Wednesday, 30 December 2020

Video Analytics

Video Analytics



• Video analytics uses mathematical algorithms linked to computer vision technology.

These algorithms allow video cameras to be programmed to extract only useful

information to provide hugely more accurate and effective video security

• These algorithms also provide artificial intelligence and machine learning

capabilities which adapt to programmed changes automatically. The result is you get

the most robust and accurate total security on the market today with the lowest

false alarm rates in the industry.

Introduction to video analytics

• Davantis Daview is a powerful video analytics system, characterized by a quick and

simple installation and easy startup.

• The system is designed to be integrated into existing CCTV video surveillance and is

ideal for detecting and classifying persons and vehicles that pose a threat to security

areas.

The Video analytic system is designed to provide following functions.

1. Exit anti-flow detection

In Main Door and exit areas for people travelling in the opposite direction to

expected flow.

2. Left Items detection

For any item left for a Specific period of time in any public space.

3. Behavioral analysis

for any person loitering for a Specific period of time in any public space.

4. Speed Analysis

Detection of objects moving faster than Specific speed in walking pace along

corniche walkway and all public spaces

5. Crowd density analysis

Recording of crowd density figures in public spaces for any space that exceeds defined

density.

6. Sterilized Zone Tripwire

Detects an Intruder for a pre-defined zone or boundaries.











Tuesday, 29 December 2020

VLAN Trunking Explained with Examples

 

VLAN Trunking Explained with Examples


What is a VLAN Trunk?

You can’t describe VLANs without mentioning trunks. It’s a known fact that you can control and segment network broadcasts with VLANs.  VLAN trunking enables the movement of traffic to different parts of the network configured as a VLAN.

A trunk is a point-to-point link between two network devices that carry more than one VLAN. With VLAN trunking, you can extend your configured VLAN across the entire network. Most Cisco switches support the IEEE 802.1Q used to coordinate trunks on FastEthernet and GigabitEthernet.

To enable VLAN configured with trunk link to traffic frames between switches on the network, it made possible by a link protocol called VLAN Trunking Protocol VTP

VLAN Trunking Protocol (VTP) is a  Cisco-proprietary link protocol, it provides a means by which Cisco
switches can exchange VLAN configuration information. In effect, VTP advertises about the existence of each VLAN based on its VLAN ID and the VLAN name.

VTP serves a useful purpose, It enables the distribution of VLAN configuration among switches.

In the figure Below , the links between switches SW1 and SW2, SW1, and SW3 are configured as trunk links to enable traffic between VLAN 10, 20 and 30. This network simply could not function without VLAN trunks.



VTP has three different modes of operation within a domain: Server, Client and transparent.

VTP Server

Every catalyst switch is a server by default. Every network or domain requires a server to propagate VLAN information throughout the network or domain.

 As a server switch, it will be able to create, add and delete VLANs in the domain.

 VTP server controls any change that’s to be made in the entire domain. When a change is made on the server, it will be advertised throughout the entire VTP domain. VTP server configurations are saved in the NVRAM.

VTP Client

Switches in a client mode receive information from VTP servers.

 VTP client switches also send and receive updates, but one difference between clients and server is that; VTP client switches can’t create, change and delete VLANs.  In other words, none of the ports on the client switch can be added to a new VLAN without the authorization or notification from the server switch.

Switches in client mode processes and forwards VLAN information. VLAN information on client switches is not saved in NVRAM.




VTP Transparent

Switches in this mode don’t take part in VTP domain or database. They behave more or less like servers in that they create, modify and delete VLANs because they have and keep their own databases, which is only locally important.

VTP switches in transparent modes only purpose in a VTP domain is to forward VTP advertisements through any configured trunk links.



Types of Network Topology

 

Types of Network Topology



1. Bus Topology

Bus topology is the kind of network topology where every node, i.e. every device on the network is connected to a solo main cable line. Data is transmitted in a single route, from one point to the other. We cannot transmit data in both ways. When this topology has precisely two endpoints, it is known as Linear Bus Topology. It is mostly used for small networks.Nwtopology1

Benefits of Bus Topology

  • It is cost effective.
  • The Cable length required is the least in comparison to other topologies.
  • The working of this topology is easy to understand.
  • Expansion can be done easily by linking the cables together.

Drawbacks of Bus Topology

  • If the main cable collapses, the complete network collapses.
  • The network performance is at stake and reduces if there are numerous nodes and heavy network traffic.
  • The main cable can only be so long. The length of the cable is limited.
  • Bus Topology is not as fast as Ring Topology.

