<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Gudi Varaprasad</title>
    <description>The latest articles on Forem by Gudi Varaprasad (@varaprasad_gudi).</description>
    <link>https://forem.com/varaprasad_gudi</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F402865%2Fce147d63-8d9e-4d20-ae69-dbe618795fe7.jpg</url>
      <title>Forem: Gudi Varaprasad</title>
      <link>https://forem.com/varaprasad_gudi</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/varaprasad_gudi"/>
    <language>en</language>
    <item>
      <title>Day 1 as an Observer</title>
      <dc:creator>Gudi Varaprasad</dc:creator>
      <pubDate>Mon, 13 Feb 2023 15:55:46 +0000</pubDate>
      <link>https://forem.com/varaprasad_gudi/day-1-as-an-observer-51o1</link>
      <guid>https://forem.com/varaprasad_gudi/day-1-as-an-observer-51o1</guid>
      <description>&lt;p&gt;Sometimes I was surprised to figure out what CS interns or employees in a software company always code.&lt;br&gt;
&lt;strong&gt;I found my answers today!&lt;/strong&gt; Trust me; it was quite interesting.&lt;/p&gt;

&lt;p&gt;We write Leetcode hard solutions. We write optimized code, We write automation scripts, and We write things that ChatGPT can't write or that an AI model can't predict!&lt;/p&gt;

&lt;p&gt;Throughout my Engineering Life, I hated Leetcode problems the most. I always need clarification on why the whole Coder community is towards Cracking DSA, Solving Leetcode, Acing Hackerrank, etc. Also, in between, I never understood why "FAANG" picks candidates who can achieve &lt;em&gt;O(1)&lt;/em&gt; complexity.&lt;/p&gt;

&lt;p&gt;It was today I figured out all these things. As an intern, I was assigned &lt;strong&gt;a real-world optimization problem&lt;/strong&gt; of a cruise scheduler to deliver goods at various ports across the globe. Some constraints are provided, and we have to derive the schedule as output. It was when I remembered the concepts of &lt;strong&gt;Linear Programming&lt;/strong&gt;, &lt;strong&gt;Greedy Method&lt;/strong&gt;, and &lt;strong&gt;Dynamic Programming&lt;/strong&gt; while writing an algorithm on a rough paper. Yes! I found this task interesting, engaging and challenging. It was my first experience putting all the algorithms into existence. Finally, after figuring it out, I could build a code with &lt;em&gt;O(n^2)&lt;/em&gt; complexity. Yayy! It sounds cool, right? But then my Team Leader was ready to blow me up for making the code more worse.&lt;/p&gt;

&lt;p&gt;The entire day I drank more cups of coffee to write fewer lines of code. Hahaha! Jokes apart! Anyways thanks for reading for so long. To all the aspiring coders, engineers, and developers out there, a single piece of advice... &lt;u&gt;work on improving the logic you write in so-called "Hard Level problems"!&lt;/u&gt; &lt;em&gt;Leetcode sucks!&lt;/em&gt; &lt;br&gt;
Don't worry if you can't fix Hard Code problems because you will be laid off soon :)&lt;/p&gt;

</description>
      <category>startup</category>
      <category>career</category>
      <category>productivity</category>
      <category>discuss</category>
    </item>
    <item>
      <title>WEB BASED BILLING SOFTWARE</title>
      <dc:creator>Gudi Varaprasad</dc:creator>
      <pubDate>Fri, 10 Dec 2021 09:14:24 +0000</pubDate>
      <link>https://forem.com/varaprasad_gudi/web-based-billing-software-365m</link>
      <guid>https://forem.com/varaprasad_gudi/web-based-billing-software-365m</guid>
      <description>&lt;h2&gt;
  
  
  About Project :
&lt;/h2&gt;

&lt;p&gt;The aim of this project is to make Billing management much easier for Business Enterprises. In this project, we have developed a &lt;strong&gt;“ Web-based Billing Software ”&lt;/strong&gt; which is an application to automate the process of billing and managing a departmental store.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--uFO9EVvz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/cv1g3n12lexepb7jf2ac.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--uFO9EVvz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/cv1g3n12lexepb7jf2ac.png" alt="" width="880" height="370"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Objective :
&lt;/h2&gt;

&lt;p&gt;The main objective of this project is to generate and manage invoices in a matter of few seconds in order to avoid a lot of paperwork and Time consuming process by managing huge data manually. This project benefits owners of enterprises as well as customers. This software allows to maintain all the products with their shorthand notation by providing summary reports to the owner, which gives a convenient solution to the billing pattern with a Secured User Authentication and Validation. And also user Giveaway generator whenever offers or discounts are available.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;a href="https://github.com/GudiVaraprasad/Online-Billing-Software/blob/main/Project%20Presentation.pptx"&gt;Click here&lt;/a&gt; to learn more about this.
&lt;/h3&gt;



&lt;h2&gt;
  
  
  Required Files :
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;Project Report : &lt;a href="https://github.com/GudiVaraprasad/Online-Billing-Software/blob/main/Project%20Report.pdf"&gt;Click Here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;SRS Document : &lt;a href="https://github.com/GudiVaraprasad/Online-Billing-Software/blob/main/SRS%20Document.pdf"&gt;Click Here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Project Presentation : &lt;a href="https://github.com/GudiVaraprasad/Online-Billing-Software/blob/main/Project%20Presentation.pptx"&gt;Click Here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;UML Diagrams : &lt;a href="https://github.com/GudiVaraprasad/Online-Billing-Software/tree/main/Design"&gt;Click Here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Source Code : &lt;a href="https://github.com/GudiVaraprasad/Online-Billing-Software/tree/main/Development/Full%20Stack"&gt;Click Here&lt;/a&gt;&lt;/p&gt;


&lt;/blockquote&gt;





&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tools/ Technology needed&lt;/th&gt;
&lt;th&gt;Description and uses&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;HTML 5&lt;/td&gt;
&lt;td&gt;Appearance of website.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;CSS 3&lt;/td&gt;
&lt;td&gt;Adding style and presentation to the web-pages.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;JavaScript&lt;/td&gt;
&lt;td&gt;Adding interactive user behavior to web pages.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Lucidchart&lt;/td&gt;
&lt;td&gt;A web-based proprietary platform to collaborate on drawing charts and diagrams.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Bootstrap v4.0&lt;/td&gt;
&lt;td&gt;Front-end framework used for UI.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;PHP&lt;/td&gt;
&lt;td&gt;Server side programming and interactive with phpMyAdmin.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;MySQL&lt;/td&gt;
&lt;td&gt;For the purpose of a web database and logging application.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;phpMyAdmin&lt;/td&gt;
&lt;td&gt;Management of databases, tables, indexes, permissions.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;GITHUB&lt;/td&gt;
&lt;td&gt;Web-based platform used for working with our Team; Team collaboration.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Visual Studio Code&lt;/td&gt;
&lt;td&gt;A code editor redefined, optimized for building, debugging web apps.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;XAMPP&lt;/td&gt;
&lt;td&gt;A local web server on PC.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;A cross-platform web browser&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows 10&lt;/td&gt;
&lt;td&gt;An operating system for building apps&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;PC / Laptop&lt;/td&gt;
&lt;td&gt;Intel based processor-run computer system, which have keyboard and mouse as input devices.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h1&gt;
  
  
  PROJECT DEMO : &lt;a href="http://bill-book.epizy.com/"&gt;Click here&lt;/a&gt;
&lt;/h1&gt;

</description>
      <category>webdev</category>
      <category>php</category>
      <category>showdev</category>
      <category>computerscience</category>
    </item>
    <item>
      <title>This is not called Hacking ?</title>
      <dc:creator>Gudi Varaprasad</dc:creator>
      <pubDate>Mon, 08 Feb 2021 08:12:08 +0000</pubDate>
      <link>https://forem.com/varaprasad_gudi/this-is-not-called-hacking-2jbi</link>
      <guid>https://forem.com/varaprasad_gudi/this-is-not-called-hacking-2jbi</guid>
      <description>&lt;h2&gt;Is it really how hacking looks ?&lt;/h2&gt;

&lt;p&gt;You have probably seen many movies where hacking is portrayed like this..&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--hcXMMelw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/q7esqbjgeycdkp28x45m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--hcXMMelw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/q7esqbjgeycdkp28x45m.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Wait... what does it actually mean ?&lt;br&gt;
Let's understand what hacking actually is!&lt;/p&gt;




&lt;p&gt;From the point where you are casually browsing the web to the point where your social media accounts were hacked, Hacking happened. The hacker was able to take over your digital life but how did he manage to do that. He might have done one of these 3 things.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--BnUNejOB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/ykj6ht6lmrpc716dory6.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--BnUNejOB--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/ykj6ht6lmrpc716dory6.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Let's talk about them in detail...&lt;/p&gt;

&lt;h2&gt;1. BREACHES :&lt;/h2&gt;

&lt;p&gt;Believe me or not, your passwords are probably already out there, publicly available on the internet without even your knowledge. This might feel a bit unconvincing but it's true that there is a chance. But how is this actually possible that your credentials are publicly available on the internet..? This is because of the data breaches. &lt;/p&gt;

