<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: rakeshvngowda</title>
    <description>The latest articles on Forem by rakeshvngowda (@rakeshvngowda).</description>
    <link>https://forem.com/rakeshvngowda</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1116902%2Ffc77b363-f5ec-4e8c-846f-2ccab3788ec3.png</url>
      <title>Forem: rakeshvngowda</title>
      <link>https://forem.com/rakeshvngowda</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/rakeshvngowda"/>
    <language>en</language>
    <item>
      <title>SQL | DDL, DQL, DML, DCL and TCL Commands</title>
      <dc:creator>rakeshvngowda</dc:creator>
      <pubDate>Tue, 30 Apr 2024 15:18:57 +0000</pubDate>
      <link>https://forem.com/rakeshvngowda/sql-ddl-dql-dml-dcl-and-tcl-commands-4opc</link>
      <guid>https://forem.com/rakeshvngowda/sql-ddl-dql-dml-dcl-and-tcl-commands-4opc</guid>
      <description>&lt;h2&gt;
  
  
  SQL Overview
&lt;/h2&gt;

&lt;p&gt;SQL (Structured Query Language), We can use this language to create database. &lt;br&gt;
SQL contains commands like CREATE,DROP,INSERT, etc. to carry out required tasks&lt;/p&gt;

&lt;p&gt;SQL Commands are categorized into five types.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;DDL - Data definition Language&lt;/li&gt;
&lt;li&gt;DQL - Data Query Language.&lt;/li&gt;
&lt;li&gt;DML - Data Manipulation Language.&lt;/li&gt;
&lt;li&gt;DCL - Data Control Language.&lt;/li&gt;
&lt;li&gt;TCL - Transaction Control Language.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  DDL (Data Definition Language)
&lt;/h2&gt;

&lt;p&gt;List of DDL Commands&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;CREATE - the Command is used to create the database or its objects like (table, index, function, views, stored procedure, and triggers)&lt;/li&gt;
&lt;li&gt;DROP - This command is used to delete objects from the database.&lt;/li&gt;
&lt;li&gt;ALTER - This is used to alter the structure of the database.&lt;/li&gt;
&lt;li&gt;TRUNCATE - This is used to remove all recors from the table, includeing all spaces allocated for the recors are removed.&lt;/li&gt;
&lt;li&gt;COMMENT: This is used to add comments to the data dictionary.&lt;/li&gt;
&lt;li&gt;RENAME: This is used to rename an object existing in the database.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  DQL (Data Query Language)
&lt;/h2&gt;

&lt;p&gt;List of DQL Commands&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SELECT : It is used to retrieve data from the database.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  DML(Data Manipulation Language)
&lt;/h2&gt;

&lt;p&gt;Deals with manipulation of data present in the database&lt;/p&gt;

&lt;p&gt;List of DML commands: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;INSERT: It is used to insert data into a table.&lt;/li&gt;
&lt;li&gt;UPDATE: It is used to update existing data within a table.&lt;/li&gt;
&lt;li&gt;DELETE: It is used to delete records from a database table.&lt;/li&gt;
&lt;li&gt;LOCK: Table control concurrency.&lt;/li&gt;
&lt;li&gt;CALL: Call a PL/SQL or JAVA subprogram.&lt;/li&gt;
&lt;li&gt;EXPLAIN PLAN: It describes the access path to data.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  DCL (Data Control Language)
&lt;/h2&gt;

&lt;p&gt;DCL includes commands such as GRANT and REVOKE which mainly deal with the rights, permissions, and other controls of the database system. &lt;/p&gt;

&lt;p&gt;List of  DCL commands: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;GRANT: This command gives users access privileges to the database.&lt;/li&gt;
&lt;li&gt;REVOKE: This command withdraws the user’s access privileges given by using the GRANT command.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  TCL (Transaction Control Language)
&lt;/h2&gt;

&lt;p&gt;List of TCL Commands:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;BEGIN: Opens a Transaction.&lt;/li&gt;
&lt;li&gt;COMMIT: Commits a Transaction.&lt;/li&gt;
&lt;li&gt;ROLLBACK: Rollbacks a transaction in case of any error occurs&lt;/li&gt;
&lt;li&gt;SAVEPOINT: Sets a save point within a transaction.&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>sql</category>
      <category>database</category>
    </item>
    <item>
      <title>Data Types in Java</title>
      <dc:creator>rakeshvngowda</dc:creator>
      <pubDate>Sun, 25 Feb 2024 03:33:01 +0000</pubDate>
      <link>https://forem.com/rakeshvngowda/data-types-in-java-42ob</link>
      <guid>https://forem.com/rakeshvngowda/data-types-in-java-42ob</guid>
      <description>&lt;p&gt;Every variable in Java has a data type.Data types specify the size and type of values that can be stored in an identifier.&lt;/p&gt;

&lt;h2&gt;
  
  
  In Java Data types are classified into two categories.
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Primitive Data type(built-in data type).&lt;/li&gt;
&lt;li&gt;Non-Primitive Data type(reference data type).&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Primitive Data type.
&lt;/h2&gt;

