Monday, January 27, 2020
Overview of HTTPS and VPN
Overview of HTTPS and VPN HTTPS HTTPS (originally developed by Nestscape) stands for HyperText Transport Protocol Secure and is basically similar to an HTTP but uses a Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer for security purposes. It enables secure communication and connection between a remote user and a web server by encrypting and decrypting pages that are requested, delivered and received. For example, while using the web page that has a prefix https://, when the user clicks Send, to transmit the page back to the vendor or service provider, the HTTPS layer from the users browser will encrypt it. Likewise, the acknowledgment returned by or received from the server will also be transmitted in encrypted form, i.e., it will be delivered and will arrive encrypted, in turn to be decrypted for the user by the HTTPS sublayer of the users browser. In the likelihood that connection is compromised and intermediary hackers/attackers acquire the data being transmitted via HTTPS, the information would be undecipherable. Note that the decrypted data arriving at its destination is only as secure as the host computer. (Rouse.) Additionally, secure web sites also typically display a small padlock icon somewhere next to the URL. By clicking the lock icon, one is able to view the secure certificate that authenticates the website. (Christensen.) Not only is it the de facto protocol for conducting sensitive transactions on the web (especially ones that involve credit card and bank account information), it can also protect users from censorship by a government or an ISP.Ãâà (ComputerHope.com.) SSL (Secure Sockets Layer) is a popular implementation of public-key encryption. Once the browser sends out the public key and the certificate, it checks to make sure that (1)Ãâà the certificate is provided by a trusted party; (2) the current certificate is valid; and (3)Ãâà the certificate has a relationship with the site generating it. The public key is used to encrypt a randomly selected symmetric key. In other words, most systems use a combination of public key and symmetric key encryption. Under a secure session, one computer creates a symmetric key and sends it to the other computer using public-keyÃâà encryption. When the session is completed, each computer disposes the key that was created and that was used for the particular session. For any ensuing sessions, a new symmetric key is created, and the routine is repeated. (ComputerHope.com.) VPN VPN (Virtual Private Network) is a private network that uses a public network to connect remote sites or users together instead of using a dedicated line or physical network connection. The virtual connections are routed through the Internet from a private network (such as a company) to the remote site (such as an employee). The technology enables the creation of an encrypted connection over a less secure network. A well-designed VPN incorporates security, reliability, scalability, network management and policy management (Cisco.com.) Two common types of VPN: Remote-Access (or, Virtual Private Dial-up Network [VPDN]), is a user-to-LAN connection created by a company for its employees who are on various remote locations and who need to connect to the private network. Site-to-Site (categorized into intranets or extranets) uses dedicated equipment and large-scale encryption and can connect multiple fixed sites over a public network such as the Internet, or over a large distance (much like a WAN), with each site needing only a local connection to the same public network. (Cisco.com.) In order to gain access to the private network, a user must first be authenticated by using a unique PIN (personal identification number) and a password. The PIN changes according to a specific frequency, usually every 30 seconds or so. VPN technology uses complex algorithm encryption to guarantee secure and private communicationÃâà as well as to prevent any unintentional or unauthorized interception of data between private sites. (whatismyipaddress.com.) Commonality/Difference VPNs use IPSec (Internet Protocol Security) connection to tunnel between the two endpoints and require third-party hardware and/or software. An extra layer of security is provided since in order to access or connect to a VPN, the remote device must have an IPSec client software application installed but must also have it properly configured. In other words, although all data/traffic is encrypted, users on can only access the encrypted applications that they are configured to access in the SSL VPN connection and not the entire network. (Lifewire.com.) HTTPS relies on SSL, which is a common protocol that most web browsers have built in. The secure connection exists between the users browser and the server or a specific web site. All data exchanged between the two are encrypted. Unlike VPN, it does not provide access to anything other than what is currently being communicated. Comparatively, it does not require an authentication code or PIN. Instead it creates a temporary public or symmetric key, which is discarded as soon as the communication is finished.
Sunday, January 19, 2020
Exploring the Past Essay
All of us have little secrets which we donââ¬â¢t want to share with others ââ¬â things which we are ashamed of, things which are too intimate to tell or just things which happened in the past and we donââ¬â¢t want to tell them because they may hurt someone or they may cause troubles to us. I have the perfect example that exploring the past sometimes may be painful. I have a friend ââ¬â Lora- which is very amorous and gives all of herself for her boyfriend. But her ex one didnââ¬â¢t understand that. Tom ââ¬â her ex-boyfriend was very weird and he wanted to know all about Loraââ¬â¢s previous relationships. One day he asked her why she has broken up with her last boyfriend. At first she didnââ¬â¢t want to talk about that but he was urging her. So she told Tom that she has betrayed her last boyfriend and that was the reason of their parting. When she has been at a party at a friend of her she has got very drunk and a boy from the party has embraced the opportunity and got alone with her. In the morning she couldnââ¬â¢t remember anything but it has been too late. The lover had gone off. Her only fault was that she had drunk so much but she wasnââ¬â¢t guilty for the rest of the occurrence. But her then boyfriend didnââ¬â¢t understand that and he left her although she loved him very much. As for Tom he thought Lora could do that again. They have been together for two years and he chucked her up because she might repeat the same mistake again. It was such a stupid reason. She could correct her mistake but she loved Tom very much. He loved her too but feelings were obviously insufficient to keep them together. They both pined after each other for a long but they didnââ¬â¢t get together again. We canââ¬â¢t return the time and fix our mistakes, nobody can change the past. So it is extremely purposeless to explore the old times. Itââ¬â¢s just a waste of time which we can spend in creating the future.