&lt;p&gt;When hackers manage to hack a website and get access to the website database, they leak/sell all this data like (user's credentials and details) on the internet, on hacker's forum, Dark web, PasteWin; it's the hacker's choice of course. So, if you are user of the website that got breached, your data is leaked too.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--wBA0ES1Z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/3o9h6u9xzycwu6tpg4xg.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--wBA0ES1Z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/3o9h6u9xzycwu6tpg4xg.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Most of the websites, pre-hash your passwords before they store it in the database with a fast hashing algorithm (such as SHA-256, Argon2id, PBKDF2, etc..). But most of the data breaches on internet contain plain text passwords. Many famous websites like LinkedIn, Twitter, 000webhost, etc.. already suffered major data breaches and all these breaches are publicly available on the internet. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--rLs1CqaW--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/7gg8ltyvrchyuwkqrpbz.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--rLs1CqaW--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/7gg8ltyvrchyuwkqrpbz.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you want to check whether your credentials are included into any data breach, visit &lt;a href="https://haveibeenpwned.com/"&gt;click here&lt;/a&gt; and enter your email. Even though your results are positive on this site, your data might be still in one of the breaches which is not popularly known but still exists.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;The best way to stay away from data breaches is to use different passwords for different websites.&lt;/b&gt; &lt;/p&gt;




&lt;h2&gt;2. SOCIAL ENGINEERING :&lt;/h2&gt;

&lt;p&gt;This is literally, you giving away your login credentials to a stranger on the internet. Hackers can pretend to be someone else to try to extract your crucial information directly from you.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--L1zYsIj0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/zzvpfk0tc53lerup58sy.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--L1zYsIj0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/zzvpfk0tc53lerup58sy.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A hacker can still install a Remote Access Trojan (RAT) through social engineering by linking it to the cracked software, phishing attacks, etc.. which gives remote access to the hacker. With this, the hacker will be able to control your system from a remote server.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--CPz2c3-t--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/ym0ozbdpzwh6ewre5zb3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--CPz2c3-t--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/ym0ozbdpzwh6ewre5zb3.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;3. MAN IN THE MIDDLE :&lt;/h2&gt;

&lt;p&gt;Now this type of hacking is not very likely to occur but there is a chance that you might get hacked by Man in the middle Attacks. In this attack, the hacker puts himself as man in the middle between you and the internet you are browsing.&lt;/p&gt;

&lt;p&gt;Targets are typically the users of financial application sites, businesses, e-commerce sites, and other websites where logging in are required. Information obtained during an attack could be used for many purposes, including identity theft, unapproved fund transfer, or an illicit password change.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--lB1kT5EN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/btjbyzpf2n08c2zowg53.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--lB1kT5EN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/btjbyzpf2n08c2zowg53.png" alt="Alt Text"&gt;&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Broadly speaking, a man in the Middle attack is the equivalent of a mailman opening your bank statement, writing down your account details, and then reselling the envelope and delivering it to your door.&lt;/p&gt;

&lt;p&gt;There are some practical tips to prevent the man in the middle attack, such as &lt;br&gt;
a. Avoid Wi-Fi connections that are not password protected.&lt;br&gt;
b. The next one is, to log out immediately from a secure application when it is not in use.&lt;br&gt;
c. The third one, Avoid using public networks such as coffee shops and hotel WIFI when conducting sensitive transactions, etc...&lt;/p&gt;




&lt;p&gt;Wanna know more about some of such similar and famous Cyber Attacks ?&lt;br&gt;
&lt;a href="https://dev.to/varaprasad_gudi/common-cyber-attacks-i9n"&gt;&lt;b&gt;Check out this&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--pSBqOGu3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/1ypjt5wzt8d9szgz1udo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--pSBqOGu3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/1ypjt5wzt8d9szgz1udo.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;Written by -- Gudi Varaprasad&lt;/p&gt;

</description>
      <category>hacking</category>
      <category>cybersecurity</category>
      <category>security</category>
      <category>discuss</category>
    </item>
    <item>
      <title>MITs Tactics, Techniques</title>
      <dc:creator>Gudi Varaprasad</dc:creator>
      <pubDate>Wed, 03 Feb 2021 19:27:54 +0000</pubDate>
      <link>https://forem.com/varaprasad_gudi/a-matrix-for-enterprise-2dfi</link>
      <guid>https://forem.com/varaprasad_gudi/a-matrix-for-enterprise-2dfi</guid>
      <description>&lt;h1&gt;What is ATT&amp;amp;CK ?&lt;/h1&gt;

&lt;p&gt;MITRE (Massachusetts Institute of Technology Research and Engineering) ATT&amp;amp;CK stands for Adversarial Tactics, Techniques, &amp;amp; Common Knowledge.&lt;/p&gt;

&lt;p&gt;The goal is to develop specific threat models and methodologies by bringing communities together to solve problems for a safer world.&lt;/p&gt;

&lt;p&gt;In this blog, I will explain all the techniques and tactics matrix in a easier way. This blog is written as a crux of &lt;a href="https://attack.mitre.org/"&gt;MITRE ATT&amp;amp;CK&lt;/a&gt;.&lt;/p&gt;

&lt;h4&gt;ATT&amp;amp;CK has &lt;b&gt;14 Techniques&lt;/b&gt; that make up an attack chain:&lt;/h4&gt;




&lt;h2&gt;1. Reconnaissance :&lt;/h2&gt;

&lt;p&gt;Attackers try to collect information of the victim organization, infrastructure, or staff/personnel in order to plan and execute Initial Access and other tactics.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--o6yynrUQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/n6w752rkzqsfo8j7ummn.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--o6yynrUQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/n6w752rkzqsfo8j7ummn.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before compromising a victim, attackers perform :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Active scan the victim infrastructure via network traffic.&lt;/li&gt;
&lt;li&gt;Attackers collect every hardware and software detail, configuration, architecture, network information, Personal data, credentials, etc..&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;2. Resource Development :&lt;/h2&gt;

&lt;p&gt;After gathering details, Attackers try to establish resources they can use to support and perform attack/operations or exploit it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--L8TBxPps--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/b2aqmtjosq8a0ai442zf.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--L8TBxPps--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/b2aqmtjosq8a0ai442zf.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before compromising a victim, attackers perform :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Acquire required infrastructure that can be used during targeting in order to exploit vulnerabilities.&lt;/li&gt;
&lt;li&gt;Compromise the victim's social media accounts.&lt;/li&gt;
&lt;li&gt;Build a malware and automation stuff to perform exploitation.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;3. Initial Access :&lt;/h2&gt;

&lt;p&gt;After establishing resources, Attackers try to get into the network exploiting those security weakness and gain initial access.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--h0MTJ9RP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/b6w52kty251hzjlzb8dc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--h0MTJ9RP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/b6w52kty251hzjlzb8dc.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before compromising a victim, attackers use techniques and gain a foothold includes &lt;a href="https://dev.to/varaprasad_gudi/common-cyber-attacks-i9n"&gt;these attacks.&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Malware Attacks&lt;/li&gt;
&lt;li&gt;Phishing Attacks&lt;/li&gt;
&lt;li&gt;Man in the Middle Attack&lt;/li&gt;
&lt;li&gt;Dos/DDos Attacks&lt;/li&gt;
&lt;li&gt;SQL Injection&lt;/li&gt;
&lt;li&gt;Cross-site Scripting&lt;/li&gt;
&lt;li&gt;Business email compromise&lt;/li&gt;
&lt;/ol&gt;




&lt;h2&gt;4. Execution :&lt;/h2&gt;

&lt;p&gt;After having initial access into systems, Attackers try to execute malicious code and compromises system/network and also emerge a backdoor in order to have repeated access into system.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--XL7Eib8e--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/q5aesgjxv9kt861lfh4d.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--XL7Eib8e--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/q5aesgjxv9kt861lfh4d.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before compromising a victim, attackers perform :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Run command and script interpreters to execute commands, scripts, or binaries to compromise.&lt;/li&gt;
&lt;li&gt;Disturb the regular functioning of Scheduled Task/Job&lt;/li&gt;
&lt;li&gt;Abuse System services like changing admin controls, run malicious codes, etc...&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;5. Persistence :&lt;/h2&gt;

&lt;p&gt;After compromising the victim's system, Attackers try to maintain their foothold in the victim's network. This is the toughest job for the attackers to stay in the victim's network.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--FEDwwZlw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/2kbq4p4th05sgf92us8y.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--FEDwwZlw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/2kbq4p4th05sgf92us8y.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before compromising a victim, attackers perform :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access&lt;/li&gt;
&lt;li&gt;Account Manipulation, Create an Account, Create or Modify System Process, Perform some [attacks.](https://dev.to/varaprasad_gudi/common-cyber-attacks-i9n)&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;6. Privilege Escalation :&lt;/h2&gt;

&lt;p&gt;After successful Persistence in the victim's network, Attackers then try to gain higher-level permissions by exploring a network with unprivileged access.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--fpfJlV4Z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/potr1883p8z2ypr8ibkn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--fpfJlV4Z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/potr1883p8z2ypr8ibkn.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before compromising a victim, attackers perform :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Abuse System services like changing admin controls, run malicious codes, etc... and bypass User Access Controls.&lt;/li&gt;
&lt;li&gt;Hijacking Execution Flow, Abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;7. Defense Evasion :&lt;/h2&gt;