&lt;p&gt;Java has 8 primitive data types&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Integer types&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;byte - 1byte(8-bits) value range from -128 to 127&lt;/li&gt;
&lt;li&gt;short - 2byte(16-bits) value -32768 to 32768&lt;/li&gt;
&lt;li&gt;int - 4bytes(32-bits) value from -2147483648 to 2147483647&lt;/li&gt;
&lt;li&gt;long - 8bytes(64-bits) value from -9,223,372,036,854,775,808 to 9,223,372,036,854,775,807
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;public class App 
{
   public static void main(String[] args) {
      // byte type
      byte b = 20;
      System.out.println("byte= "+b);

      // short type
      short s =20;
      System.out.println("short= "+s);

      //int type
      int i =20;
      System.out.println("int= "+i);

      // long type
      long l = 20;
      System.out.println("long= "+l);
   }

}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Floting types&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;float - 4byte(32-bits) float data type. ex: 0.3f&lt;/li&gt;
&lt;li&gt;double - 8byte (64-bits) float data type. ex: 11.123
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;public class App 
{
   public static void main(String[] args) {
      // float type
      float f = 20.25f;
      System.out.println("float= "+f);

      // double type
      double d = 20.25;
      System.out.println("double= "+d);
   }

}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Character Type&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;char - 2bytes(16bits) range from 0 to 65,535.&lt;/li&gt;
&lt;li&gt;boolean - true or false.
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;public class App 
{
   public static void main(String[] args) {
      char ch = 'S';
      System.out.println(ch);

      char ch2 = '&amp;amp;';
      System.out.println(ch2);

      char ch3 = '$';
      System.out.println(ch3);
   }

}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



</description>
      <category>java</category>
      <category>programming</category>
    </item>
    <item>
      <title>XSS attacks types</title>
      <dc:creator>rakeshvngowda</dc:creator>
      <pubDate>Mon, 19 Feb 2024 09:38:45 +0000</pubDate>
      <link>https://forem.com/rakeshvngowda/xss-attacks-types-1l8l</link>
      <guid>https://forem.com/rakeshvngowda/xss-attacks-types-1l8l</guid>
      <description>&lt;p&gt;Cross site scripting(XSS) is a technique that attackers use to insert malicious data into any request or browser-side script that an application sends to web browser.&lt;/p&gt;

&lt;p&gt;Using XSS. attackers can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Deface websites&lt;/li&gt;
&lt;li&gt;perform phishing attacks.&lt;/li&gt;
&lt;li&gt;Inject malicious links into trusted web pages.&lt;/li&gt;
&lt;li&gt;Send confidential information to untrusted websites.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  XSS Types:
&lt;/h2&gt;

&lt;h2&gt;
  
  
  1. Non-persistent XSS.
&lt;/h2&gt;

&lt;p&gt;During a non-persistent XSS attack, the malicious XSS data is reflected to the targeted web browser. This causes the browser to display unexpected results. A non-persistent XSS attack usually occurs when a user clicks on a malicious link in a web browser or submits a form that contains malicious code.&lt;/p&gt;

&lt;h2&gt;
  
  
  2.Persistent XSS:
&lt;/h2&gt;

&lt;p&gt;During a persistent XSS attack, the malicious XSS data is stored on the web server the target web browser interacts with.&lt;/p&gt;

&lt;h2&gt;
  
  
  3.DOM-based XSS:
&lt;/h2&gt;

&lt;p&gt;A DOM-based XSS attack modifies the DOM environment of the page that is displayed in the targeted web browser. This does not affect the HTTP response generated by the page, so the appearance of the page remains unaltered. However, the client-side code associated with the page, exhibits unexpected beavior.&lt;/p&gt;

</description>
      <category>security</category>
      <category>webdev</category>
      <category>programming</category>
    </item>
    <item>
      <title>SDLC - Secure Software Development Life Cycle</title>
      <dc:creator>rakeshvngowda</dc:creator>
      <pubDate>Mon, 19 Feb 2024 08:58:41 +0000</pubDate>
      <link>https://forem.com/rakeshvngowda/sdlc-secure-software-development-life-cycle-33k9</link>
      <guid>https://forem.com/rakeshvngowda/sdlc-secure-software-development-life-cycle-33k9</guid>
      <description>&lt;p&gt;This approach integrates security into every stage of the software development process. aiming to address vulnerabilities and reduce the risk of security breaches from design to ongoing maintenance.&lt;/p&gt;

&lt;p&gt;It aids organizations in developing secure software by integarting security into the development process. reducing security flaws and ensuring a robust product. Adapting secure SDLC practices to organizational needs and providing regular security training is crucial.&lt;/p&gt;

&lt;h2&gt;
  
  
  Security requirements
&lt;/h2&gt;

