Have you ever paused to contemplate the enigmatic nature of consciousness? It’s a topic that has captivated philosophers, scientists, and thinkers for centuries. Consciousness is a complex and multifaceted term that describes our state of being aware. It’s the vibrant tapestry of thoughts, sensations, and emotions that color our existence. In this blog post, we’ll… Continue reading AI Goals, Consciousness & Self-awareness : The Turing Test
Author: sri
Understanding the Principles of Metaphysical Leadership
Leadership is a multifaceted concept that involves various principles and factors. In addition to traditional leadership theories, there are metaphysical and philosophical principles that can provide valuable insights into effective leadership practices. Lets explore the principles of Mentalism, Correspondence, Vibration, Polarity, Rhythm, Cause and Effect, and Gender, and examines how they can inform and influence… Continue reading Understanding the Principles of Metaphysical Leadership
Root Cause Analysis
Pre-RCA and Post-RCA refer to two different phases of the root cause analysis (RCA) process. Pre-RCA This phase involves activities and steps taken before conducting the actual root cause analysis. It focuses on gathering information, preparing for the analysis, and setting the stage for a successful investigation. Some common activities in the Pre-RCA phase include:… Continue reading Root Cause Analysis
Network Protocol Structures : Numbering
New protocols are being invented and applied rapidly. Basics remains the same at foundation levels. Good understanding of these intact numbering mechanisms are mandatory to analyse various aspects of information security functions; including monitoring, forensics, malware analysis and so. Binary Protocol Structures Binary Protocols works at the binary machine level; the smallest unit of data… Continue reading Network Protocol Structures : Numbering
Routing Network Traffic : For Traffic Capture
Routing Traffic IP is a routed protocol; that is, none of the nodes on the network need to know the exact location of any other nodes. Instead, when one node wants to send traffic to another node that it isn’t directly connected to, it sends the traffic to a gateway node, which forwards the traffic… Continue reading Routing Network Traffic : For Traffic Capture
Traffic Capturing
Passive vs Active Capturing Passive capture doesn’t directly interact with the traffic. Instead, it extracts the data as it travels on the wire, which should be familiar from tools like Wireshark. Active capture interferes with traffic between a client application and the server; this has great power but can cause some complications. You can think… Continue reading Traffic Capturing
What is IPS – Internet Protocol Suite?
TCP/IP is the de facto protocol that modern networks use. Although you can think of TCP/IP as a single protocol, it’s actually a combination of two protocols Transmission Control Protocol (ICP) and the Internet Protocol (IP). These two protocols form part of the Internet Protocol Suite (IPS), a conceptual model of how network protocols send… Continue reading What is IPS – Internet Protocol Suite?
What are Functions of Protocol?
Maintaining session state Protocols typically implement mechanism to create new connections and terminate existing connections. Identifying nodes through addressing Data must be transmitted to the correct node on a network. Some protocols implement an addressing mechanism to identify specific nodes or groups of nodes. Controlling flow The amount of data transferred across a network is… Continue reading What are Functions of Protocol?
Tuning Up the Interface for Sniffing
https://cromwell-intl.com/open-source/performance-tuning/ethernet.html
Application Security – Missed Plots Redefined – BSIMM
How often we develop poorly but try to secure the application at the perimeter level? Is this even possible? Regardless of the whatever the methodologies being applied for SDLC; there are certain things the team must focus on enforcing the cyber security. Whether you are on Agile, Waterfall or CICD; these “things” must not e… Continue reading Application Security – Missed Plots Redefined – BSIMM