&lt;p&gt;After having access to higher-level permissions, Attackers try to avoid being detected by uninstalling/disabling security software or obfuscating/encrypting data and scripts. This is the important step for the attackers to stay stable and active in the victim's network.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--pHjG8zK8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/jgieob74irvepobknk0d.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--pHjG8zK8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/jgieob74irvepobknk0d.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before compromising a victim, attackers perform :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Take advantage of built-in control mechanisms in order to escalate privileges on a network and Modify Authentication Process.&lt;/li&gt;
&lt;li&gt;Exploit a system or application vulnerability to bypass security features. Hide artifacts, users, files, etc..&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;8. Credential Access :&lt;/h2&gt;

&lt;p&gt;After surviving themselves in the network, Attackers now try to steal the credentials like account names and passwords . This is the actual reason/step for their entry into the victim's network.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--kAsrtxY---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/0m0b5yppfjw3btdh9dtc.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--kAsrtxY---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/0m0b5yppfjw3btdh9dtc.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before compromising a victim, attackers perform :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Brute force attack, extract credentials from saved data, Forced Authentication, keylogging, Man-in-the-Middle attack, Modify Authentication Process, Network Sniffing, etc.. &lt;/li&gt;
&lt;li&gt;They also perform some famous [cyber attacks.](https://dev.to/varaprasad_gudi/common-cyber-attacks-i9n)&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;9. Discovery :&lt;/h2&gt;

&lt;p&gt;After successful hack of credentials, now attackers will be trying to figure out victim's system and internal network. This is the similar step like reconnaissance but it is examined inside the victim's network after initial access.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--DAvHjFHq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/z4wvtr86uy5mflegc8ku.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--DAvHjFHq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/z4wvtr86uy5mflegc8ku.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before compromising a victim, attackers perform :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Get a listing of accounts on a system or within an environment.&lt;/li&gt;
&lt;li&gt;Active scan the victim infrastructure via network traffic.&lt;/li&gt;
&lt;li&gt;Attackers collect every hardware and software detail, configuration, architecture, network information, Personal data, credentials, etc..&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;10. Lateral Movement :&lt;/h2&gt;

&lt;p&gt;Lateral Movement consists of techniques that adversaries use to enter and control remote systems on a network.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Wu5zLH49--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/jkbdlsurmk6o1wi5bzy9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Wu5zLH49--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/jkbdlsurmk6o1wi5bzy9.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before compromising a victim, attackers perform :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Remote access in the network/system.&lt;/li&gt;
&lt;li&gt;Emerge a backdoor in order to have repeated access into system.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;11. Collection :&lt;/h2&gt;

&lt;p&gt;After successful hack of credentials, now attackers will try to gather information and the sources information is collected from that are relevant for the attacker's plan of objectives. The next goal after collecting data is to steal (exfiltrate) the data.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--b-F3SSoN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/bryu1hchizl9cmefvn4s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--b-F3SSoN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/bryu1hchizl9cmefvn4s.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before compromising a victim, attackers perform :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Archive Collected Data&lt;/li&gt;
&lt;li&gt;Audio Capture, Video Capture, keylogging, Relevant Data from Local System, Email Collection, etc..&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;12. Command and Control :&lt;/h2&gt;

&lt;p&gt;After the attacker collects all the required data, now attacker tries to communicate with compromised systems to control them.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--rmXxjSGo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/mirkcd9pmiz2g3s4nme5.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--rmXxjSGo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/mirkcd9pmiz2g3s4nme5.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before compromising a victim, attackers perform :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Using application layer protocols to avoid detection/network filtering by merging in with existing network traffic.&lt;/li&gt;
&lt;li&gt;Communication Through Removable Media.&lt;/li&gt;
&lt;li&gt;Use a connection proxy to direct network traffic between systems or act as an intermediary for network communications to a command and control server to avoid direct connections to their infrastructure.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;13. Exfiltration :&lt;/h2&gt;

&lt;p&gt;The next goal after collecting data is to steal (exfiltrate) the data.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--KqtpaYsi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/81g5vxpkwj64wfeqfmyz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KqtpaYsi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/81g5vxpkwj64wfeqfmyz.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before compromising a victim, attackers perform :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Steal data using network attacks like weak authorization, weak DOS, weak intrusion detection systems.&lt;/li&gt;
&lt;li&gt;Exploring via software attack surface, perform physical attacks like using hardware devices.&lt;/li&gt;
&lt;li&gt;Digital attack surface that is accessed from remote access location.&lt;/li&gt;
&lt;li&gt;Social Engineering / Human attack surface.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;14. Impact :&lt;/h2&gt;

&lt;p&gt;This is the last step for the attacker. After performing all these stages, now attacker tries to manipulate, interrupt, or destroy your systems and data.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_rhk-fCd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/g9ta95bk88ji4xhnbsj6.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_rhk-fCd--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/g9ta95bk88ji4xhnbsj6.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Before compromising a victim, attackers perform :&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Account Access Removal/deletion.&lt;/li&gt;
&lt;li&gt;Data Manipulation/deletion.&lt;/li&gt;
&lt;li&gt;Disk Wipe, System Shutdown/Reboot.&lt;/li&gt;
&lt;/ul&gt;




&lt;h1&gt;IN SHORTS : &lt;/h1&gt;

&lt;p&gt;There are a number of ways an organization can use MITRE ATT&amp;amp;CK matrix and get benefited.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--I9IO4Np3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/q770ucl0ewl7n77w2l2a.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--I9IO4Np3--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/q770ucl0ewl7n77w2l2a.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;-- Written by &lt;b&gt;Gudi Varaprasad&lt;/b&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>attacks</category>
      <category>discuss</category>
    </item>
    <item>
      <title>A Simple Arduino Project</title>
      <dc:creator>Gudi Varaprasad</dc:creator>
      <pubDate>Sun, 31 Jan 2021 06:27:51 +0000</pubDate>
      <link>https://forem.com/varaprasad_gudi/a-simple-arduino-project-12n1</link>
      <guid>https://forem.com/varaprasad_gudi/a-simple-arduino-project-12n1</guid>
      <description>&lt;h2&gt;Why this ?&lt;/h2&gt;

&lt;p&gt;We are now living in the 21st century. Now, smart phone has become the most essential thing in our daily life. &lt;br&gt;
Android application based smart phones are becoming each time more powerful and equipped with several accessories that are useful for Robots. &lt;br&gt;
This project describes how to control a robot car using mobile through Bluetooth communication, some features about Bluetooth technology, components of the mobile and robot.&lt;/p&gt;



&lt;h2&gt;Working of the Project ?&lt;/h2&gt;

&lt;p&gt;The working principle is kept as simple as possible. The working principle of the circuit has been elaborated with the help of a block diagram, of the system interconnection. A DC power supply is required to run the system. The DC power supple feeds the Microcontroller and the Bluetooth module. &lt;/p&gt;

&lt;p&gt;The Bluetooth module receives the signal sent from an android smart-phone, where the application software coded in C language is installed. The microcontroller, thereby, sends instructions, which when executed, helps in functioning of the motor driver. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Ffpu2ckobkpinv43cn5v6.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Ffpu2ckobkpinv43cn5v6.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When a key is pressed, the corresponding data is transmitted to the Bluetooth Module from the Phone over Bluetooth Communication. The movement and functioning of the motor can be controlled by using the android based application software. &lt;/p&gt;

&lt;p&gt;In our android application base Bluetooth controlled robotic car, the user interacts with the system with a smart phone. In this method user must be present within in range (&amp;lt; 15 meters) to control the system.&lt;/p&gt;



&lt;h2&gt;Demo ?&lt;/h2&gt;

&lt;p&gt;This is how it works, this can be further developed in order to use for different purposes.&lt;/p&gt;

&lt;p&gt;&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/ul7iroZhAkQ"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;We can interface sensors to this robot so that it can monitor some parameters. We can add wireless camera to this robot.&lt;/li&gt;
&lt;li&gt;Can be developed to provide an easier life for the disabled. They can be used by Physically Challenged people to helm their robot around their space.&lt;/li&gt;
&lt;li&gt; The basic advantage of this system is its wide interface that can be controlled with help of Android Mobile from a few feet away, and also that the whole system syncs itself with the driver’s electronic devices, thus giving him/her greater accessibility.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;Need more details ?&lt;/h2&gt;

&lt;p&gt;As a student developer, I would like to share this whole project at free of cost including the project reports, PPTs, code and related guidelines.&lt;/p&gt;

&lt;p&gt;For more details : &lt;a href="https://github.com/GudiVaraprasad/Bluetooth-Control-Car" rel="noopener noreferrer"&gt;Click Here&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;&lt;b&gt;Written by - GVP&lt;/b&gt;&lt;/p&gt;

