QUERY

doing Query
Functions are used: mysql_query ()
SQL Query command to display data from the table:
SELECT * FROM [table name];
The full command (eg the name of the table to be
displayed data “brand” that consists of two columns
(id_brand, brand):
$ query = “SELECT id_brand, brand FROM brand”;
To execute sql command above:

$ result = mysql_query ($ query);
To retrieve the value of the results of the execution of the SQL statement above
using the function: mysql_fetch_row () or
mysql_fetch_array ()
The following example using mysql_fetch_row ():
$ record = mysql_fetch_row ($ result);
To display the result to the browser using the function:

Continue reading

HTML

HTML
HTML stands for Hyper Text Markup Language. HTML is the language to form an html web page and not a programming language but a markup language (markup language). Markup language consists of a set of tags markups. Symbols used by HTML markup marked with a smaller (<) and greater sign (>) which is commonly called tags.
1. Naming HTML Documents

To create an application program that runs on top of the web, you must first master HTML. Currently there has been a lot of application packages that can be used to create web pages in a WYSIWYG (What You See Is What You Get) such as Microsoft FrontPage, Macromedia Dreamweaver, Netscape Composer and so on, which allows you to design a web page without having to master the tag- HTML tags. But to make your web pages more dynamic and interactive, to the mastery of HTML tags will be indispensable.

Continue reading

Software Development Life Cycle (SDLC)

Software Development Life Cycle (SDLC)
What is SDLC? Software Development Life Cycle Defined
SDLC stands for Software Development Life Cycle. A Software Development Life Cycle is essentially a series of steps, or phases, that provide a model for the development and lifecycle management of an application or piece of software. The methodology within the SDLC process can vary across industries and organizations, but standards such as ISO/IEC 12207 represent processes that establish a lifecycle for software, and provide a mode for the development, acquisition, and configuration of software systems.
Benefits of the SDLC Process
The intent of a SDLC process it to help produce a product that is cost-efficient, effective, and of high quality. Once an application is created, the SDLC maps the proper deployment and decommissioning of the software once it becomes a legacy. The SDLC methodology usually contains the following stages: Analysis (requirements and design), construction, testing, release, and maintenance (response). Veracode makes it possible to integrate automated security testing into the SDLC process through use of its cloud based platform.

Phases of the Software Development Life Cycle
SDLC starts with the analysis and definition phases, where the purpose of the software or system should be determined, the goals of what it needs to accomplish need to be established, and a set of definite requirements can be developed.
During the software construction or development stage, the actual engineering and writing of the application is done. The software is designed and produced, while attempting to accomplish all of the requirements that were set forth within the previous stage.
Next, in the software development life cycle is the testing phase. Code produced during construction should be tested using static and dynamic analysis, as well as manual penetration testing to ensure that the application is not easily exploitable to hackers, which could result in a critical security breach. The advantage of using Veracode during this stage is that by using state of the art binary analysis (no source code required), the security posture of applications can be verified without requiring the use of any additional hardware, software, or personnel.

Once the software is deemed secure enough for use, it can be implemented in a beta environment to test real-world usability, and then pushed a full release where it enters the maintenance phase. The maintenance stage allows the application to be adjusted to organizational, systemic, and utilization changes.
SDLC Implementation
There are two different types of SDLC that can be used: waterfall and agile. The major difference between the two is that the waterfall process is more traditional and begins with a well thought out plan and defined set of requirements whereas agile SDLC begins with less stringent guidelines and then makes adjustments as needed throughout the process. Agile development is known for its ability to quickly translate an application that is in development to a full release at nearly any stage, making it well suited for applications that are updated frequently.

There are various software development approaches defined and designed which are used/employed during development process of software, these approaches are also referred as “Software Development Process Models” (e.g. Waterfall model,incremental model, V-model, iterative model, etc.). Each process model follows a particular life cycle in order to ensure success in process of software development.
Software life cycle models describe phases of the software cycle and the order in which those phases are executed. Each phase produces deliverables required by the next phase in the life cycle. Requirements are translated into design. Code is produced according to the design which is called development phase. After coding and development the testing verifies the deliverable of the implementation phase against requirements.
There are following six phases in every Software development life cycle model:
1. Requirement gathering and analysis
2. Design
3. Implementation or coding
4. Testing
5. Deployment
6. Maintenance
1) Requirement gathering and analysis: Business requirements are gathered in this phase. This phase is the main focus of the project managers and stake holders. Meetings with managers, stake holders and users are held in order to determine the requirements like; Who is going to use the system? How will they use the system? What data should be input into the system? What data should be output by the system? These are general questions that get answered during a requirements gathering phase. After requirement gathering these requirements are analyzed for their validity and the possibility of incorporating the requirements in the system to be development is also studied.
Finally, a Requirement Specification document is created which serves the purpose of guideline for the next phase of the model.
2) Design: In this phase the system and software design is prepared from the requirement specifications which were studied in the first phase. System Design helps in specifying hardware and system requirements and also helps in defining overall system architecture. The system design specifications serve as input for the next phase of the model.
3) Implementation / Coding: On receiving system design documents, the work is divided in modules/units and actual coding is started. Since, in this phase the code is produced so it is the main focus for the developer. This is the longest phase of the software development life cycle.
4) Testing: After the code is developed it is tested against the requirements to make sure that the product is actually solving the needs addressed and gathered during the requirements phase. During this phase unit testing, integration testing, system testing, acceptance testing are done.
5) Deployment: After successful testing the product is delivered / deployed to the customer for their use.
6) Maintenance: Once when the customers starts using the developed system then the actual problems comes up and needs to be solved from time to time. This process where the care is taken for the developed product is known as maintenance.

