Skip to main content

Astrological Combinations In Horoscope for Marrying A Rich Spouse

In the age of social media and Instagram, people are becoming more and more influenced by the lifestyles they see on social media. This gives a rise to aspirations to attain wealth and live a very comfortable if not a luxurious life. Not everyone is blessed with a good amount of wealth, born in an affluent family or have a high income. It is good to work hard towards your goals and achieve success over time but even though most people want to become wealthy, they just don't get it. We all have seen a prince marrying an ordinary woman in fairy tales.  In Korean drama, it is very common to see an extremely rich man marrying an ordinary woman or vice versa. Marrying a rich man/woman can be a shortcut for someone to escape poverty and attain the desired level of wealth and financial freedom. During my consultations, several people come up to me with these questions and through this article I want to guide you to find the best approach for your life based on your planetary placemen


Subscribe To Our Newsletter

Get Free Monthly Predictions & Special Discount Offers On Consultation.



/ ( mm / dd )





SQL Injection & Web Methodologies Development & Evolution


     This article is about how different groups of scientists and researchers discovered methods and techniques to analyze web and prevent web from the sql injection attacks. Different tools and tactics used by them are also mentioned in this article.


·         Salas et.al. use WSInject as a tool to analyse web services. A general purpose fault injection tool that unlike other security testing tools can make various scenarios of different types of attacks. Thus they were able to compare it with results of a vulnerability scanner soapUI. They also concluded that soapUI was less efficient as compared to WSInject. XSS attack was performed with WSInject tool and then they created different attack scenarios and emulated attacks with this tool. The analysis was documented and verified using WSInject technology. A number of vulnerabilities were reduced by the security and made it possible to build a number of variations to new type of XSS attacks.

·         Fabien et. al. presented a methodology in which by generating test inputs using a combination of model inference and evolutionary fuzzing one can detect web injection vulnerabilities. Knowledge of application behaviour is obtained by Model Inference. Inputs are generated using GA i.e. Genetic Algorithm, uses the formal model to automatically generate inputs with better fitness values towards triggering an instance of the given vulnerability. An automated XSS search technique was proposed which is based on model inference and evolutionary fuzzing to generate test cases.

·         Yu sun et.al. for defence against cross site scripting attacks proposed a model checking method. Bugs present in the e-commerce website were found and counter examples were shown by model checking. Proposed an automatic modelling algorithm for the HTML code and presented the case of performance of the algorithm.

·         Indrani Balasundaram et.al. presented an authentication scheme using hybrid encryption. Hybrid because the algorithm uses both Advance Encryption Standard (AES) and Rivest-Shamir-Adleman(RSA) to prevent SQL injection attacks. Two level of encryption is applied on login query in this method. A unique secret key is issued to every user and server uses combination of private key and public key for Rivest-Shamir-Adleman  (RSA) encryption. Asymmetric key encryption via server’s public key is used to encrypt the query. Symmetric key encryption via user’s secret key is used to encrypt user name and password.


·         Allen Pomeroy et.al. used network recording to reconstruct SQL Injection attack effectively. In order to find vulnerabilities in web applications the authors suggested this technique of network recording. To analyse the network packets containing get and post requests of a web application network forensic techniques and tools were used. This approach to trigger network recording of suspected application attack uses network based Intrusion Detection System (IDS).

·         Bisht et. al. to prevent SQL injection proposed a dynamic candidate evaluation approach. Candidate evaluation for Discovering Intent Dynamically(CANDID), a tool proposed by authors is used to record the programmer-intended SQL query structure on any input(candidate input) from the legitimate user. It is then compared with the query structure generated with the attackers input.

·         Michelle Ruse et.al. proposed an approach to detect SQL Injection Vulnerabilities by using automatic test case generation. This framework is built upon the idea of creating a model that deals with SQL queries automatically and captures dependencies among various components of the query. It identifies the conditions in which the queries are vulnerable and uses CREST(Automatic Test Generation Tool for C) test generator. The results show that this method is able to identify the causal set and obtain 85% and 69% reduction respectively while experimenting on few test cases.

·         Xin Wang et.al. based upon access authorization data table (AADT) proposed a hidden web crawling technology. By recording authorization information through cookies, session etc. the web crawlers can be used to gain pages behind login forms. To enhance the ability of web scanner and to raise the web page coverage of crawler model study of web vulnerability detection mechanisms is done. Each and every hidden hyperlink and form present in pages is crawled by crawlers to improve overall web page detection ability of web scanner.


·         Ezumalai et.al. proposed a signature based SQL injection detection technique. SQL queries in web applications is divided smaller units called tokens which is sent for validation. Hirschberg's algorithm which is a divide and conquer version of the Needleman-Wunsch algorithm, is used to detect SQL injection attacks to validate these tokens. No runtime changes are required as it is defined at application level.


·         Avancini et.al. proposed a method of scanning web applications for testing their security. They detected application’s cross-site scripting vulnerabilities by exploiting static analysis. Through a genetic algorithm they looked at input values which uncover these vulnerabilities. To help the genetic algorithm escape local optima, symbolic constraints are gathered at run-time and go to a solver. Software developer’s index search results test cases to comprehend and settle security issues. This approach was implemented in a model and evaluated on world PHP code. They changed conditions identified by static analysis into structural constraints in this paper.