</description>
      <category>iot</category>
      <category>arduino</category>
      <category>beginners</category>
      <category>showdev</category>
    </item>
    <item>
      <title>Common Cyber Attacks</title>
      <dc:creator>Gudi Varaprasad</dc:creator>
      <pubDate>Sat, 23 Jan 2021 17:47:52 +0000</pubDate>
      <link>https://forem.com/varaprasad_gudi/common-cyber-attacks-i9n</link>
      <guid>https://forem.com/varaprasad_gudi/common-cyber-attacks-i9n</guid>
      <description>&lt;h2&gt;What are Cyber Attacks ?&lt;/h2&gt;

&lt;p&gt;A cyber attack is any type of offensive action that targets a computer system, infrastructure, computer networks, or professional computer devices by using various methods to steal or destroy data or information systems.&lt;/p&gt;

&lt;p&gt;I know it is quite difficult to understand this in the first attempt.&lt;/p&gt;

&lt;p&gt;Let me break down into simple words.&lt;/p&gt;

&lt;p&gt;A cyber attack is a malicious and deliberate attempt by an individual or organization to breach the information system of another individual or organization.&lt;/p&gt;

&lt;p&gt;Usually, the attacker seeks some type of benefit from disrupting the victims' network.&lt;/p&gt;

&lt;p&gt;A cyberattack is also known as a Computer Network Attack (CNA), if you have ever studied a famous battle in history, you will know that " No Two are exactly alike. "&lt;/p&gt;

&lt;p&gt;Still, there are similar strategies and tactics often used in battle because they are time-proven to be effective.&lt;/p&gt;

&lt;p&gt;Similarly, when a criminal is trying to hack an organization, they won't reinvent the wheel unless they absolutely have to.&lt;/p&gt;

&lt;p&gt;They will draw upon common types of hacking techniques that are known to be highly effective, such as malware, phishing or cross sites scripting, etc...&lt;/p&gt;

&lt;h2&gt;Some common Cyber Attacks &lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--RZewq1JU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/461gvm1cxobsmjtkqe5r.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--RZewq1JU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/461gvm1cxobsmjtkqe5r.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Here, we will discuss some of the common types of cyber attacks such as :&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Malware Attacks&lt;/li&gt;
&lt;li&gt;Phishing Attacks&lt;/li&gt;
&lt;li&gt;Man in the Middle Attack&lt;/li&gt;
&lt;li&gt;Dos/DDos Attacks&lt;/li&gt;
&lt;li&gt;SQL Injection&lt;/li&gt;
&lt;li&gt;Cross-site Scripting&lt;/li&gt;
&lt;li&gt;Business email compromise&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;We will discuss each type of cyber attack briefly.&lt;/p&gt;

&lt;h3&gt;1. Malware Attacks : &lt;/h3&gt;

&lt;p&gt;If you have ever seen antivirus alerts pop up on your computer&lt;br&gt;
screen or if you have mistakenly clipped a malicious e-mail attachment, then you have had a close call with malware.&lt;/p&gt;

&lt;p&gt;Attackers love to use malware to gain a foothold in a user's computer and consequently the office they work in because it can be very effective. &lt;br&gt;
Malware refers to various forms of harmful software such as viruses, ransomware, and Trojans. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--hhCNpeZz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/yky6kdl98oavgyms53aq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--hhCNpeZz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/yky6kdl98oavgyms53aq.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Once malware is in your computer, it can break all shots of havoc. From taking control of your machine to monitoring your actions and keystrokes to silently send all shorts of confidential data from your computer or network to the attackers' computer network.&lt;/p&gt;

&lt;p&gt;Attackers will use a variety of methods to get malware into your computer, but at some stage, it often requires a user to take any action to install the malware. &lt;/p&gt;

&lt;p&gt;This action can include clicking a link to download a file or opening an attachment that may look no harmless, like a word document or PDF attachment but actually, it has malware installed hidden.&lt;/p&gt;




&lt;h3&gt;2. Phishing Attacks : &lt;/h3&gt;

&lt;p&gt;Of course, there are chances that you would not just open a random&lt;br&gt;
attachment or click on a link in any e-mail that comes your way. There has to be a compelling reason for you to take action. Attackers know these too. &lt;/p&gt;

&lt;p&gt;When an attacker wants you to install malware or divulge sensitive information. They often turn to phish tactics or pretending to be someone or something else to get you to take any action that you normally would not.&lt;/p&gt;

&lt;p&gt;Since they rely on human curiosity and impulse phishing attacks can be difficult to stop. In a phishing attack, an attacker may send you an email that appeared to be from someone you trust, like your boss or a company you do business with. The email will seem legitimate and it will have some urgency to it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s---o_fyJLN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/ycd08ggodud6y1lffwt0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s---o_fyJLN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/ycd08ggodud6y1lffwt0.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For example, attackers may send you an email about a fraudulent activity that has been detected on your social media account or any other platform. In the email, there will be an attachment to open or a link to click on. &lt;br&gt;
Upon opening the malicious attachment, you will thereby install the malware on your computer. If you click the link, it may send you to a legitimate-looking website that asks for you to log in to access the important file.&lt;/p&gt;

&lt;p&gt;This legitimate-looking website is actually a trap used to capture your credential when you try to log in. To combat phishing attempts, understanding the importance of verifying email-sender attachments and links is very essential.&lt;/p&gt;




&lt;h3&gt;3. Man in the Middle Attack : &lt;/h3&gt;

&lt;p&gt;Now, let's talk about session hijacking and man in the middle attack. When you are connected to the Internet, your computer has a lot of small back and front transactions with servers around the world, letting them know who you are and what type of specific websites or services you are requesting.&lt;/p&gt;

&lt;p&gt;If everything goes as it should, the Web server should respond to your request by giving you the information you are accessing. This process or session happens whether you are simply browsing or when you are logging into a website with your username and password.&lt;/p&gt;

&lt;p&gt;The session between your computer and the remote web server is given a unique session ID which should stay private between the two parties. However, an attacker can hijack the session by capturing the session ID and posing as the computer making a request which allows them to log in as an unsuspecting user and gain access to unauthorized information on the Web server.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--lB1kT5EN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/btjbyzpf2n08c2zowg53.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--lB1kT5EN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/btjbyzpf2n08c2zowg53.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;There are numbers of methods an attacker can use to steal the session ID, for example, a cross-site scripting attack can also be used to hijack a session I.D. An attacker can also opt to hijack the session to insert themselves between the requesting computer and the remote server by pretending to be the other party in the session. &lt;/p&gt;

&lt;p&gt;This allows them to encrypt information in both directions. This method is commonly called &lt;b&gt;A Man in the middle attack&lt;/b&gt;. &lt;/p&gt;

&lt;p&gt;A man in the middle attack is a general term for when an attacker positions himself in a conversation between a user and application by making it appear as if a normal exchange of information is underway. The goal of an attack is to steal personal information such as login credentials, account details, and credit card numbers, etc ...&lt;/p&gt;

&lt;p&gt;Targets are typically the users of financial application sites, businesses, e-commerce sites, and other websites where logging in are required. Information obtained during an attack could be used for many purposes, including identity theft, unapproved fund transfer, or an illicit password change. &lt;/p&gt;

&lt;p&gt;Broadly speaking, a man in the Middle attack is the equivalent of a mailman opening your bank statement, writing down your account details, and then reselling the envelope and delivering it to your door.&lt;/p&gt;

&lt;p&gt;There are some practical tips to prevent the man in the middle attack, such as &lt;br&gt;
a. Avoid Wi-Fi connections that are not password protected.&lt;br&gt;
b. The next one is, to log out immediately from a secure application when it is not in use.&lt;br&gt;
c. The third one, Avoid using public networks such as coffee shops and hotel WIFI when conducting sensitive transactions, etc...&lt;/p&gt;




&lt;h3&gt;4. Dos/DDos Attacks : &lt;/h3&gt;

&lt;p&gt;I. Denial of service (DoS) – Attacker will try to prevent the normal use of server or application or database or network or communication facilities.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--HzZtD2Nl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/jb8pp0ajl21soj2espzc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--HzZtD2Nl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/jb8pp0ajl21soj2espzc.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;II. Distributed DoS attack – Attack is done from multiple and various systems at the same time. This is prevented by blocking an IP address from which you get too many requests.&lt;/p&gt;




&lt;h3&gt;5. SQL Injection : &lt;/h3&gt;

&lt;p&gt;Now let's discuss SQL injection Attack. As known, SQL ( also pronounced as sequel) is a programming language that is used to communicate with database. Many of the servers that store critical data for websites and services use SQL to manage the data in their database.&lt;/p&gt;

&lt;p&gt;SQL injection attack specifically targets this kind of server using malicious codes to get the server to extract information. This is especially problematic if the server stores private customer information from the websites, such as credit card numbers, usernames, and passwords like other credentials or other personally identifiable information which are tempting and lucrative targets for an attacker. &lt;br&gt;
A SQL injection attack works by exploiting any one of the known SQL vulnerabilities that allow the SQL server to run malicious codes.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--eru9fkmT--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/cjjy3sf8td3r1596exfe.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--eru9fkmT--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/cjjy3sf8td3r1596exfe.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For example, if a SQL server is vulnerable to an injection attack, it may be possible for an attacker to go to a website search box and type in code that would force these sites SQL server to dump all of its stored private data for this site.&lt;/p&gt;




