Translate

Wednesday, May 8, 2019

Ways To Be Anonymous Online :



Hi do you want to be anonymous online to view blocked websites, protect your self from hackers or want to hack some one
and stay un-traced?. In the following post i will explain 4 easy ways by which you can stay anonymous online!

1. Using Proxies
A proxy is an address ( IP address ) of a Server (proxy server) that is placed between your computer and the Internet The advantage of a proxy is that your real IP address is Hidden so when you hack your giving the IP address of the proxy sever and not your real IP address Same way if your a normal Internet user the hacker won't get your real IP but the IP of the proxy server.You can use it to enter site or forum that you are IP is banned. To know more about proxies les me know above this post and I will post a full Tutorial about it.


2. Using Tor
Tor-proxy is a free proxy-server service that Internet users can use to hide their IP address while surfing the Web. Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic
t4 Ways To Be Anonymous Online : DataBuster
Want to be anonymous online to view blocked websites, protect your self from hackers or want to hack some one
and stay un-traced?. In the following post i will explain 4 easy ways by which you can stay anonymous online!
PDF By : @DataBusterz Click To Join For More Trick
1. Using Proxies
A proxy is an address ( IP address ) of a Server (proxy server) that is placed between your computer and
the
Internet The advantage of a proxy is that your real IP address is Hidden so when you hack your giving the IP
address of the proxy sever and not your real IP address Same way if your a normal Internet user the hacker
won't get your real IP but the IP of the proxy server.You can use it to enter site or forum that you are IP is
banned. To know more about proxies les me know above this post and I will post a full Tutorial about it. 2. Using Tor
Tor-proxy is a free proxy-server service that Internet users can use to hide their IP address while surfing
the Web. Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic
through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a
user's
location or usage from anyone. I have written a complete How to guide on how to use tor - just let me know
if
you need it
3. SSH Tunneling
SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used
to
tunnel unencrypted traffic over a network through an encrypted channel.In easy language,you can surf net
without being monitored and even surf blocked sites too. To know more about SSH and SSH tunneling let
me know
if you would like to read: SSH tunneling guide. 4. Using VPN
Virtual Private Network. Basically its a private network which lets users to connect to other users or remote
sites using a public network usually internet. It uses “virtual” connections routed through the Internet from
the company's private network to the remote site or employee instead of physical connections. In short, it
is
private network constructed within a public network infrastructure, such as the global Internet. The Biggest
difference between proxy and VPN is everything in a VPN is encrypted which gives an additional layer of
security.hrough a free, worldwide volunteer network consisting of more than three thousand relays to conceal a
user's
location or usage from anyone. I have written a complete How to guide on how to use tor - just let me know
if
you need it


3. SSH Tunneling

SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used
to
tunnel unencrypted traffic over a network through an encrypted channel.In easy language,you can surf net
without being monitored and even surf blocked sites too. To know more about SSH and SSH tunneling let
me know
if you would like to read: SSH tunneling guide.

4. Using VPN (Virtual Private Network)

Basically its a private network which lets users to connect to other users or remote
sites using a public network usually internet. It uses “virtual” connections routed through the Internet from
the company's private network to the remote site or employee instead of physical connections. In short, it
is
private network constructed within a public network infrastructure, such as the global Internet. The Biggest
difference between proxy and VPN is everything in a VPN is encrypted which gives an additional layer of
security.

Sunday, March 31, 2019

PravySoft Home


Number one project center.Main office at calicut and dealing with Electronics as well as Computer science projects

Websites: 
Please visit our websites for more details
http://pravysoft.org


Want to know latest Electronics and Computer science projects for Academic purpose, or you need a free advice from our technical advisers then contact us.
Email:  info.pravysoft@gmail.com

Contact number: 09995600679



News:SECURED BEST ROBOTIC PROJECT-2012 AWARD FROM IUAPPC,GOV: INDIA

JAVA,PHP,ANDROID, VLSI,ASP,C#.NET,VB.NET, Embedded System Projects

PravySoft is a Group of Partners, Colleagues and Associates from Business, Education, Government, Industry and the Sciences with wide ranging experience in High Technology projects.our services available at Calicut,Kochi,Kannur and Trivandram. 