2. Ring Topology

Ring Topology is a type of topology in which every computer is connected to another computer on each side, with the last computer being connected to the first, thus forming a ring shape. This topology allows for each computer to have exactly two neighboring computers.

In this topology, there is the main computer, known as the monitor station, which is responsible for all the operations. Data transmission amongst devices is done with the help of tokens. For transmitting data, the computer station has to hold the token. The token is released only when the transmission is complete, following which the token can be used by other computer stations to transmit data.

Data transmission is done in a sequential method, i.e. bit by bit. Therefore, data has to route its way through each node in the network to reach the destination node. We use repeaters in a Ring topology to prevent loss of data during transmission. These repeaters are especially helpful when the topology has a vast number of nodes, and the data is to reach the very last node in the network.

The data transmission is unidirectional in a Ring topology, but it can be created to be bidirectional, by connecting each node with another set of connecting lines. This is known as Dual Ring Topology. Here, two ring networks are created, with the data in each flowing in opposite 

Nwtopology2

Benefits of Ring Topology

  • The network is not affected by numerous nodes or heavy traffic, as only the nodes possessing tokens can transfer data.
  • Ring topology has cheap installation and expansion.

Drawbacks of Ring Topology

  • It is a tedious task to troubleshoot in Ring topology.
  • It is difficult to add or delete nodes, as it interrupts the network activity.
  • If one computer crashes, the entire network activity is disrupted.

3. Star Topology

Star Topology is the kind of network topology in which all the nodes are connected via cables to a single node called hub, which is the central node. The hub can be active or passive in nature. Active hubs contain repeaters, while passive hubs are considered as non-intelligent nodes. Each node contains a reserved connection to the central node, which the central node acting as a repeater during data transmission.

Nwtopology3

Benefits of Star Topology

  • Star topology boasts fast performance due to low network traffic.
  • It is easy to upgrade the Hub, as and when required.
  • Setup can be done easily and can be easily modified as well.
  • Star Topology is easy to troubleshoot.
  • In case a node has failed, it can easily be replaced without affecting the working of the rest of the network.

Drawbacks of Star Topology

  • The installation cost is extreme and it is costly to use.
  • All the nodes are dependent on the hub.

4. Mesh Topology

Mesh topology is the kind of topology, in which all the nodes are connected with all the other nodes via a network channel. Mesh  topology is a point-to-point connection. It has n(n-1)/2 network channels to connect n nodes.

Mesh topology has two techniques for transmission of data, i.e. routing and flooding. In the routing technique, the nodes possess a routing logic, like the logic for the shortest distance to the destination node or the logic to avoid routes with broken connections. In the flooding technique, all the network nodes receive the same data. This leaves us no need for routing logic. This technique makes the network robust but results in unwanted load on the network.

Types of Network Topology

Benefits of Mesh Topology

  • Every connection has the ability to carry its particular data load.
  • Mesh Topology is very robust.
  • It is easy to diagnose faults.
  • Mesh Topology provides with privacy and security.

Drawbacks of Mesh Topology

  • Mesh Topology is challenging to install and configure.
  • As all the nodes are connected with each other, the cabling is costly.
  • Bulk wiring is essential.

5. Tree Topology

Tree topology is the kind of topology in which the nodes are connected in a hierarchical manner, with all the nodes being connected to the topmost node or root node. Hence, it is also known as hierarchical topology. Tree topology has at least three levels of hierarchy.

Tree topology is applied in Wide Area Network. It is an extension of Bus topology and Star topology. It is best if the workstations are situated in groups, for easy working and managing.

Types of Network Topology

Benefits of Tree Topology

  • It is easy to expand the network with more nodes.
  • It is easy to maintain and manage.
  • It is easy to detect an error in the network.

Drawbacks of Tree Topology

  • It is profoundly cabled.
  • It is expensive when compared to other topologies.
  • If the root node collapses, the network will also collapse.

6. Hybrid Topology

Hybrid Topology is basically a network topology comprising of two or more different types of topologies. It is a reliable and scalable topology, but simultaneously, it is a costly one. It receives the merits and demerits of the topologies used to build it.

 

Types of Network Topology

Benefits of Hybrid Topology

  • It is easy to troubleshoot and provides simple error detecting techniques.
  • It is a flexible network topology, making it quite effective.
  • It is scalable since the size can be made greater easily.