&lt;h3&gt;6. Cross-site Scripting : &lt;/h3&gt;

&lt;p&gt;Now we will discuss cross-site scripting attacks. In an SQL injection attack, an attacker goes after a vulnerable website to target its stored data such as user credentials or sensitive financial data. &lt;/p&gt;

&lt;p&gt;But if an attacker would rather directly target a Web site user, they may opt for a cross-site scripting attack. Similar to SQL injection attack, this attack also involves injecting malicious code into a website, but in this case, the website itself is not being attacked.&lt;/p&gt;

&lt;p&gt;Instead, the malicious code the attacker has injected only runs in the user's browser when they visit the attack website. And it goes after the visitor directly, not the website. One of the most common ways an attacker can deploy a cross-site scripting attack is by injecting malicious code into a comment or a script that could automatically run. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ZB_n546G--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/zkzc3pwjm1kkotn7x0w6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ZB_n546G--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/zkzc3pwjm1kkotn7x0w6.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For example, they could embed a link to a malicious JavaScript in a comment on a blog. Cross-site scripting attacks can significantly damage a website for reputation by placing the user's information at risk without any indication that anything malicious even occurred. Any sensitive information a user sent to a site such as their credential, credit card information, or other private data can be hijacked via cross-site scripting without the website's owners realized that there was even a problem in the first place. &lt;/p&gt;

&lt;p&gt; You can easily understand a Cross-site Scripting attack by this below image mentioned in five simple steps.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--hudGDu4_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/3j5ivekcafu97az9c0pi.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--hudGDu4_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/3j5ivekcafu97az9c0pi.PNG" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h3&gt;7. Business e-mail compromise : &lt;/h3&gt;

&lt;p&gt;Now we will discuss the Business email compromise attack. A business email compromises when an attacker hacks into a corporate email account and impersonates the real owner to defraud the company, its customer, partners, and employees into sending money or sensitive data to the attackers' account. A business email compromise is also a type of man in the middle attack.&lt;/p&gt;

&lt;p&gt;This is derived from the man in the middle attack where two parties think that they are talking to each other directly, but in reality, an attacker is listening in and possibly altering the communication.&lt;/p&gt;

&lt;p&gt;The attacker will try to gain access to the executive's email account. To remain undetected, He/She might use inbox rules or change the reply-to address so that when the scam is executed, the executive will not be alert. Another trick is to create an email with a spoofed domain.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--SCOrHWV6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/j5h3iy59zpqs0q3dxvgj.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--SCOrHWV6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/j5h3iy59zpqs0q3dxvgj.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For example, the attacker might use &lt;a href="mailto:john.smith@samp1e.com"&gt;john.smith@samp1e.com&lt;/a&gt; instead of &lt;a href="mailto:john.smith@sample.com"&gt;john.smith@sample.com&lt;/a&gt; {OR} use &lt;a href="mailto:john.smith@believeme.com"&gt;john.smith@believeme.com&lt;/a&gt; instead of &lt;a href="mailto:john.smith@beleiveme.com"&gt;john.smith@beleiveme.com&lt;/a&gt;. If you do not pay close attention, it is easy to get fooled by this slight difference.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--4xrx08dY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/i3yb6vvk43nqo4vx3vz5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--4xrx08dY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/i3yb6vvk43nqo4vx3vz5.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;One of the most famous spoofed domain tricks ever was PayPal.com, where the attacker changed the spelling from PayPa1.com.&lt;/p&gt;

&lt;h2&gt;How to stay away ?&lt;/h2&gt;

&lt;p&gt;Note: These are not the solutions to completely escape from these attacks, but it will help you up to some extent.&lt;br&gt;
" PREVENTION IS BETTER THAN CURE "&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--9txVOWUG--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/bek8g3axsyjxz4kgc9kf.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--9txVOWUG--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/bek8g3axsyjxz4kgc9kf.jpg" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Use an Internet Security Suite.&lt;/li&gt;
&lt;li&gt;Use Strong Passwords.&lt;/li&gt;
&lt;li&gt;Keep Your Software Up-to-Date.&lt;/li&gt;
&lt;li&gt;Avoid Identity Theft.&lt;/li&gt;
&lt;li&gt;Always Browse in Anonymous Mode.&lt;/li&gt;
&lt;li&gt;Use End-to-End Encrypted Messaging Apps.&lt;/li&gt;
&lt;li&gt;Use a VPN to Protect Yourself From Service Providers.&lt;/li&gt;
&lt;li&gt;Stay Private on Wi-Fi Networks.&lt;/li&gt;
&lt;li&gt;Stay away from clicking/opening unknown files/links.&lt;/li&gt;
&lt;li&gt;Take appropriate actions if you have been a Victim.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;b&gt;Written by - Gudi Varaprasad&lt;/b&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>ethical</category>
      <category>hacking</category>
      <category>networking</category>
    </item>
    <item>
      <title>Start using Brave Today!</title>
      <dc:creator>Gudi Varaprasad</dc:creator>
      <pubDate>Wed, 09 Dec 2020 15:10:49 +0000</pubDate>
      <link>https://forem.com/varaprasad_gudi/start-using-brave-today-3mng</link>
      <guid>https://forem.com/varaprasad_gudi/start-using-brave-today-3mng</guid>
      <description>&lt;h1&gt;Blockchain based browser :&lt;/h1&gt;

&lt;p&gt;In this blog, we will talk about a blockchain-based browser called &lt;b&gt;Brave browser.&lt;/b&gt;&lt;br&gt;
This came to revolutionize the world of today's advertising.&lt;/p&gt;

&lt;h2&gt;How does advertising work ?&lt;/h2&gt;

&lt;p&gt;There is an advertiser (a large company) who wants to market their products. They give their advertisements to a particular channel (say YouTube/Facebook). Now, as users watch the ads, and they don't get any money out of it. But YouTube gets it (a small half is paid to content creators) and, it earns a big amount out of this. This is how today's digital marketing works.&lt;/p&gt;

&lt;h2&gt;How Brave works ?&lt;/h2&gt;

&lt;p&gt;To get hold of this situation, Brave browser comes into the picture and, it eliminated all the advertising mediators (like YouTube/Facebook).&lt;br&gt;
What it does is - it directly takes the advertisements from large companies and then asks users whether they want to watch ads, and users get paid for their view time (money is split to users coming from the large company). Suppose if any user likes the content, he can send tips to the content creators. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;This is a direct market between advertiser and consumers.&lt;/li&gt;
&lt;li&gt;Incentivized customers to view ads.&lt;/li&gt;
&lt;li&gt;Advertiser pays customer directly.&lt;/li&gt;
&lt;li&gt;Incentivizes content creators to create more content.&lt;/li&gt;
&lt;li&gt;Similar Application : STEEM&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You will be amazed to know that, It will filter and block all annoying ads because brave uses such a good privacy algorithms to block whatever ads in YouTube, Facebook, Google, etc. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--x3gm0Pyb--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/wcepg90scoy2n9jfho79.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--x3gm0Pyb--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/wcepg90scoy2n9jfho79.PNG" alt="Brave"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you see the homepage of brave, It shows stats - how many ads trackers have been blocked, so many security measures like HTTP to HTTPS upgrades have been done, Bandwidth saved.&lt;/p&gt;

&lt;p&gt;It doesn't show the regular ads paid by any large companies but you will get paid for watching ads (The Basic Attention Token (BAT) is a blockchain-based system for tracking media consumers' time and attention on websites )&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_bdX2hRr--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/0pdaedipi9keqdjebt0p.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_bdX2hRr--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/0pdaedipi9keqdjebt0p.PNG" alt="Brave2"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Learn More : &lt;br&gt;
&lt;a href="https://brave.com/brave-rewards/"&gt;Brave rewards&lt;/a&gt;&lt;br&gt;
&lt;a href="https://steemit.com/"&gt;Steemit&lt;/a&gt;&lt;br&gt;
&lt;a href="https://d.tube/"&gt;DTube&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Written by - GVP&lt;/p&gt;

</description>
      <category>brave</category>
      <category>blockchain</category>
      <category>browser</category>
      <category>bitcoin</category>
    </item>
    <item>
      <title>OOPS made easy</title>
      <dc:creator>Gudi Varaprasad</dc:creator>
      <pubDate>Sun, 29 Nov 2020 07:33:15 +0000</pubDate>
      <link>https://forem.com/varaprasad_gudi/oops-made-easy-36pg</link>
      <guid>https://forem.com/varaprasad_gudi/oops-made-easy-36pg</guid>
      <description>&lt;h1&gt;What is OOP ?&lt;/h1&gt;

&lt;p&gt;Talking in technical terms, &lt;b&gt;Object-oriented programming System(OOPs)&lt;/b&gt; is a programming paradigm based on the concept of “objects” that contain data and methods. … Object-oriented programming brings together data and its behavior(methods) in a single location(object) makes it easier to understand how a program works.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Okay only 20 % of people can understand this term in this language so lets simplify this :&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;This was hard for me in the beginning but when I started implementing the concepts I learned, reading blogs, exploring real-life scenarios, it became easy for me. In this blog, I will make the concepts clear for everyone by giving real-life examples.&lt;/p&gt; 