PravySoft provides customers with Technology Consulting, Technology Contracting, Systems Integration, Project Management, and Research and Development Services. We work closely with our clients to help them define their problems and to develop a cost effective strategy to meet their needs.

The founder of PravySoft is Mr.Praveen Thappily. We provide Electronics as well as Computer projects. We believe in open source concept so many of our software/projects packages are available for you without any fee...

You will get PHP, C#.NET, VB.NET, ASP.NET,JAVA, Android projects from us....

If you want electronics projects like Embedded system, VLSI, DSP projects please contact us we will give you circuit diagrams and abstracts of great/new projects. We are dealing M.Sc ,B.Sc, B.tec, M.tec. Ph.D final year  projects. Diploma projects are also available here.


Want to know ethical hacking. We are also providing classes for ethical hacking.






Wireless LANs and WANs (local and wide area networks) for data collection and sales force automation, including the use of PDAs (personal digital assistants with bar code readers, laser scanners…)

To contact us(For Projects,To become our client,Need Free embedded system,VLSI training) just email us.


Contact number:9995600679

info.pravysoft@gmail.com

WEBSITES

http://pravysoft.org 


We are in "MALAYALA MANORAMA" news click here to read ePaper  

Wednesday, January 9, 2019

NTA NET NEW SYLLABUS ELECTRONICS

UGC-NTA NET ELECTRONIC SCIENCE NEW SYLLABUS (2019 onwards)
Unit – I :
Introduction to Semiconductor, energy bands in solids, concept of effective mass, density of states, Fermi levels.  PN  Junction,  Diode  equation  and  diode  equivalent  circuit,  Breakdown  in  diodes,  Zener  diode, Tunnel  diode,  Metal  semiconductor  junction  –  Ohmic  and  Schottky  contacts,  Characteristics  and equivalent  circuits  of  JFET,  MOSFET.  Low  dimensional  semiconductor  devices  –  quantum  wells, quantum   wires,   quantum   dots.   High   Electron   Mobility   Transistor   (HEMT),   Solar   cells   –   I-V characteristics, fill factor and efficiency, LED, LCD and flexible display devices. Emerging materials for future Devices: Graphene, Carbon Nano tubes (CNT), ZnO, SiC etc.
CLICK HERE TO GET STUDY MATERIAL
Unit-II :
IC  fabrication  –  crystal  growth,  epitaxy,  oxidation,  lithography,  doping,  etching,  isolation  methods, metallization, bonding, Thin film deposition and characterization Techniques: XRD, TEM, SEM, EDX, Thin film active and passive devices, MOS technology and VLSI, scaling of MOS devices, NMOS and CMOS structures and fabrication, Characteristics of MOS transistors and threshold voltage, NMOS and CMOS inverters, Charge-Coupled Device (CCD) – structure, charge storage and transfer, Basics of VLSI design, stick diagrams, Layout design rules.
Unit – III :

Continuous  time  signals,  Fourier  Series  and  Fourier  transform  representations,  Sampling  theorem  and applications, Discrete time signal, Discrete Fourier transform (DFT), Fast Fourier transform (FFT), Basic concepts of digital signal processing, digital filters – IIR, FIR.