Friday, January 10, 2020
Changing Face of Indian Advertising Mascots
Air Indiaââ¬â¢s Maharaja which came into existence in the year 1946 and the Amul girl in 1967 are the mascots which captured the hearts of one and all in India. These mascots caught the attention of the consumers as they were charming and connected well with the consumers. Indian corporate have also seen few other mascots like Fido the cool swanky doodle of 7 Up, doughboy the sweet little butler of Godrej Pillsbury, Gattu who build brand Asian Paint, Chintamani who endorsed ICICI, Sunny who is creating magic with Sunfeast. The success of these mascots can be qualified by, the increase in the brand value of these brands consumer connect. Decline of mascot power The Indian market grew at a fast pace in nineties everything from pencils to cars, salt to luxury goods required an advertising campaign this was the time when we saw emergence of celebrity advertising and mascots lost their appeal. We also lived in a time when there was no argument regarding the fact that a celebrity can make or break a brand. The pampering and recognition given to the celebrity in the marketing of the product in some cases was even greater than the product itself. The advertising world, during this time strongly believed that the celebrities transfer their success, personality, status and power to the brand. They attributed reasons for the growth of celebrity endorsements to: â⬠¢ Create great brand awareness for product â⬠¢ Sustaining the brand image â⬠¢ Stimulating and reviving brands â⬠¢ Product association However, the advertising world also realized that many brand ambassadors does not practice what they preach and sometimes controversies and unpleasant incidents connected with the celebrity causes damage. It is also observed that over exposure and multiple endorsements too can damage the image of product. The Indian market which is saturated with celebrity endorsements has seen emergence of the mascots. Emergence of the mascots The courage and optimism that common man of R. K. Laxman portrays and a middle-class Indian, that Chintamani portrays is certainly unmatched but the new age mascots are more attractive, and trendy. The advertisers have become more creative with the use of animation. The new age mascots have a lasting appeal and create a whole new persona for the product. They manage the product as efficiently as a celebrity. Moreover, in the current marketing scenario when the celebrity charisma diminishing away the world of advertising is turning back to mascots. Celebrities get associated with too many products and therefore it is difficult to relate them with one particular brand, which is not the case with the mascots. For an example Shahrukh Khan endorse brands such as Pepsi, Airtel, Santro, Emami , and many more but Fido is just associated with 7Up. The strength of mascots lies in its uniqueness, and its power of effectively communicating the ethos of the brand like, Chintamani solves all our worries related to tax savings and good returns paving a new way for no chinta, Share Khan tell us how to smartly invest in stocks and reap rich dividends, Gattu with the brush in his hand and the smile on his face passes the message that a bright coat of paint will brighten up the house. Moreover the mascots are not as expensive as celebrities. The cost of creating these characters is as low as development of a normal commercial. Lowe Advertising creative director Delna Sethna claims that the first Chintamani ad cost around Rs 7 lakh. Moreover, the animated characters also give more scope for creative-flexibility. Mascots are dynamic and they adapt with changing times. We should acknowledge how the Amul girl in polka dots has changed overtime, and Fido has makeovers with the changing time. The advertising world has also observed that the popularity of any mascot is not only based on the response they get, but also depend on the fact that these faces have a higher recall value. Conclusion The Amul girl was born in 1967 is still a popular mascot. She may soon enter into the Guinness Book of World Records as the oldest campaign to survive in the market. This goes on to prove that the mascots are more appropriate brand ambassadors. The impact and success of the mascot, depends on how effectively it conveys the brand values and the ideals that consumers would associate with.
Thursday, January 2, 2020
Definition of Collective Noun
Definition: A singular noun that stands for a group of things or beings. In both English and Spanish, collective nouns are commonly used when referring to groups of animals, such as a flock of sheep (un rebaà ±o de ovejas) and a school of fish (un banco de peces). But they are also used in many other contexts as well. It is common to follow a collective noun with the preposition of (de in Spanish) and a plural noun, as in the two examples above, but it is not necessary, especially when the meaning is clear from the context. In standard English, collective nouns, when the subject of a sentence, are typically used with a singular verb: The class of students studies hard. In Spanish, a verb that immediately follows a collective noun is singular: La gente tiene mucho dinero. (The people have a lot of money. Note that this is an example of a Spanish singular noun that normally requires a plural translation in English.) But when there is a plural noun between the collective noun and verb, either a singular or plural verb can be used in everyday speech and writing, with the plural verb probably being more common. Thus you might hear both La bandada de pà ¡jaros se acercà ³ (The flock of birds approached, singular verb) and La bandada de pà ¡jaros se acercarà ³n (The flock of birds approached, plural verb), with no appreciable difference in meaning. Also known as: Nombre colectivo in Spanish. Examples: group of people (grupo de personas), team (equipo), a score of years (una veintena de aà ±os), den of lions (guarida de leones)
Subscribe to:
Posts (Atom)