&lt;h3&gt;1. Objects&lt;/h3&gt;

&lt;p&gt;Objects are identified by their unique name. An object represents a particular instance of a class. There can be more than one instance of an object. Each instance of an object can hold its own relevant data.
An Object is a collection of data members and associated member functions also known as methods.&lt;/p&gt;

&lt;h3&gt;2. Classes&lt;/h3&gt;

&lt;p&gt;Objects with similar properties and methods are grouped together to form a Class. Thus a Class represents a set of individual objects.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Example 1 :&lt;/b&gt; A House&lt;/p&gt;

&lt;p&gt;An architect will have the blueprints for a house….those blueprints will be plans that explain exactly what properties the house will have and how they are all laid out. However it is just the blueprint, you can’t live in it. Builders will look at the blueprints and use those blueprints to make a physical house. They can use the same blueprint to make as many houses as they want….each house will have the same layout and properties. Each house can accommodate its own families…so one house might have the Prasad live in it, one house might have the Jack live in it.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;1. Class        =  The blueprint of house&lt;/b&gt;&lt;br&gt;
&lt;b&gt;2. Object       =  The house&lt;/b&gt;&lt;br&gt;
&lt;b&gt;3. Data stored  =  Jack, Prasad, people living in house&lt;/b&gt;&lt;/p&gt;

&lt;h3&gt;3. Abstraction&lt;/h3&gt;

&lt;p&gt;Abstraction means showing essential features and hiding non-essential features to the user.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Example 2 :&lt;/b&gt; A T.V Remote&lt;/p&gt;

&lt;p&gt;Remote is a interface between user and TV.. which has buttons like 0 to 9 ,on/off etc. but we don’t know circuits inside remote. User does not need to know. Just he is using essential thing that is remote.&lt;/p&gt;

&lt;h3&gt;4. Encapsulation&lt;/h3&gt;

&lt;p&gt;It is done for security purposes.&lt;/p&gt;

&lt;h2&gt;Encapsulation = Abstraction + Data Hiding.&lt;/h2&gt;

&lt;p&gt;&lt;b&gt;Example 3 :&lt;/b&gt; A Car&lt;/p&gt;

&lt;p&gt;A car is having multiple parts..like steering, wheels, engine…etc..
which binds together to form a single object that is a car. So, Here multiple parts of cars encapsulate themselves together to form a single object that is Car.&lt;/p&gt;

&lt;h3&gt;5. Inheritance&lt;/h3&gt;

&lt;p&gt;Deriving a new class from the existing class is called Inheritance.
Derived(sub class) class is getting all the features from Existing (super class\base class) class and also incorporating some new features to the sub class.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fgyas48hlz3dp37fe6qb6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fi%2Fgyas48hlz3dp37fe6qb6.png" alt="Inheritance"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;6. Polymorphism&lt;/h3&gt;

&lt;p&gt;Ability to take more than one form that an operation can exhibit different behavior at different instance depend upon the data passed in the operation.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Example 4 :&lt;/b&gt; A Woman&lt;/p&gt;

&lt;p&gt;If a girl is married and mother of 2 children doing a teaching job then she is a woman first, a teacher in a school when she is in school, wife of someone at home, mother of her children, and obviously daughter of someone.&lt;/p&gt;



&lt;p&gt;&lt;b&gt;Summary :&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;We have talked about OOPs fundamentals Like Polymorphism, Encapsulation, Inheritance and classes with their respective examples.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Thanks For Reading !&lt;/b&gt;&lt;br&gt;
&lt;br&gt;&lt;/p&gt;

&lt;p&gt;Written by - GVP&lt;/p&gt;

</description>
      <category>oop</category>
      <category>programming</category>
      <category>computerscience</category>
      <category>codenewbie</category>
    </item>
    <item>
      <title>Create your own Virtual Writing Board - p5.js</title>
      <dc:creator>Gudi Varaprasad</dc:creator>
      <pubDate>Sat, 21 Nov 2020 10:40:09 +0000</pubDate>
      <link>https://forem.com/varaprasad_gudi/create-your-own-virtual-board-p5-js-2a4o</link>
      <guid>https://forem.com/varaprasad_gudi/create-your-own-virtual-board-p5-js-2a4o</guid>
      <description>&lt;h1&gt;My Writing Board&lt;/h1&gt;

&lt;p&gt;
This is a simple writing board created using concepts of keyframes, mouse events in computer graphics ( p5.js - a JavaScript library for drawing functionality ).
&lt;/p&gt;

&lt;h2&gt;How to use ?&lt;/h2&gt;

&lt;ul&gt;
    &lt;li&gt;Click &amp;amp; Drag to Draw with the help of mouse.&lt;/li&gt;
    &lt;li&gt;If it is a touch screen, draw slowly with your fingers or stylus pen.&lt;/li&gt;
    &lt;li&gt;Hit key &lt;b&gt;'r'&lt;/b&gt; on keyboard to Replay your sketch and to Continue drawing.&lt;/li&gt;
    &lt;li&gt;Hit key &lt;b&gt;'e'&lt;/b&gt; on keyboard to Erase / reset everything.&lt;/li&gt;
&lt;/ul&gt;



&lt;h1&gt;
&lt;a href="https://editor.p5js.org/GudiVaraprasad/full/wyWLNkvjR"&gt;Give it a try here&lt;/a&gt;
&lt;/h1&gt;

&lt;h2&gt;Source Code : &lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight javascript"&gt;&lt;code&gt;
&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;drawing&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;[];&lt;/span&gt;
&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;recorded&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;[];&lt;/span&gt;
&lt;span class="kd"&gt;let&lt;/span&gt; &lt;span class="nx"&gt;frames&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;

&lt;span class="kd"&gt;function&lt;/span&gt; &lt;span class="nx"&gt;setup&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nx"&gt;createCanvas&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;windowWidth&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;windowHeight&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="kd"&gt;function&lt;/span&gt; &lt;span class="nx"&gt;mousePressed&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nx"&gt;drawing&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;push&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="k"&gt;new&lt;/span&gt; &lt;span class="nx"&gt;Path&lt;/span&gt;&lt;span class="p"&gt;());&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="kd"&gt;function&lt;/span&gt; &lt;span class="nx"&gt;mouseDragged&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nx"&gt;drawing&lt;/span&gt;&lt;span class="p"&gt;[&lt;/span&gt;&lt;span class="nx"&gt;drawing&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;length&lt;/span&gt; &lt;span class="o"&gt;-&lt;/span&gt; &lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="p"&gt;].&lt;/span&gt;&lt;span class="nx"&gt;points&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;push&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="k"&gt;new&lt;/span&gt; &lt;span class="nx"&gt;Point&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;mouseX&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;mouseY&lt;/span&gt;&lt;span class="p"&gt;));&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="kd"&gt;function&lt;/span&gt; &lt;span class="nx"&gt;keyPressed&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;key&lt;/span&gt; &lt;span class="o"&gt;==&lt;/span&gt; &lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="s2"&gt;r&lt;/span&gt;&lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="nx"&gt;recorded&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;push&lt;/span&gt;&lt;span class="p"&gt;(...&lt;/span&gt;&lt;span class="nx"&gt;drawing&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="nx"&gt;drawing&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;splice&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="nx"&gt;frames&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
  &lt;span class="p"&gt;}&lt;/span&gt; &lt;span class="k"&gt;else&lt;/span&gt; &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;key&lt;/span&gt; &lt;span class="o"&gt;==&lt;/span&gt; &lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="s2"&gt;e&lt;/span&gt;&lt;span class="dl"&gt;"&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="nx"&gt;recorded&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;splice&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="nx"&gt;drawing&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;splice&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="nx"&gt;frames&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
  &lt;span class="p"&gt;}&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="kd"&gt;function&lt;/span&gt; &lt;span class="nx"&gt;draw&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="nx"&gt;background&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;255&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;255&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="mi"&gt;153&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
  &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;path&lt;/span&gt; &lt;span class="k"&gt;of&lt;/span&gt; &lt;span class="nx"&gt;drawing&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="nx"&gt;stroke&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="nx"&gt;strokeWeight&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;2&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="nx"&gt;noFill&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;
    &lt;span class="nx"&gt;beginShape&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;
    &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;v&lt;/span&gt; &lt;span class="k"&gt;of&lt;/span&gt; &lt;span class="nx"&gt;path&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;points&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
      &lt;span class="nx"&gt;vertex&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;v&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;x&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;v&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;y&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
    &lt;span class="p"&gt;}&lt;/span&gt;
    &lt;span class="nx"&gt;endShape&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;
  &lt;span class="p"&gt;}&lt;/span&gt;
  &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;path&lt;/span&gt; &lt;span class="k"&gt;of&lt;/span&gt; &lt;span class="nx"&gt;recorded&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;frames&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;=&lt;/span&gt; &lt;span class="nx"&gt;path&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;time&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
      &lt;span class="nx"&gt;stroke&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
      &lt;span class="nx"&gt;strokeWeight&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="mi"&gt;2&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
      &lt;span class="nx"&gt;noFill&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;
      &lt;span class="nx"&gt;beginShape&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;
      &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="kd"&gt;const&lt;/span&gt; &lt;span class="nx"&gt;v&lt;/span&gt; &lt;span class="k"&gt;of&lt;/span&gt; &lt;span class="nx"&gt;path&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;points&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
        &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;frames&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;=&lt;/span&gt; &lt;span class="nx"&gt;v&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;time&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="nx"&gt;vertex&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;v&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;x&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;v&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;y&lt;/span&gt;&lt;span class="p"&gt;);&lt;/span&gt;
      &lt;span class="p"&gt;}&lt;/span&gt;
      &lt;span class="nx"&gt;endShape&lt;/span&gt;&lt;span class="p"&gt;();&lt;/span&gt;
    &lt;span class="p"&gt;}&lt;/span&gt;
  &lt;span class="p"&gt;}&lt;/span&gt;
  &lt;span class="nx"&gt;frames&lt;/span&gt;&lt;span class="o"&gt;++&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="kd"&gt;class&lt;/span&gt; &lt;span class="nx"&gt;Point&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="kd"&gt;constructor&lt;/span&gt;&lt;span class="p"&gt;(&lt;/span&gt;&lt;span class="nx"&gt;x&lt;/span&gt;&lt;span class="p"&gt;,&lt;/span&gt; &lt;span class="nx"&gt;y&lt;/span&gt;&lt;span class="p"&gt;)&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="k"&gt;this&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;x&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nx"&gt;x&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
    &lt;span class="k"&gt;this&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;y&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nx"&gt;y&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
    &lt;span class="k"&gt;this&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;time&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nx"&gt;frames&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
  &lt;span class="p"&gt;}&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="kd"&gt;class&lt;/span&gt; &lt;span class="nx"&gt;Path&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
  &lt;span class="kd"&gt;constructor&lt;/span&gt;&lt;span class="p"&gt;()&lt;/span&gt; &lt;span class="p"&gt;{&lt;/span&gt;
    &lt;span class="k"&gt;this&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;points&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="p"&gt;[];&lt;/span&gt;
    &lt;span class="k"&gt;this&lt;/span&gt;&lt;span class="p"&gt;.&lt;/span&gt;&lt;span class="nx"&gt;time&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="nx"&gt;frames&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
  &lt;span class="p"&gt;}&lt;/span&gt;
&lt;span class="p"&gt;}&lt;/span&gt;