Drawbacks of Hybrid Topology

  • It is complicated to design it.
  • It is very expensive, as it involves more than one topologies.

Conclusion

We have seen the various network topologies available to us, along with their benefits and drawbacks. According to our requirements, it will now be easy for us to choose which network topology can be used.

Friday, 6 November 2020

Basic knowledge necessary before learning Checkpoint Product Installation – Checkpoint Advanced SPLAT Configuration

1.Basic knowledge necessary before learning Checkpoint

These are few things you need to know before starting of to learn Checkpoint.
I have tried to upload the videos collected from different sources to help you understand with ease.
Do not skip the videos. Be patient and watch the video, it makes you understand the concepts properly.
  • First thing you got to know are :
  1. The methods of attack
  2. Firewall concepts & OSI Model
  1. METHODS OF ATTACK
  • Types of hackers
  • Tools of trade
  • Steps of an attack
  • Types of exploits
Watch the Video below to understand the above topic:

http://www.youtube.com/watch?feature=player_embedded&v=TLW4QR-q7NE




2 Firewall concepts & OSI Model


http://www.youtube.com/watch?feature=player_embedded&v=8JlZSUXSi3Q



2. Product Installation – Checkpoint

The below videos help you to know about the Checkpoint product installation in detail. The videos are in 3 parts. Watch the video with patience for better understanding, and also try installing in your system along with the video.
You need to have the Checkpoint SPLAT installation CD image before going ahead.Download it from the net. Also download VM Player which will help you to install the Checkpoint SPLAT in your existing system without making any changes to your existing files and also it uses the system resources which you already have.
Product Installation Part 1

http://www.youtube.com/watch?feature=player_embedded&v=Ieb0OXOhK6g 


 Product Installation Part 2
 http://www.youtube.com/watch?feature=player_embedded&v=IhdIJG-uWZI

 Product Installation Part 3

http://www.youtube.com/watch?feature=player_embedded&v=wjtbeVvwvq0 



3. Advanced SPLAT Configuration

After you are done with the installation, the next thing is configuring the SPLAT.
The below Video will teach you
  1. SPLAT OS Shell
  2. SPLAT OS Command
http://www.youtube.com/watch?feature=player_embedded&v=82c0AsZrOUo


Tuesday, 20 October 2020

Digital signature


    To create a digital signature for a message, the data to be signed is encrypted by an algorithm that takes as input the private key of the sender. (Alice). Largely due to performance reasons, the entire message data is not typically encrypted, but rather a digital thumbprint of the message (hash / digest) is created and then encrypted. 
    The hash of the message, which was encrypted with the sender's (Alice) private key, acts as a digital signature for that message. The receiver (Bob) verifies the signature by applying the same hash function as the sender (Alice) to the message that was sent, and decrypting the encrypted message digest using the sender's (Alice) public key. If the two values match, the receiver has successfully authenticated the signature. 

    The digital signature is created as follows: 
    1) The sender (Alice) of the message uses a message digest function, such as SHA-1, MD5 to create a message hash / digest of the message contents. 
    2) The digest is then encrypted using the private key of the sender. 
    3) This encrypted digest is then attached to the message as the digital signature. 


    The digital signature is verified as follows:

    1) The receiver of the message uses the sender's public key to decrypt the digital signature. If it decrypted successfully, the receiver knows that the message came from the holder of the private key. 
    If decryption of the digital signature using the sender's public key fails, someone may be attempting to impersonate the sender. 

    2) The receiver then uses the message digest function to calculate the hash associated with the message contents. If the hash is the same value as the one decrypted from the digital signature, the receiver can be confident that the message was not altered or modified in transit. 

    If the hash values are different, the message may have been altered after signing, or corrupted in transit. In addition, if the sender and receiver are using different hash functions (MD5 versus SHA-1), the hash comparison will also fail. 

Wednesday, 5 August 2020

Hide your data behind an image

Hide your data behind an image ....( Steganography )

1. Make a folder named loopholes in c: drive .


 2. Now copy an image (behind which you wanna hide the data)to this folder , say image.jpg .
3. Now copy all the data in that folder and select them and right click and select add to loopholes.rar as shown .












 4. Now go to run type cmd .Press Enter.
5. In command prompt type the following commands...

    cd c:\loopholes
    copy /b image.jpg + loopholes.rar image.jpg












6. Now its done , you will see that the size of your image has increased , you can delete the data you copied in that folder and also the loopholes.rar file .

7. Now if you wanna view the data you can open that file in Winrar and you can extract it to get the data back .