Wednesday, October 3, 2018

Bitcoins – The New Digital Currency!

Bitcoin is a new digital currency across the globe, picking up very fast through its journey.  Many countries have made it legal to use bitcoins for payments.  You’ve likely to be heard of bitcoin, the digital currency that’s recently coming into the spotlight. Let us understand what is bitcoins and how to use them.Bitcoin is a digital currency that works on a peer-to-peer basis.  It was invented somewhere in the year 2008 by an unknown programmer, or a group of programmers, under the name – Satoshi Nakamoto. It is designed for secure financial transactions taking place between users directly, without an intermediary which means no central authority, no banks, and no government regulators. People who bought bitcoins in the early stages have now become millionaires and authorities seized millions of dollars worth of Bitcoins from the Web’s notorious black market, the Silk Road. There have been huge efforts made to uncover the identity of Bitcoin creators.Bitcoin would keep the transactions and the transacting parties anonymous and keep the transactions very secure, and even eliminate middlemen fees.  This means that it is decentralized and has no central authority controlling it. Like currency notes, it can be sent from one person to another, but without a central bank or the government attempting to track it.While no one authority controls the generation of the coins or tracks them, the system itself is designed in such a way that the network maintains a foolproof system for keeping the record of every transaction as well as tracking issuance of the currency.  These transactions are recorded in the publically distributed ledger called the blockchain.

How Bitcoins Work?


It is really important to understand how the bitcoins actually work.  You can send bitcoins digitally to anyone who has a bitcoin address anywhere in the globe. One person could have multiple addresses for different purposes – personal, business and the like.  To put it in simple words, Bitcoin is the Internet’s version of money.
Bitcoin is at its core a cryptographic protocol, which is why it is also referred to as a “crypto-currency.” The protocol creates unique pieces of digital property that can be transferred from one person to another. The protocol also makes it impossible to double-spend a Bitcoin, meaning you can’t spend the same Bitcoin twice.  Each Bitcoin is based on a cryptographic logic having a public address and a private key, which are long strings of numbers and letters that give each bitcoin a specific identity.
In addition to having a unique digital footprint, Bitcoins are also having all the transactions recorded in a public ledger of all Bitcoin transactions known as the blockchain. Buying or spending a Bitcoin records your purchase publicly and permanently.  The blockchain is maintained by a distributed network of computers around the world. This decentralization means no one entity, such as a government, controls it. Transactions happen digitally from person to person, without middlemen such as banks or clearinghouses.
To buy and sell Bitcoins through online exchanges, the public address and private keys are both required to trade, sell, and spend Bitcoin.  Since transactions are done using the public keys, the identities of the buyers and sellers are veiled to each other and to
 the public, even though the transaction is recorded publicly in the ledger.

Where can you use Bitcoins?

Bitcoin can either be used to buy things online from merchants.  Few organizations have started accepting Bitcoins as well.  It can also be cashed out through an exchange, broker, or direct buyer.  The Bitcoin receivers get to spend them within minutes of receiving these coins. Once spent, you cannot get them back unless the receiver decides to give them to you. A bitcoin is not a printed currency although there are limited bitcoins in the market.

Where do you get Bitcoins from?

Bitcoins are available in bitcoin exchange houses. You can also purchase bitcoins from other bitcoin users. You can also become a bitcoin miner by investing in software and hardware. More the power of the hardware that helps with encryption technology, higher the probability of your earning bitcoins.
 Unocoin is one of the Bengaluru-based company that allows users to buy, sell, store or uses bitcoins. While bitcoin usage is not common, there are said to be more than 500 merchants who accept bitcoins for payment in India. With paper currency, the government decides when and how much cash to print and distribute throughout the nation. They have the control on the quantity to be released in the market.  In comparison, Bitcoin doesn’t depend on any central bank or authority.  The people create Bitcoins through mining process.