CLICK HERE TO GET STUDY MATERIAL
Unit – IV :
Rectifiers, Voltage regulated ICs and regulated power supply, Biasing of Bipolar junction transistors and FETs,  operating  point  and  stability,  Amplifiers,  Classification  of  amplifiers,  Concept  of  feedback, Hartley,   Colpitt’s   and   Phase   Shift   oscillators,   Operational   amplifiers   (OPAMP)   -   characteristics, computational  applications,  comparators,  Schmitt  trigger,  Instrumentation  amplifiers,  wave  shaping circuits,  Phase  locked  loops,  Active  filters,  Multivibrators,  Voltage  to  frequency  convertors  (V/F), frequency to voltage convertors (F/V).
CLICK HERE TO GET STUDY MATERIAL
Unit – V :
Logic  Families,  Logic  Gates,  Boolean  algebra  and  minimization  techniques,  Combinational  circuits, Programmable Logic Devices (PLD), CPLD, flip-flops, memories, Sequential Circuits: Counters – Ring, Ripple,  Synchronous,  Asynchronous,  Shift  registers,  multiplexers  and  demultiplexers,  A/D  and  D/A converters,  Analysis  and  Design  of  fundamental  mode  state  machines:  State  variables,  State  table  and State diagram. Sequential PLD, FPGA, Analysis and Design of digital circuits using HDL.
CLICK HERE TO GET STUDY MATERIAL
Unit – VI :
Introduction of Microprocessor 8086: Architecture, Addressing modes, instruction set, interrupts, Programming, Memory and I/O interfacing. Introduction  of  Microcontrollers   –  8051  for  embedded  systems,  Architecture  and  register  set   of Microcontroller 8051, Addressing modes, Instruction set of 8051 – Data transfer instructions, Arithmetic instructions,  Logic  instructions,  bit  level  and  byte  level  control  transfer  instructions,  8051  assembly programming – stack operations, subroutines, interrupts, 8051 programming as timer/counter, 8051 serial communication, 8051 interfacing RS232, LED/LCD display, Keyboard , Stepper motor.
CLICK HERE TO GET STUDY MATERIAL
Unit – VII :
Electrostatics  -  vector  calculus,  Gauss’s  Law,  Laplace  and  Poisson’s  equations,  Magnetostatics  –  Biot Savert’s  law,  Ampere’s  law  and  electromagnetic  induction,  Maxwell’s  equations  and  wave  equations, Plane  wave  propagation  in  free  space,  dielectrics  and  conductors,  Poynting  theorem,    Reflection  and refraction, polarization, interference, coherence and diffraction, Transmission lines and waveguides – line equations, impedance, reflections and voltage standing wave ratio, rectangular waveguides. Antennas – retarded  potential  and  Hertzian  dipole,  half  wave  antenna,  antenna  patterns,  radiation  intensity,  gain, effective area and Frii’s free space receiver power equation
Microwave  Sources  and  Devices  -Reflex  Klystron,  Magnetron,  TWT,  Gunn  diode,  IMPATT  diode, Crystal Detector and PIN diode.
Radar – block diagram of Radar, frequencies and power used, Radar range equation.
CLICK HERE TO GET STUDY MATERIAL
Unit – VIII :
Analog  modulation  and  demodulation  -  AM,  FM  and  PM,  Principle  of  super  heterodyne  receiver, Random signals, noise, noise temperature and noise figure, Basic concepts of information theory, Error detection and correction, Digital modulation and demodulation – PCM, ASK, FSK, PSK, BPSK, QPSK and    QAM,    Time    and    Frequency-Division    Multiplexing,    Multiple    Access    techniques,    Data Communications   –   Modems,   Codes,   Principles   of   Mobile   and   Satellite   Communication,   Optical communication,  Optical  sources  -  LED,  spontaneous  and  stimulated  emission,  semiconductor  Lasers, Detectors – PIN photodiodes, Avalanche photodiodes (APD), Optical fibers – attenuation and dispersion characteristics,  Bandwidth, Wavelength division multiplexing.
Fundamentals of Internet of Things (IoT) for communication.

CLICK HERE TO GET STUDY MATERIAL
Unit – IX :
Power devices – characteristics of SCR, DIAC, TRIAC, power transistors, Protection of thyristors against over voltage and over current. SCR triggering - dv/dt and di/dt, triggering with single pulse and train of pulses, A.C. and D.C. motors - construction and speed control. Switched Mode Power Supply (SMPS). Uninterrupted Power Supply (UPS).
Open  loop  and closed loop  control  system,  Block Diagram reduction techniques,  transfer function  and signal flow diagram, Stability criterion: Routh-Hurwitz and Nyquist plot, On-off controller, Proportional (P), Proportional-Integral (PI), Proportional-Derivative (PD), PID controllers.
Unit – X :
Transducers   –   Resistance,   Inductance,   Capacitance,   Piezoelectric,   Thermoelectric,   Hall    effect, Photoelectric,   Measurement  of  displacement,  velocity,  acceleration,  force,  torque,  strain,  temperature, pressure, flow, humidity, thickness, pH. Measuring Equipment – Measurement of R, L and C, Bridge and Potentiometers,  voltage,  current,  power,  energy,  frequency/time,  phase,  Digital  Multimeters,  CRO, Digital Storage Oscilloscope,  Spectrum Analyzer., Biomedical Instruments – ECG, EEG, Blood Pressure Measurements, MEMS and its applications Sensors for IoT applications.
CLICK HERE TO GET STUDY MATERIAL