·         Rattipong et. al. presented a methodology for protecting cookies from Cross Site Script attack. This method changes cookies in such a way that they become useless for XSS attacks. Dynamic Cookie Rewriting, is a technique implemented in a web intermediary where cookies are automatically removed with randomized value before sending the cookie to the system browser. Through this way, instead of keeping the unique value sent by the web browser, the system browser will keep the randomized value. This procedure is only tested on HTTP connections.


·         Adam et.al. created an automatic system which exposes SQLI and XSS vulnerabilities through generating input test cases. In this technique, test inputs are created and changed to deliver concrete exploits and track corrupts through execution. The technique addresses second order XSS attack, it makes genuine attack vectors, works without requiring modification of application code, and handles dynamic programming constructs. This technique was executed for PHP by tool named, Ardilla, which can make input for one PHP script at once but it cannot simulate sessions ( i.e. applications which involve multiple pages user-interaction), even if the input generator makes an input that achieves sink, Ardilla cannot produce attacks for sink.



·         Mike et.al. proposed an XSS defence methodology, in spite of behaviour anomalous browser it was intended to be effective in existing browser systems. The proposed approach minimizes trust placed on system browser for interpreting untrusted content. BLUEPRINGT is a tool used to implement this approach and it was integrated with a few popular web applications. It was a strong way to prevent cross-site scripting attacks which was effective upon 96% of the system browser.


·         Wassermann et. al. presented a static analysis which specifically addresses weak or missing input validation for discovering cross-site scripting vulnerabilities. This approach combines data obtained through corrupted information flow with string analysis. Due to the numerous ways to invoke the Java interpreter input validation is troublesome. This approach confront a similar obstacle to statistically check for vulnerabilities. This is addressed by formalizing a policy based upon W3C suggestion, the Firefox source code, and online activities about closed source web browsers. An approach to find XSS vulnerabilities due to unchecked untrusted information and  insufficiently-checked entrusted data is proposed in this paper. The approach has two parts - an adjusted string analysis to track entrusted substring values and a check for endowed scripts in view of formal language methods.

·         Shanmugam, et. al. proposed an approach to detect behaviour based anomaly which presents a security layer on top of the websites, due to which whenever new threats appears the mechanisms are changed but the current websites stay unmodified. Also, to reduce processing time application parameters are acquainted, this approach gives security to websites by permitting tags to be entered in the websites. To decrease processing time it uses whitelist security model due to which it is not prone to zero-day attacks.









Subscribe To Our Newsletter

Get Offers Of Up To 50% Off On Consultation.


/ ( mm / dd )








Trending

Astrology Basics: Concept of Houses, Sub Lord & Cuspal Sub Lord

The ABC, Astrology Basic Concepts, continues. In previous article, you learned what planets, zodiac signs & constellations are . Now, it is time when you come down from skies and understand some of the basic concepts used in astrology to analyze an astrological chart. Zodiac signs are important and they do have their own set of characteristics as mentioned in the previous article but what actually plays a major role in deciding the fate of a person is the houses a planet signifies. Similarly, the constellation in which a planet is present is capable of changing the nature of events. The planet may not give its own result but starts giving results of the constellation if the constellation lord strongly opposes what the planet is signifying but the Sub Lord holds the final say.

Understanding Nirayana Bhava Chalit Chart & Its Importance in Prediction Making

On observing this sky from the Earth, we see billions of stars. A group of stars when forms a recognizable pattern, we call it a constellation. There could be uncountable number of constellations in the skies depending upon from where we see it. We see them from the Earth and the astronomers have discovered 88 constellations till now. In astrology, we only use 27 constellations and they form the entire zodiac belt. There are 12 zodiac sign in this zodiac belt and each zodiac sign has a width of 30 degrees. Each zodiac sign is owned by a certain planet and a planet can be present either in its own zodiac sign or in some other zodiac sign. The zodiac sign which a planet occupies depends upon the point of reference, the Earth. Earth is moving around the Sun along with other planets, therefore, the speeds of movement of other planets appear to be changing all the time. This happens due to the relative motion of Earth and the other planet. If we change our point of reference from Ea

Combinations In The Horoscope That Make A Person Rich (Millionaire OR Billionaire)

This methodology of knowing if a person is meant to become rich is not a theory, it is actually practiced and applied on horoscopes to predict about a person's life and to figure out if a person is meant to become really successful and will become rich in his life. In a horoscope, there are 12 houses and 9 planets (excluding Uranus, Neptune and Pluto). Most astrologers see 1st, 2nd, 5th, 6th, 9th, 10th and 11th house, and their lords to see if a person has the capability to become rich and successful. Some also take the benefic aspects from Jupiter, Venus, Mercury and Moon into account.The actual answer does not come through this way. To accurately know if a person is meant to become rich and successful you need to see these three things: The Person's Intelligence Benevolence of The Planets Support from The Time When these three things combine then a person actually becomes successful. I am sure that you find this very logical.