&lt;p&gt;The security requirement phase involves the following key activities:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Determining the business functionality requirements of the software including associated security requirements in terms of confidentiality, integrity, availability, and authentication, such as logging, password, integration with identity management servers,etc.&lt;/li&gt;
&lt;li&gt;Identifying the data sensitivity (such as personal data,cardholder data, health data.etc) that will be stored, processed. or transmitted by the software, along with corresponding application functions handling the data.&lt;/li&gt;
&lt;li&gt;Perform high-level security risk assessments to determine sections of a project that will require security design reviews before release.&lt;/li&gt;
&lt;li&gt;Establish baseline standars to identify and fix security faults during development.&lt;/li&gt;
&lt;li&gt;Categorize the controls according to physically, procedural, or texhnical means.&lt;/li&gt;
&lt;li&gt;Identify the coding tools, techniques and skills required to develop and test the application.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Secure Design
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Develop an application architectural plan that includes security requirements.&lt;/li&gt;
&lt;li&gt;Classify data according to its sensitivity and define the security controls accordingly.&lt;/li&gt;
&lt;li&gt;Consider the authentication and authorization requirements. sensitive data security and privacy requirements.cryptographic controls,dat retention and deletion timelines.&lt;/li&gt;
&lt;li&gt;After developing an architectural plan, perform an architecture risk analysis.&lt;/li&gt;
&lt;li&gt;Implement a Web Application Firewall(WAF)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Secure Coding
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Consider OWASP Top 10, SANS, PCI-DSS, and other industry-recommended best practices for secure code development.&lt;/li&gt;
&lt;li&gt;Consider platform-specific coding guidelines related to the development platform such as AEM, SFCC, Android, or iOS.&lt;/li&gt;
&lt;li&gt;Only use open-source components, libraries, or third-party codes from trusted sources.&lt;/li&gt;
&lt;li&gt;Create input validation checks to verify malicious data.&lt;/li&gt;
&lt;li&gt;Handle all errors and exceptions securely.&lt;/li&gt;
&lt;li&gt;Create strong authentication, authorization, and session management methods.&lt;/li&gt;
&lt;li&gt;Add cryptographic alogithems and menthods, whereve required.&lt;/li&gt;
&lt;li&gt;Implement security logging and auditing features.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Testing and verification.
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Secure the test environments and protect data used for testing.&lt;/li&gt;
&lt;li&gt;Do not use production or Live data in test scripts.&lt;/li&gt;
&lt;li&gt;restrict access to code repository to authorized people only.&lt;/li&gt;
&lt;li&gt;Perform security vulnerability assessment and penetration test.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Continous Monitoring &amp;amp; Risk Assessment
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Configure and enable server security features along with the secure coding.&lt;/li&gt;
&lt;li&gt;Update the server OS and packages frequently.&lt;/li&gt;
&lt;li&gt;Add security groups to servers.&lt;/li&gt;
&lt;li&gt;Use https requests.&lt;/li&gt;
&lt;li&gt;Use TLS security for internal servers.&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>development</category>
      <category>programming</category>
    </item>
    <item>
      <title>Risk and countermeasures to common web vulnerabilities</title>
      <dc:creator>rakeshvngowda</dc:creator>
      <pubDate>Mon, 19 Feb 2024 05:38:28 +0000</pubDate>
      <link>https://forem.com/rakeshvngowda/risk-and-countermeasures-to-common-web-vulnerabilities-3p5k</link>
      <guid>https://forem.com/rakeshvngowda/risk-and-countermeasures-to-common-web-vulnerabilities-3p5k</guid>
      <description>&lt;h2&gt;
  
  
  Improper Input validation
&lt;/h2&gt;

&lt;p&gt;1.Command Injection.&lt;br&gt;
2.SQL Injection.&lt;br&gt;
3.Cross side scripting.&lt;br&gt;
4.Insecure file upload&lt;br&gt;
5.Buffer Overflow.&lt;/p&gt;

&lt;h2&gt;
  
  
  Improper Access Control
&lt;/h2&gt;

&lt;p&gt;1.Broken access control.&lt;br&gt;
2.Improper session management.&lt;br&gt;
3.identification and authentication failures.&lt;br&gt;
4.Cross-Site Request Forgery (CSRF).&lt;br&gt;
5.Server-Side Request Forgery.&lt;/p&gt;

&lt;h2&gt;
  
  
  Security Misconfiguration.
&lt;/h2&gt;

&lt;p&gt;1.Missing platform specific security.&lt;br&gt;
2.Cryptographic failures.&lt;br&gt;
3.Vulnerable and outdated components.&lt;br&gt;
4.Misconfigured SSL/TLS&lt;br&gt;
5.Misconfigured security headers.&lt;br&gt;
    * CORS.&lt;br&gt;
    * Cache-control directives&lt;br&gt;
    * Content Security Policy.&lt;/p&gt;

&lt;h2&gt;
  
  
  Information Disclosure.
&lt;/h2&gt;

&lt;p&gt;1.Improper error &amp;amp; exception handling.&lt;br&gt;
2.Directory listing.&lt;br&gt;
3.Insecure configurations and settings.&lt;br&gt;
4.Sensitive data exposure.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>sql</category>
      <category>programming</category>
    </item>
  </channel>
</rss>