Wednesday, October 24, 2018

UGC NET ELECTRONICS ANDROID APP for FREE

Application to study UGC NET ELECTRONICS

To use this application user needs to subscribe modules from our website 
http://pravysoft.org/moodle/course/index.php?categoryid=2

UGC NET ELECTRONICS APP
 

Main features of our ezine

Complete syllabus coverage, as per UGC/CBSE (Specially prepared for NET examination).

One and only one book available for UGC NET Electronics exam, which covers complete syllabus.

(Other market available books are prepared for gate exam and simply changed title as UGC NET. Please read the purchased users comments before buying such books, also such books covers 20% of syllabus only).


Regular update: You will get latest contents always.

Module wise arrangement (Subscribe that module, you really want)

Payment Gateway Support (Internet banking, credit, debit, airtel money, Payumoney, JIO money support)

Mock tests are available.

Now support Android / iOS browsers also.
 

Spot activation, you will get the online material immediately after subscription. Study now, don't waste time for shopping and shipping!


This application will help "enrolled users" to read the materials in android platform.

if you want to subscribe modules please visit


 http://pravysoft.org/moodle/course/index.php?categoryid=2


 Download APP 

https://play.google.com/store/apps/details?id=com.pravymon.NET_EZINE


https://play.google.com/store/apps/details?id=com.pravymon.NET_EZINE


P learn Kids : Best Android app for kids

P-Learn Kids: Scientifically proven technology for kids learning.


Best app for kids under 5 years

 

This scientifically tested app is like a puzzle game which helps your kids develop matching, tactile and fine motor skills. Your child will see various animals including cow, horse,elephant, lion etc.


It will speech out the name of the animal and the kid want to drag and place it in the matching shadow. It is a fun and educational learning game for preschool children and toddlers including those with autism.






Features

  • Animal picture

  • Animal puzzle

  • Animal name speech

  • Animal name spelling

  • Animal sound
Best kids learning app.


 Free Download

https://play.google.com/store/apps/details?id=com.pravymon.PLearnKids 


Saturday, January 28, 2017

Web developers/ Students don't save your plain password in the database. There exists a chance for HACKING!

Web developers/ Students don't save your plain password in the database. There is a chance for HACKING!

Last week, I had checked a couple of companies website's source codes to shield them from hacking. It  has been seen that, they are using plain password (as shown in the screenshot below) in their database. That is you can see the password of all registered users in the database using any database tool like PHPMYADMIN, SQLYOG etc. It can be noted that many users, using the same username and password for logging into multiple websites like gmail, onlinesbi etc. Thus hackers can easily enter into multiple website using your username and password which was stolen from a less secured website. So I recommend all of my readers to use different usernames and passwords in different websites.



Now we can come to our topic. From time to time, servers and databases are stolen or compromised by hackers all over the world. With this in mind, it is important to ensure that some important user data, such as passwords, cannot be recovered. In this tutorial , I will explain how hash technique helps us to escape from these situations.
Hashing converts a piece of data (either small or large), into a relatively short piece of data such as a string or an integer.
Normally, all famous hashing algorithms are "one-way" algorithms means, it will convert your information (say password) into a string with some alphanumeric characters. md5(), crc32() etc are widely using hashing functions.

In PHP, there are many built in functions for hashing and its format is very simple compared to other programming languages.
An example PHP hash function is md5(). Please use this code for md5 hashing

From the screenshot, it is clear that the md5 function will convert the information into 32 character hexadecimal number (Number 0,1,2,3,4,5,6,7,8,9 and characters A,B,C,D,E,F). One hexadecimal character can be represented using 4 bits (ie 1=0001, and A=1010) thus md5 result set dimension is 128 bit.
You cannot reconstruct the original information (pravysoft calicut) from  the result (00d79e8e609cfbdf5b75d80fdef96fb4). 

[Note: Actually there are some hacking strategies to break/interpret md5, but that is out of scope of this tutorial, Ofcourse you can send me a request to know that techniques!!].