Mining is a process of solving complex math problems, which are commonly known as “hashing”, using computers running Bitcoin software. The mining process requires more specialized computing power than regular PCs. You need to buy specialized Bitcoin machines or form groups that chain multiple computers together to perform mining process.  When the program solves one of these math problems, it creates “blocks,” or encrypted Bitcoin transactions. When one of these block is solved, you are rewarded with Bitcoins.
These cryptographic puzzles get increasingly harder as more Bitcoins enter circulation. Also, the rewards are cut in half at regular intervals. In other words, there’s a gradual slow-down in the rate at which new Bitcoins enter circulation. There is a built-in limit of 21 million Bitcoins, meaning when this many have been mined, production will stop completely.
The blocks created by mining make up the transaction record of the Bitcoin system. Every block contains a hash of the previous block, which creates a transaction database, blockchain.  A new block is added to the blockchain on an average of once every ten minutes. Rather than being maintained by a central body, it is distributed across all the mining computers.  The difficulty level of solving the problem is high enough to ensure that it takes the time to do it.  Even if you become a bitcoin miner, there is no guarantee that you would be able to mine a certain number of bitcoins. Any scheme related to bitcoins promising a fixed return is likely to be a lie.

How do you buy or sell Bitcoins?

After understanding how bitcoins are created and how they work, let us now see how can you buy the bitcoins. People commonly buy and sell Bitcoins through exchanges, though this isn’t necessary. In order to make transactions on an exchange, you must have a Bitcoin wallet to keep your currency in.
As bitcoin exchange is not regulated by any authority, so be careful while putting your trust and money.  Once you have settled on a broker or exchange, you create an account with a username and password and link it to your bank account. Once the account is created, you can begin the buying process using bitcoins.
Coinbase and Bitstamp are few of the exchanges which make it pretty easy for the end user to buy Bitcoins, exchanging real-world money from your bank for the virtual currency, or vice versa. For first time buyers, there is usually a delay of a couple of days to a week for orders to go through.  When you want to sell, you make sure your wallet is loaded with your Bitcoins, and pretty much all you have to do is click “sell.” Similar to any other online wallet.
Every Bitcoin has a private, unique, and long numerical ID which allows you to transact offline. If you write this key down or store it on a local drive, you can trade a Bitcoin simply by passing that key off to someone else also.  This approach can actually be faster than going through a centralized exchange.
A relatively new method is a Bitcoin ATM, which is coming into existence.  The first bitcoin ATM machine was opened at a coffee shop in Vancouver, Canada, in October 2013. It lets you buy, sell, and trade Bitcoin in exchange for cash and checks in 60 different currencies.

What is the worth of one Bitcoin?

The maximum cap on the generation of bitcoins is 21 million, out of which approximately 16 million is already in existence.  It is estimated that approximately 5 million bitcoins can be mined now onwards, till around 2140. One bitcoin is worth roughly around $1815 as on May 2017.   An early investor once quoted on the Web saying that by 2030, the value could be as high as $500,000. One of the reasons that could prompt you to buy a bitcoin today is not so much to use it for payment online but as an investment.

How has Bitcoin evolved in India?

As per a news report published in August 2015, “India has around 50,000 bitcoin enthusiasts, with 30,000 of them actually owning the currency.” While the figures would be slightly higher now, India still isn’t a significant participant in the virtual currency revolution, but its potential can’t be challenged.
Recently, the biggest challenge faced by many organizations was the ransomware attack where the attackers are demanding Bitcoins in return for sharing the key to restore the company’s computer systems, which were hacked and locked.  India’s biggest Bitcoin trading platform, BuySellBitCo.in, has suspended its operations, citing a recent Reserve Bank of India public advisory that highlighted the risks involved in dealing with virtual currencies.  It has relaunched as Zebpay in the market.

Bitcoin and other virtual currencies have begun to gain widespread acceptance in India, despite poor Internet penetration and lack of necessary laws to backup. The central bank had issued a notice on the risks involved and added that it could be used for money laundering and funding terrorism activities.
Contact Details:
Santosh Gore Sir
Ph:09096813348 / 8446081043 / 0253-6644344
Email: sai.info2009@gmail.com 







MATLAB SETUP INSTALLATION


Getting started In Matlab KTH agreement ALL toolboxes are included and available to be installed but you have to select to install all toolboxes or select which additional toolboxes to install (Step 7).
All modern systems except Window 7 (and earlier versions of Windows) can handle .iso-images. Those who do not know how to mount an image file on their system should consult the appropriate guide on how to do this, or ask in the web forum for their system. For users of Windows 7 (and earlier) KTH ProgDist recommends Virtual CloneDrive. A link to the product download page, and a quickstart guide can be found in the Freeware section of KTH Software Download. 