Why Stellar Astrology is the Most Accurate System of Prediction?

Stellar Astrology (Nadi Astrology) is a predictive system of astrology which gives importance to houses, constellation & sub lord signified by a planet depending upon its degree in the astrological chart. In this system, a planet gives results not on the basis of its natural significations or the houses it owns but on the combination of houses signified by the planet, its constellation lord & the sub lord. A single house is not capable of giving any result & it is very difficult to assess results of a planet without looking at its constellation lord & sub lord. For eg: Second house signifies a number of things but we cannot pinpoint anything unless we see the other houses that the planet is signified through itself, star lord or sub lord. If the planet is also signifying the eleventh house, then either it can mean "Gain/Addition of a member in the family" or "Gain of money & assets" - those who follow astrology knows the second house

Rashi Chart or Bhava Chalit Chart for Prediction

In Predictive Hindu Astrology , there is a major role of Bhava Chalit chart. While Rashi chart remains same for almost 2 days, Bhava Chalit chart is changing every minute . It calculates in which cusp a planet and a zodiac sign is actually present. The placement of planets in Rashi Chart & in the Ascendant Chart (Main Birth Chart) is same, it is just that the Ascendant chart is rotated till the Moon comes in the first house and we call it Rashi Chart. I personally recommend that you avoid seeing Rashi Chart as the Ascendant Chart gives the most accurate results. Moon is very important and we do take Moon's placement into account by following the time period system that is just based upon Moon & stars. Now, we have to take the placement of other planets into account. The Ascendant chart indicates which planet was transiting in your 10th house (right above your head) or 7th house (western horizon) or any other house at the time when you were born. The zodiac sign in the

Astrological Combinations for Success in Civil Services Exam (IAS, IPS, IRS, IFS, etc.)

A civil servant is a person employed in the public sector for a government department or agency. Every year, hundreds of thousands of aspirants prepare for the civil services exam and compete for a few thousands of vacancies. Many of them are into administrative work and they are very much responsible for the welfare of the people & the county. They exhibit qualities like honesty, accountability, responsibility, impartiality & dedication. This is the fact due to which the civil servants are among the most respected people in the society.

3 Most Important Houses For A Happy Marriage

Marriage is a union of two people who are willing to stay together as partners in a personal relationship with the consent of the society. This is how we look at marriage. Nadi astrology also looks at the marriage in the same way and only houses that indicates these things are required to predict marriage. Generally, astrologers look for planets related to the seventh house to predict marriage. The seventh house is the prime house of marriage but the seventh house alone it cannot make the marriage happen. Due to which a possibility of an incorrect prediction arises.

Eleventh House - Why 11th House Is The Most Powerful House In Astrology?

The sky is divided into 12 parts and these parts in an astrological chart are represented by houses. In an astrological chart, there are 12 houses each holding its own significance and controls certain aspects of our life. Planets in a horoscope are bound to give results based on the houses they get associated with through placement and ownership. Not all houses are alike, some are benevolent and some are malevolent in nature. A single house never indicates anything, a combination of houses decides which aspect of life will be effected and whether the effect will be positive or negative. Therefore, planets trigger various good and bad events depending on the set of houses they are associated with. You will find aspects of life, relationships and body parts governed by each house in this article: Astrology Basic Concepts 2 What is the Eleventh House? The 11th house in astrology is called the house of gains(labha sthan). This house fulfills your desires, brings wealth, prospe

Child Birth: Timing, Suitable Time To Conceive, Twins Birth and Custody of Child via Predictive Astrology

Childbirth is the most important event in anyone's life. It is the flow of life from one generation to the next. Predicting childbirth requires the birth horoscope of both mother and the father and not just of any one of them. So, if you are trying to predict the time of childbirth just by looking at your own horoscope, then it will not work. But you can see when is the best time for you to have children through childbirth astrology. We can predict the time when the child will be conceived & not the time when the child will actually take birth. I have tried those methods of finding out the time of birth and they did not work. Sometimes, there is a difference of months between the calculated time and when the childbirth actually happened. So, instead of finding out the time of birth it would be better that you pay extra attention to the lady expecting a baby. Once conceived, we can find out the things like: Childbirth via normal delivery or cesarean Birth to

Most Beneficial Planet For Wealth In Your Horoscope

In Indian mythology, each planet is associated with a certain deity and these deities have their own set of characteristics and powers. The Sun God is the giver of life, the Moon protects & nourishes, and Jupiter governs knowledge and abundance. From a scientific perspective, the Sun is the only source of energy to our planet and for Earth to remain habitable maintaining a specific distance is necessary, the Moon keeps the Earth and its climate stable, and Jupiter keeps us safe from heavenly objects entering into the solar system. Planets have well defined roles to play and control various aspects of our lives. Sun - your soul, self, ego, confidence, father, gold, nobility, power & authority Moon - your mind, emotions, feelings, thoughts, mother, silver, power & authority Mars - land, property, passion, security, brother, competitiveness and courage Mercury - intelligence, learning, wit, business, trade and communication Jupiter - knowledge, wisdom, asset