User Registration and Login Steps

Now we can check the user registration steps
1. User fills their information in the registration form
2. It is better to use password fields type as password (<input type="password" >)
3. Submitted data is received by the web-server
4. Convert submitted password to md5 code. Discard original password, it will not use anywhere!
5. Save this md5 data in the corresponding field in the database


Now we can check the steps for user login process
1. The registered user now type username and password in the login window.
2. The submitted password is converted to md5 code using md5 function.
3. The code will compare the usernames as well as md5 code based passwords.
5. If they match, it will grant access to the user.

Thus if any hacker stolen the database they will only get Md5 version of the password only. Not their original secret password!!. Thus the users are protected from password hijackers.

But there are also some chances for hacking the password encrypted using hashing algorithm. For showing a demo I am using another hashing function crc32() [md5 code width is 128 character, so for simulation it will take some time, the crc32() use only 32bits for decryption thus its simulation will complete faster]


The screenshot below shows the result of the above code.



From the screenshot it is clear that, the hash code of the string "PravySoft Calicut" is -332908207. Ofcourse a hacker who has stolen the database cannot recover the string ( "PravySoft Calicut" ) from this number (-332908207). But he can login to the website using another password and that hack is explained below. As you know that cr32 using 32 bit encoding, thus it has only 2 to the power 32 (2^32) combinations only. Thus there is a chance for another string to produce the same hash code i.e -332908207. So if you know any other string which has the same hash code (say a duplicate) can be used to login to the website. Use following code for finding duplicate string

<?php
set_time_limit(0);
$var = 0;
while (true)  //infinite loop
{
 $current_value=crc32(base64_encode($var));
 echo "<br>checking value=".$current_value;
    if ($current_value == -332908207)
    {
        echo "duplicate string is ".base64_encode($var);
        exit;
    }
     $var++;
}
?>



 It will take some time to get the duplicate key/string , after getting the duplicate key you can check the hash code of that duplicate key and hash code of your string are equal. (i.e It is same as that of the hash code of the example string "PravySoft Calicut"). Thus you can access to the website using this duplicate key without knowing original string.

How you can escape from this type of hacking. Better idea is to don't use low-range hashing algorithm like crc32. It is better to use Md5() or sha1() algorithms, They have 128 bit and 160 bit hash codes respectively, Thus finding a duplicate key is very difficult and it will take very long time to get duplicate key.

Some hacking sites are keeping large number of duplicate keys to decode the hash code (Hash code database size is in the range of petabyte, ie 1000 terabyte= 1 peta byte). So hackers can find duplicate keys of some hashcodes very easily [ I am not discussing the websites they store this data(I believes that it is unethical )]. It is also a major problem for web developers to protect their website from unauthorized access. So in the next section we will discuss, how you can block duplicate key access to your websites.

It is the time for a small tea!!, I will explain some-other security issues and  ways and means to protect your site from hacking, see you soon in the next post!!

Tuesday, May 31, 2016

Simple php script for making Excel files

Simple PHP script for making Excel files



This tutorial describes a simple way to generate Microsoft excel file from the php script. As you notice that, there are a lot of complicated external libraries for this purpose (like phpexcel etc.). Here I am describing a simple way to generate excel files without using any external libraries.

Please copy following php code to your web server and run the file. You can see that, a spreadsheet automatically generated there and you can download the same. The contents in the excel file are the same which is given in the code.


<?php
            header( "Content-Type: application/vnd.ms-excel" );
            header( "Content-disposition: attachment; filename=spreadsheet.xls" );
            // print here what you want to see in excel for example:
            echo 'First Name' . "\t" . 'Last Name' . "\t" . 'Mobile' . "\n";
            echo 'Praveen' . "\t" . 'Thappily' . "\t" . '999999999' . "\n";
?>


I believes that this code is self explanatory. The file name should be given in the second header tag. Here the file name is “spreadsheet.xls”. It can be noted that, for changing excel column, you have to use the tab (\t”) switch and similarly to goto the next row you need to use new line switch  (“\n”) in the code as demonstrated above. Figure below shows typical output excel file.

You can use the same file for making excel file from your database (mysql or mssql), just read it using select query and echo the contents. if any doubt please contact us
info.pravysoft@gmail.com
www.pravysoft.org