Matlab Installation Step By Step:-

STEP 1
Select “Log in with a MathWorks Account” and press Next.

STEP 2
Read the license agreement, mark “yes” to accept the terms, and press Next.

STEP 3
Select “Log in to your MathWorks Account”, provide your MathWorks account login information, and press Next

STEP 4:1
If you already have the KTH license associated with your account, select “Select a license” and press Next. (Proceed to Step 5 in the manual)

STEP 4:2
If you do not have the KTH license associated with your account, provide the activation key found on the ProgDist page, and press Next. (Proceed to Step 5 in the manual)

STEP 6
Specify a destination for the installation and press Next.

STEP 7
Check the “Product” box to install all toolboxes or select which additional toolboxes to install and press Next to continue. In case you missed to install some toolboxes you have to re-install your Matlab to add toolboxes.

STEP 8
Make your selection and press Next to continue.



 STEP 9 


A last chance to review all the choices before proceeding. If ready, press Install to commit.
STEP 10 
In some cases this step may take a very long time. Temporarily disabling real-time virus/file scanners, firewalls and other similar products/services might speed up the installation considerably.

STEP 11
After the installation, the installer will notify about any requirements if needed. Press Next to continue

STEP 12
Make sure the “Activate MATLAB” box is checked and press Next.

STEP 13

Press Next to start the activation process

STEP 14 
Provide your user name on the computer (the local user on the computer for whom Matlab is being installed) and press Next to proceed.



STEP 15

Press Finish to end the Matlab installation0..


If anyone is interested for doing Research in above subject for BTech/MTech/PHD Engineering project work
Kindly Contact Below

Contact Details:
Santosh Gore Sir
Ph:09096813348 / 8446081043 / 0253-6644344
Email: sai.info2009@gmail.com 





What Is Network Security?



Sai Info solution provide the Project Development & Training. We Develop Project for BE/ME/PHDNetwork security is any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network.In this modern era, organizations greatly rely on computer networks to share information throughout the organization in an efficient and productive manner. Organizational computer networks are now becoming large and ubiquitous. Assuming that each staff member has a dedicated workstation, a large scale company would have few thousands workstations and many server on the network.
It is likely that these workstations may not be centrally managed, nor would they have perimeter protection. They may have a variety of operating systems, hardware, software, and protocols, with different level of cyber awareness among users. Now imagine, these thousands of workstations on company network are directly connected to the Internet. This sort of unsecured network becomes a target for an attack which holds valuable information and displays vulnerabilities.
In this blogs, we describe the major vulnerabilities of the network and significance of network security. In subsequent blogs, we will discuss the methods to achieve the same.


Vulnerabilities & Attacks

The common vulnerability that exists in both wired and wireless networks is an “unauthorized access” to a network. An attacker can connect his device to a network though unsecure hub/switch port. In this regard, wireless network are considered less secure than wired network, because wireless network can be easily accessed without any physical connection.
After accessing, an attacker can exploit this vulnerability to launch attacks such as
·        Sniffing the packet data to steal valuable information.
·        Denial of service to legitimate users on a network by flooding the network medium with spurious packets.
·        Spoofing physical identities (MAC) of legitimate hosts and then stealing data or further launching a ‘man-in-the-middle’ attack.

Achieving Network Security

Ensuring network security may appear to be very simple. The goals to be achieved seems to be straightforward. But in reality, the mechanisms used to achieve these goals are highly complex, and understanding them involves sound reasoning.
International Telecommunication Union (ITU), in its recommendation on security architecture X.800, has defined certain mechanisms to bring the standardization in methods to achieve network security. Some of these mechanisms are −
·        En-cipherment − This mechanism provides data confidentiality services by transforming data into not-readable forms for the unauthorized persons. This mechanism uses encryption-decryption algorithm with secret keys.
·        Digital signatures − This mechanism is the electronic equivalent of ordinary signatures in electronic data. It provides authenticity of the data.
·        Access control − This mechanism is used to provide access control services. These mechanisms may use the identification and authentication of an entity to determine and enforce the access rights of the entity.