&lt;span class="c1"&gt;// Gudi Varaprasad&lt;/span&gt;

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;





&lt;p&gt;&lt;strong&gt;&lt;em&gt;© 2020 GVP, All rights reserved&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>p5js</category>
      <category>javascript</category>
      <category>animation</category>
    </item>
    <item>
      <title>Hotel Key Management</title>
      <dc:creator>Gudi Varaprasad</dc:creator>
      <pubDate>Tue, 20 Oct 2020 17:02:26 +0000</pubDate>
      <link>https://forem.com/varaprasad_gudi/hotel-key-management-3id</link>
      <guid>https://forem.com/varaprasad_gudi/hotel-key-management-3id</guid>
      <description>&lt;h1&gt;
  
  
  Hotel Room Locking System - Affine Hotels
&lt;/h1&gt;

&lt;p&gt;Security is one of the primary concerns for customers in a hotel. Traditional lock and key systems are exposed to a lack of safety to our belongings.&lt;/p&gt;

&lt;p&gt;This project aims at creating a hotel room locking system for the guests who wish to have a secure stay. Access control is the basis for the automation of hotels and apartments in the current time.  An efficient method of generating a unique encrypted password for each guest ensures tight security and reduces the risk of robbery. It is implemented as a graphical user interface system that involves locking and unlocking of the hotel room door through room-key security swiping machine.&lt;/p&gt;

&lt;p&gt;Access to the room is granted only if the guest swipes his key and enters the password which was generated uniquely for him. The generation of this particular password is done for the first time when he books the hotel room. It involves the concepts of affine cipher encryption. And when it comes to this type of encryption system we can assure the customers of a higher level of security, because hacking of the mathematical function used in generating the password is very tedious and time-consuming.&lt;br&gt;
&lt;br&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  How to use Security Swiper?
&lt;/h1&gt;

&lt;ol&gt;
&lt;li&gt;Dear Guest, Please kindly follow these security guidelines for your safety.&lt;/li&gt;
&lt;li&gt;You have reached your room and you will find your hotel room key in the security swiper.&lt;/li&gt;
&lt;li&gt;Initial access is granted to enter your room.&lt;/li&gt;
&lt;li&gt;Now, Please enter your name for the first time only.&lt;/li&gt;
&lt;li&gt;Click on Generate Password and kindly wait for 5 seconds.&lt;/li&gt;
&lt;li&gt;Now, an encrypted password is generated using Encryption algorithms.&lt;/li&gt;
&lt;li&gt;To lock your room, close the door properly and pull your hotel room key out of the swiper.&lt;/li&gt;
&lt;li&gt;Kindly donot share your password and please remember this for next unlock of your hotel room.&lt;/li&gt;
&lt;li&gt;When you want to unlock and enter back into your room, Slide the room key into the swiper machine.&lt;/li&gt;
&lt;li&gt;Enter your last generated Password and click on Unlock the Door.&lt;/li&gt;
&lt;li&gt;Kindly, Accept our terms &amp;amp; conditions by clicking on the below button.&lt;/li&gt;
&lt;li&gt;Have a Secured Stay !!&lt;/li&gt;
&lt;li&gt;Thank you for choosing Affine Hotels !&lt;/li&gt;
&lt;/ol&gt;
  

&lt;p&gt;&lt;a href="https://gudivaraprasad.github.io/Affine-Hotels/index.html"&gt;&lt;b&gt;Project Demo&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/GudiVaraprasad/Affine-Hotels/"&gt;&lt;b&gt;Source Code&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/1YSMLv4r9m0"&gt;&lt;b&gt;Youtube Tutorial&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;© 2020 GVP, All rights reserved&lt;/em&gt;&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>javascript</category>
      <category>webdev</category>
      <category>cryptography</category>
    </item>
    <item>
      <title>How to earn with Coding ?</title>
      <dc:creator>Gudi Varaprasad</dc:creator>
      <pubDate>Sat, 27 Jun 2020 16:44:23 +0000</pubDate>
      <link>https://forem.com/varaprasad_gudi/how-to-earn-with-coding-2161</link>
      <guid>https://forem.com/varaprasad_gudi/how-to-earn-with-coding-2161</guid>
      <description>&lt;h1&gt;Let's find out, how ?&lt;/h1&gt;



&lt;br&gt;
Coding has become an important aspect in today's trend. It would be interesting to know how these skills can be implemented in order to earn our Livelihood. There are several ways to earn with your coding skills. Let's find out, how ?&lt;br&gt;
&lt;br&gt;

&lt;h2&gt;
&lt;u&gt;Freelancing&lt;/u&gt; :&lt;/h2&gt;

&lt;p&gt;This is no.1 way to earn with any skill. Freelancing is basically a different way to work. Rather than being employed by a company in one specific job, freelancers are self-employed and find work via a variety of sources. Clients hire a freelancer to complete a task, project, or service for them.&lt;br&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--2FUHkXwi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://piidmpune.com/wp-content/uploads/2019/03/career-in-freelancing.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--2FUHkXwi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://piidmpune.com/wp-content/uploads/2019/03/career-in-freelancing.png" alt="Freelancing"&gt;&lt;/a&gt; &lt;br&gt;&lt;br&gt;
&lt;b&gt;Platforms to start -&lt;/b&gt;&lt;/p&gt;

&lt;ol&gt;
    &lt;li&gt;&lt;a href="https://www.upwork.com/"&gt;Upwork&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.upwork.com/"&gt;Guru&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.fiverr.com/"&gt;Fiverr&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.toptal.com/"&gt;Toptal&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.upwork.com/"&gt;Freelancer&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;



&lt;h2&gt;
&lt;u&gt;Blogging&lt;/u&gt; :&lt;/h2&gt;

&lt;p&gt;Blogging refers to writing, photography, and other media that's self-published online. Blogging started as an opportunity for individuals to write diary-style entries, but it has since been incorporated into websites for many businesses. The hallmarks of blogging include frequent updates, informal language, and opportunities for readers to engage and start a conversation. Write blogs and earn a good amount, many bloggers around the globe are earning millions too. &lt;br&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--19bSyRlL--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://mllj2j8xvfl0.i.optimole.com/Lsv2lkg-rsPnlO6Q/w:auto/h:auto/q:98/https://s15165.pcdn.co/wp-content/uploads/2018/03/free-blogging-sites.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--19bSyRlL--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://mllj2j8xvfl0.i.optimole.com/Lsv2lkg-rsPnlO6Q/w:auto/h:auto/q:98/https://s15165.pcdn.co/wp-content/uploads/2018/03/free-blogging-sites.png" alt="Blogging"&gt;&lt;/a&gt; &lt;br&gt;&lt;br&gt;
&lt;b&gt;Platforms to start -&lt;/b&gt;&lt;/p&gt;

&lt;ol&gt;
    &lt;li&gt;&lt;a href="https://wordpress.com/?aff=4236"&gt;Wordpress&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.blogger.com/"&gt;Blogger&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://dev.to/"&gt;Dev&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://medium.com/creators"&gt;Medium&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.wix.com/blog/"&gt;Wix site&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;



