIDS), monitoring network traffic, or host-based (HIDS), which monitors activities on individual systems. 🐍 Snort: The Power of Open-Source Detection . Snort, developed by Cisco, is one of the most popular open-source IDS tools. It uses a rule-based detection engine to analyze network packets in real-time. Security p...

java.lang.NullPointerException: Attempt to invoke virtual method 'java.lang.String com.google.firebase.auth.FirebaseUser.getUid()' on a null object reference

Image
This error commonly occur in Firebase ,when we are tring to call the mAuth.getCurrentUser().getUid(); which is initialized otside the caller Function. To fix this error we have to initialize this" mAuth.getCurrentUser().getUid(); "inside the Caller Function. In my case if String id = mAuth.getCurrentUser().getUid(); is declared outside the mAuth.createUserWithEmailAndPassword(emaill,pass).addOnCompleteListener(new OnCompleteListener () { @Override public void onComplete(@NonNull Task task) { if(task.isSuccessful()) {}); function then....the Attempt to invoke virtual method ......error occur...

Multi-step Form

Image
Download Source code : https://github.com/janakbist/Multistep-Form Multi-step forms Unlike single-step forms, multi-step forms are exactly as they sound. They are innovative web forms with multiple steps. It doesn’t imply multiple form fields but sets of questions put together in separate steps or views. So, multi-step forms serve as interesting tools for customer engagement as it breaks down the form into smaller segments, to reduce the question overload for the visitor. It results in 86% higher conversions because it's practical yet simple and doesn’t intimidate the visitor with an overwhelming list of questions. Forms with multiple steps also help to secure and qualify quality leads because the forms are strategically designed to collect information over and above the generic single-step form queries. The latter doesn’t showcase visitor interest, nor does it provide relevant detail to qualify the prospect as an ideal lead. giosg blog - multi-step form example ...

Computer Graphics & Animation /BCA TU

Image
Computer Graphics It is a visual representation of anything on stone, paper or canvass to inform, to illustrate or to entertain. Graphics can be simple 2D scene including point, line, circle, polygons or can be complex 3D scenes.  It is started by Ivan Sutherland in 1970.   It is a field of computer science that deals with all aspects of producing graphics using a computer.   It is a process of creation, manipulation, and storage of graphical object using specialized S/W, and H/W tools.   A graphical object can be a simple 2D scene including point, line, circle, polygons or can be complex 3D animations.   Computer graphics can also be defined as : Data Structure + Graphics Algorithms + Graphical Languages = CG.  Data Structure:   It is used to store graphical object attributes such as color, coordinates, depth etc. o It can be simple array, tree, or octree or quad tree Graphics Algorithm   Methods to generate and manipulate graphical obj...
Image
BCA IV SEM PROJECT DETAILS    Click me

Procedural programming vs Object oriented programming

Image

SYSTEM ANALYSIS AND DESIGN

Image