SWOT analysis

SWOT.02

 

 

SWOT analysis (strengths, weaknesses, opportunities, and threats analysis) is a framework for identifying and analyzing the internal and external factors that can have an impact on the viability of a project, product, place or person. .
As its name states, a SWOT analysis examines four elements:
• Strengths – internal attributes and resources that support a successful outcome.
• Weaknesses – internal attributes resources that work against a successful outcome.
• Opportunities – external factors the project can capitalize on or use to its advantage.
• Threats – external factors that could jeopardize the project.
Once the SWOT factors are identified, decision makers should be able to better ascertain if the project or goal is worth pursuing and what is required to make it successful. Often expressed in a two-by-two matrix, the analysis aims to help an organization match its resources to the competitive environment in which it operates.

UML(Unified Modeling Language)CLASS DIAGRAM

UML(Unified Modeling Language)CLASS DIAGRAM

What is Class Diagram ?
– The class diagram is core to object-oriented design.
– It describes the types of objects in the system and the static relationships between them.

20101029_08_UML_-_Class_Diagram
– Illustrate classes with rectangles divided into compartments.
– Place the name of the class in the first partition (centered, bolded, and capitalized), list the attributes in the second partition, and write operations into the third.
Sample Class Diagram

20101029_08_UML_-_Class_Diagram1
– Classes are divided into three sections:

Continue reading

UML(Unified Modeling Language)

UML(Unified Modeling Language)

What is UML?
– UML stands for Unified Modeling Language.
– This object-oriented system of notation has evolved from the work of Grady Booch, James Rumbaugh, Ivar Jacobson, and the Rational Software Corporation.
– These renowned computer scientists fused their respective technologies into a single, standardized model.
– Today, UML is accepted by the Object Management Group (OMG) as the standard for modeling object oriented programs.

Types of UML Diagrams
– UML defines nine types of diagrams:
– class (package),
– object,
– use case,
– sequence,
– collaboration,
– statechart,
– activity,
– component, and
– deployment.

Continue reading

10 Tips for Wireless Home Network Security

 

Many folks setting up wireless home networks rush through the job to get their Internet connectivity working as quickly as possible.It’s also quite risky as numerous security problems can result. Today’s Wi-Finetworking products don’t always help the situation as configuring their security features can be time-consuming and non-intuitive. The recommendations below summarize the steps you should take to improve the security of your home wireless network.

  1. Change the Default SSID

Access points and routers all use a network name called the SSID. Manufacturers normally ship their products with the same SSID set. For example, the SSID for Linksys devices is normally “linksys.” True, knowing the SSID does not by itself allow your neighbors to break into your network, but it is a start. More importantly, when someone finds a default SSID, they see it is a poorly configured network and are much more likely to attack it. Change the default SSID immediately when configuring wireless security on your network.

  1. Change Default Administrator Passwords (and Usernames)

At the core of most Wi-Fi home networks is an access point or router. To set up these pieces of equipment, manufacturers provide Web pages that allow owners to enter their network address and account information. These Web tools are protected with a login screen (username and password) so that only the rightful owner can do this. However, for any given piece of equipment, the logins provided are simple and very well-known to hackers on the Internet. Change these settings immediately.

Continue reading

5 clever PC security tips and tricks

These simple yet clever ways to protect yourself in the physical and cyber worlds will cost little or nothing, but could prevent all manner of casualties befalling your technology.
The premise behind tricks like this is not that any one – or even all – of them is guaranteed to protect you thoroughly, but rather that each of them will make stealing your system or data more difficult or unappealing. It should go without saying that neither one nor all of these can replace good, up-to-date antivirus and firewall protection.

  1. Protect against pod-slurping

Pod-slurping is the connection of an unauthorised USB device to steal data, and to protect against this, you can disable your USB ports. Or – and we borrowed this one directly from the US military – glue over the USB ports. Too permanent? A slightly more elegant solution is to open the PC case and disconnect (or cut) the wires running from the motherboard to the USB ports.

  1. Remove the keyboard and mouse

It sounds a bit silly, but a surprisingly effective PC security trick is simply to remove the keyboard and mouse (when you’re away from the machine, obviously).

I discovered this when the keyboard on my laptop died and I had to use an external keyboard for a while. It’s highly unlikely that a snoop will carry an extra keyboard and mouse with him. This will slow someone down but is far from fool-proof, and it should go without saying that every computer should be physically locked to a sturdy object and secured behind a strong password.

 

Continue reading

25 computer networking tips and tricks

Follow our simple tips to extract the last drop of juice from your network hardware.

  1. Change channel number

Wireless routers operate on a fixed channel. Since most routers ship with a pre-selected channel, the wireless signal may interfere with other routers in the vicinity that are operating on the same channel.

Changing the wireless channel from the factory default is a good starting point if your wireless signal strength is poor.

  1. Give the router space to breathe

The biggest advantage of a wireless router is that it can penetrate doors and walls – but that doesn’t mean you can just stuff it next to a wall or cordless telephone, or use it as a stand for your stack of DVDs. Treat it with respect.

Try to keep it in a central location, away from other wireless devices; make sure it’s not in direct sunlight; lift it off the carpet; and ensure its vents and air holes aren’t covered.

  1. Restrict access to specific PCs

If you really don’t want to use encryption, you can force your router to only connect to specific PCs. Your router identifies each computer by the unique MAC address of its network gear. Feed it a list of MAC addresses to connect to and you save yourself the trouble of entering a password each time you log in.

The disadvantage is that you’ll have to add the MAC address of any new computer before it can get on your network – which is probably a more annoying way of getting things done.

Continue reading