&lt;h2&gt;
&lt;u&gt;Work for locals :&lt;/u&gt; :&lt;/h2&gt;

&lt;p&gt;Everyone wants to upgrade their business with website/app/software. But not everyone knows how to develop these. Take the opportunity and develop websites for locals. &lt;br&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ksUperaC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://static.vecteezy.com/system/resources/thumbnails/001/044/885/original/man-working-from-home-in-an-online-meeting.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ksUperaC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://static.vecteezy.com/system/resources/thumbnails/001/044/885/original/man-working-from-home-in-an-online-meeting.jpg" alt="Work for locals"&gt;&lt;/a&gt; &lt;br&gt;&lt;br&gt;
&lt;br&gt;&lt;/p&gt;

&lt;h2&gt;
&lt;u&gt;Teaching&lt;/u&gt; :&lt;/h2&gt;

&lt;p&gt;Online teaching typically refers to courses that are delivered completely online, meaning there are no physical or on-campus class sessions. Online courses can be designed for a handful of enrolled students or can be made open and accessible to a wide variety of participants, such as with a MOOC. If you have relevant skills, you can teach with organisations and earn good amount as a part time job.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--APF5Ua4J--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://www.keystoneacademic.com/hubfs/Online%2520Teaching%2520-%2520Blog%2520Cover%2520Image.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--APF5Ua4J--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://www.keystoneacademic.com/hubfs/Online%2520Teaching%2520-%2520Blog%2520Cover%2520Image.png" alt="Teaching"&gt;&lt;/a&gt; &lt;br&gt;&lt;br&gt;
&lt;b&gt;Platforms to start -&lt;/b&gt;&lt;/p&gt;

&lt;ol&gt;
    &lt;li&gt;&lt;a href="https://eduyear.com/"&gt;Eduyear&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.coursera.org/"&gt;Coursera&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.udemy.com/"&gt;Udemy&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.youtube.com/"&gt;Youtube&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;



&lt;h2&gt;
&lt;u&gt;Coding Contests&lt;/u&gt; :&lt;/h2&gt;

&lt;p&gt;You can participate in coding contests happening around the world and earn exciting prizes.&lt;br&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--FDDx9s6r--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://www.codechef.com/download/small-banner/ICL2019/1553684195.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--FDDx9s6r--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://www.codechef.com/download/small-banner/ICL2019/1553684195.jpg" alt="Coding Contests"&gt;&lt;/a&gt; &lt;br&gt;&lt;br&gt;
&lt;b&gt;Platforms to compete -&lt;/b&gt;&lt;/p&gt;

&lt;ol&gt;
    &lt;li&gt;&lt;a href="https://www.hackerrank.com/contests"&gt;Hackerrank&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.topcoder.com/challenges"&gt;TopCoder&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.hackerearth.com/challenges/"&gt;Hackerearth&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.codechef.com/contests"&gt;Codechef&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;



&lt;h2&gt;
&lt;u&gt;Bug Bounty or Penetration Testing&lt;/u&gt; :&lt;/h2&gt;

&lt;p&gt;A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. This is not an easy to crack, you need lot of skills. Bug hunters can earn a lot of money by reporting security vulnerabilities to companies and government agencies that run bug bounty programs. HackerOne has paid out over $40,000,000 in bounties to whitehat hackers around the world. The most well-paid hacker on &lt;a href="https://www.hackerone.com/press-release/six-hackers-break-bug-bounty-record-earning-over-1-million-each-hackerone#:~:text=Thanks%20to%20these%20six%20hackers,million%20with%20bug%20bounty%20programs."&gt;h1&lt;/a&gt; has earned $1 million.&lt;br&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--O4mGYabH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://internetseekho.com/wp-content/uploads/2020/04/bug-bounty-hunter.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--O4mGYabH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://internetseekho.com/wp-content/uploads/2020/04/bug-bounty-hunter.png" alt="Hacking"&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;
&lt;b&gt;Platforms to try -&lt;/b&gt;&lt;/p&gt;

&lt;ol&gt;
    &lt;li&gt;&lt;a href="https://www.hackerone.com/"&gt;Hackerone&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.bugcrowd.com/"&gt;bugcrowd&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.synack.com/"&gt;Synack&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.cyberlympics.org/"&gt;Hacking&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;



&lt;h2&gt;
&lt;u&gt;Write an e-book&lt;/u&gt; :&lt;/h2&gt;

&lt;p&gt;People are earning hefty amounts by writing e-books. Just start and show your skills.&lt;br&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--GFL6p3b6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://www.nichepursuits.com/wp-content/uploads/2018/03/194052_eBookHeader_3_030618.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--GFL6p3b6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://www.nichepursuits.com/wp-content/uploads/2018/03/194052_eBookHeader_3_030618.png" alt="e-book"&gt;&lt;/a&gt; &lt;br&gt;&lt;br&gt;
&lt;br&gt;&lt;br&gt;
&lt;br&gt;&lt;br&gt;
&lt;b&gt;How to start ???????&lt;/b&gt;&lt;br&gt;
Interested in Learning Programming or Confused to start which programming language. We are here for you. This &lt;a href="https://gudivaraprasad.github.io/Projects/Programming_Language_Recommender/index.html"&gt;Tool&lt;/a&gt; will help you to choose which programming language to start and it will guide you accordingly.&lt;br&gt;
&lt;br&gt;&lt;/p&gt;

&lt;h4&gt;This page is contributed by © &lt;a href="https://www.linkedin.com/in/varaprasad-gudi-0007b4129/"&gt;GVP&lt;/a&gt;
&lt;/h4&gt;





&lt;h5&gt;THANKS FOR READING..... Please Like it.&lt;/h5&gt;

</description>
      <category>codenewbie</category>
      <category>earnonline</category>
      <category>beginners</category>
      <category>blog</category>
    </item>
    <item>
      <title>Building a Programming Language Recommendation Tool</title>
      <dc:creator>Gudi Varaprasad</dc:creator>
      <pubDate>Tue, 09 Jun 2020 06:11:26 +0000</pubDate>
      <link>https://forem.com/varaprasad_gudi/building-a-programming-language-recommendation-tool-javascript-projects-for-beginners-ne4</link>
      <guid>https://forem.com/varaprasad_gudi/building-a-programming-language-recommendation-tool-javascript-projects-for-beginners-ne4</guid>
      <description>&lt;h1&gt;&lt;b&gt;&lt;u&gt;Programming Language Recommender&lt;/u&gt;&lt;/b&gt;&lt;/h1&gt;

&lt;p&gt;This Javascript based web tool will help you to choose the best programming language that suits you, If you are struck in your life or starting as a beginner, this web tool is perfect for you. Programming has become a vital element in every CSE Student's Life. When you want to start your career as a Web Developer or Software Developer or an Ethical Hacker, but you don't know how to choose, We are here for you. Just simply follow the instructions.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fbbvaopen4u.com%2Fsites%2Fdefault%2Ffiles%2Fimg%2Fnew%2Frecursosprogramadores.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fbbvaopen4u.com%2Fsites%2Fdefault%2Ffiles%2Fimg%2Fnew%2Frecursosprogramadores.png" alt="important"&gt;&lt;/a&gt;&lt;/p&gt;



&lt;h3&gt;How to use this Tool ?&lt;/h3&gt;

&lt;ol&gt;
    &lt;li&gt;Explore different fields in Computer Science.&lt;/li&gt;
    &lt;li&gt;Come back again to this website and think to choose an option listed below.&lt;/li&gt;
    &lt;li&gt;Choose the best option that suits your goal. &lt;/li&gt;
    &lt;li&gt;Now, Click on Continue..&lt;/li&gt;
    &lt;li&gt;Your result is displayed below Recommender : &lt;/li&gt;
    &lt;li&gt;If you like this, share this link to your friends...&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://www.linkedin.com/in/varaprasad-gudi-0007b4129/" rel="noopener noreferrer"&gt;&lt;u&gt;For more details&lt;/u&gt; :&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Liked it, watch out a video on this - &lt;a href="https://youtu.be/ZpdMjmuI0EE" rel="noopener noreferrer"&gt;here&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;The link to the tool is &lt;a href="https://gudivaraprasad.github.io/Projects/Programming_Language_Recommender/index.html" rel="noopener noreferrer"&gt;here&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;Get Source code at &lt;a href="https://github.com/GudiVaraprasad/Projects/blob/master/Programming_Language_Recommender/index.html" rel="noopener noreferrer"&gt;GITHUB&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;&lt;h4&gt;This tool is designed by © &lt;a href="https://github.com/GudiVaraprasad" rel="noopener noreferrer"&gt;GVP&lt;/a&gt;
&lt;/h4&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;-An unrecognized creative Web designer &lt;a href="https://github.com/GudiVaraprasad" rel="noopener noreferrer"&gt;@GVP&lt;/a&gt;&lt;/p&gt;

</description>
      <category>codenewbie</category>
      <category>javascript</category>
      <category>webapp</category>
      <category>programming</category>
    </item>
  </channel>
</rss>