How does network security work?
Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements policies and controls. Authorized users gain access to network resources, but malicious actors are blocked from carrying out exploits and threats.
How do I benefit from network security?
Digitization has transformed our world. How we live, work, play, and learn have all changed. Every organization that wants to deliver the services that customers and employees demand must protect its network. Network security also helps you protect proprietary information from attack. Ultimately it protects your reputation.
Types of network security
Access control
Not every user should have access to your network. To keep out potential attackers, you need to recognize each user and each device. Then you can enforce your security policies. You can block noncompliant endpoint devices or give them only limited access. This process is network access control (NAC).


Antivirus and antimalware software
"Malware," short for "malicious software," includes viruses, worms, Trojans, ransomware, and spyware. Sometimes malware will infect a network but lie dormant for days or even weeks. The best antimalware programs not only scan for malware upon entry, but also continuously track files afterward to find anomalies, remove malware, and fix damage.


Application security
Any software you use to run your business needs to be protected, whether your IT staff builds it or whether you buy it. Unfortunately, any application may contain holes, or vulnerabilities, that attackers can use to infiltrate your network. Application security encompasses the hardware, software, and processes you use to close those holes.


Behavioral analytics
To detect abnormal network behavior, you must know what normal behavior looks like. Behavioral analytics tools automatically discern activities that deviate from the norm. Your security team can then better identify indicators of compromise that pose a potential problem and quickly remediate threats.


Data loss prevention
Organizations must make sure that their staff does not send sensitive information outside the network. Data loss prevention, or DLP, technologies can stop people from uploading, forwarding, or even printing critical information in an unsafe manner.


Email security
Email gateways are the number one threat vector for a security breach. Attackers use personal information and social engineering tactics to build sophisticated phishing campaigns to deceive recipients and send them to sites serving up malware. An email security application blocks incoming attacks and controls outbound messages to prevent the loss of sensitive data.


Firewalls
Firewalls put up a barrier between your trusted internal network and untrusted outside networks, such as the Internet. They use a set of defined rules to allow or block traffic. A firewall can be hardware, software, or both. Cisco offers unified threat management (UTM) devices and threat-focused next-generation firewalls.


Intrusion prevention systems
An intrusion prevention system (IPS) scans network traffic to actively block attacks. Cisco Next-Generation IPS (NGIPS) appliances do this by correlating huge amounts of global threat intelligence to not only block malicious activity but also track the progression of suspect files and malware across the network to prevent the spread of outbreaks and reinfection.


Mobile device security
Cybercriminals are increasingly targeting mobile devices and apps. Within the next 3 years, 90 percent of IT organizations may support corporate applications on personal mobile devices. Of course, you need to control which devices can access your network. You will also need to configure their connections to keep network traffic private.

Network segmentation
Software-defined segmentation puts network traffic into different classifications and makes enforcing security policies easier. Ideally, the classifications are based on endpoint identity, not mere IP addresses. You can assign access rights based on role, location, and more so that the right level of access is given to the right people and suspicious devices are contained and remediated.

Security information and event management
SIEM products pull together the information that your security staff needs to identify and respond to threats. These products come in various forms, including physical and virtual appliances and server software.

VPN
A virtual private network encrypts the connection from an endpoint to a network, often over the Internet. Typically, a remote-access VPN uses IPsec or Secure Sockets Layer to authenticate the communication between device and network.

Web security
A web security solution will control your staff’s web use, block web-based threats, and deny access to malicious websites. It will protect your web gateway on site or in the cloud. "Web security" also refers to the steps you take to protect your own website.

Wireless security
Wireless networks are not as secure as wired ones. Without stringent security measures, installing a wireless LAN can be like putting Ethernet ports everywhere, including the parking lot. To prevent an exploit from taking hold, you need products specifically designed to protect a wireless network.


 If anyone is interested for doing Research in above subject for BTech/MTech/PHD Engineering project work
Kindly Contact Below

Contact Details:
Santosh Gore Sir
Ph:09096813348 / 8446081043 / 0253-6644344
Email: sai.info2009@gmail.com 





Sensor ventilator for COVID-19 The COVID-19 virus is spread by direct contact with an infected person's respiratory droplets (generated ...