...The World Wide Web...

Media News ! Strategies For Security Threat’s with Dynamic Website Login Screen Check's By Using Various Verification Technique's For LAN / MAN / WAN Based Software / Web Based System’s



Hello,

I need help with business projects, kindly have a look if I can get a Job in IT Sector.

Have a look at the web pages https://alkahaftechnologies.com/sitemap.html with lots of security and customized software’s solutions setup and security check’s in detail,

Mean while have a look at the following material I wrote myself as I am looking for a Golden opportunity in IT Sector / Field.

Strategies For Security Threat’s with Dynamic Website Login Screen Check's By Using Various Verification Technique's For LAN / MAN / WAN Based Software / Web Based System’s

The User Interface of any good Dynamic website should be designed based on the following check's and user verification,
1. After entering the password for the User ID, there should be a SMS with pin code sent to user registered and verified mobile number, which the user can enter for logging in to dynamic website system. These days the landlines are also able to receive SMS so they can also used for this type of verification. This type of verification is named and is available in email logging these days, as 'Two Step Verification'.
2. Face recognition technique can also be used to login into dynamic website after registering and verifying yourself in face recognition database that is through face tracking enabled camera's or verifying the live user face through camera or using a live picture and then comparing it with registered user picture using face recognition technique.
3. A Dynamic website can use voice recognition technique after entering User ID and a password to login into Dynamic website system, the voice pattern is compared with the registered User voice pattern after logging in the User ID and Password with the stored User voice registered and verified voice sample or pattern and then given access accordingly. The voice recognition pattern can also be used as a password that can be saved in the database and compared and then giving access to the user.
4. The palm or thumb or hand prints or Finger Prints can also be used to login to any dynamic website after registering and saving the User details and registering and verifying them while giving access to the dynamic website. The User's Palm Prints or Thumb or Finger Prints are stored in a database as an image and that image can be compared when the User login's to the Dynamic website system after entering there login credentials and moving onto the next page for verification.
5. Eye or Retina Recognition User Authentication technique can also be used to login into and verifying a a User to any Dynamic website on web and or MAN / LAN.
6. The other very sophisticated verification technique's which can be used for User Authentication while logging in to any highly intelligent Dynamic system are, Blood Matching, Hair Matching & Nail Matching. The Electro1nic device's need to be installed on PC's where you want to login. These same technique's can also be for User Authentication on Customized Desktop or Centralized or Distributed Software's Systems used in companies or shops or mall's, airline's, airport's, railway's, police station's, Interpol, NATO Force's, Country Army, etc.
7. One of the coding technique / method which can be used for avoiding any User ID getting misused on the World Wide Web is we use MAC Address Filtering option, coded and implemented in the Dynamic website user interface web page. By MAC Address Filtering I mean that we create a table with fields in the database to hold records of user devices through which they login into the Dynamic website system, that is there PC's / iPad or TABLETS / Phablets / Smart Phones / PDA's / Smart TV's Adaptor MAC Addresse's can be added, registered and verified and then they can only be able to login into web based Dynamic system by using the registered MAC address device's. But USB adaptor's should not be registered as they can be used on any USB port enabled PC. The MAC Address router filtering can also be added as the devices connected to that particular router on a LAN or WiFI NETWORK WILL GET AUTHENTICATED and the dynamic system can only be used on that particular router connected devices. This option can be entered as self by the user itself if the user is using an intelligent super smart dynamic system on the web. If you want to add more technicalities then you can add more options like serial numbers of processor, motherboard, modem and even the browser version in the DBMS and authenticate the user on the basis of stored information in the database's like ORACLE / MS SQL Server / MS Access / MySQL. And do proper logging that who tried to login and got authenticated or not. And put option to inform the Administrator and the User itself by an email or SMS alert of any failed authentication. You can set routers with MAC Address Filtering so that only registered device's in the router's get connected to the web connection and will be able to use the Smart / Intelligent Dynamic Web Based System.

Media News ! Customized Systems Measures To Be Taken Before & While Developing & Implementing A System For A Client ! Security Tips

Main Database Management System Server should have a user id & a password settled for use by system designers or administrator of that particular system at the client side.

The Database itself should have a separate/different User ID and a Password to be used by the developer/programmer fo the system at the client side.

User Interface (The Presentation Layer which is used to communicate with the database (or DBMS) for storing or retrieving data from it (Client Side System/Web Interface)), should have a different user id and a password for each user.

The User ID and the Password should be different for logging into windows to use the customized client system through a browser installed in windows OS.

Modems (Internet / Dial-Up / Mobile) / LAN Switches And Routers (Any Type { WIFI / LIFI }), the gateway user ID and password should be altered by the networking engineer and should not be kept to default settings ( Manufacturer Settings by default is user id: admin / Password: admin ).

The Firewalls also comes built-in with the communication devices like Modems, Routers and Switches, which should be enabled for outside network penetration by hackers if the customized system is over the internet using a domain for accessing it.

Antivirus should be properly installed and logging to it is to be with the separate user id and password. There are various types of antivirus systems software available in the market. That is stand alone (single use on a PC or a tablet or a mobile device which has an OS or runs using an OS{Operating System}), secondly the Antivirus can have a separate server and the clients just have an interface to it, so when the antivirus server gets updated by the antivirus software company, the clients gets updated themselves.

Customized firewalls can also be installed and used by the clients for extra protection. These can be an Artificial Intelligent System designed based on decision support system that is, firewall decide whether to give access to this particular user in an outside company or not. Like for example the client can be a lame user over the internet, so the client id will have this information of what type of information can be accessed and specially the internet connection which the lame user is using will have this details too. So the firewall (this functionality can be coded in an Antivirus system using centralized terminology) can decide whether to give access to the client or not.

Windows defender is the stand alone firewall and an antivirus in Microsoft Windows 10, and it gets updated through the internet. But this antivirus/firewall uses the client system memory as it continuously or timely using separate .exe programs bind with the software, checks for an update using the internet and connects to that particular antivirus company server where known virus / trojan's information is kept.

Use encryption keys / methods to encrypt confidential data while saving data into a database, like using hashes for example save a data and encrypt it using hash and save it on a different server probably data center server (connected to actual DBMS) and just save it address in the database table.

Use proper security modules customized for client side data access and entering it, I mean separate credentials for that particular client / End-User / Employee / Boss / Company (System) Owner with different and approved privileges, and proper logging should be used for who did what and when.

Design/Set the Network using the Latest Technology available in the local or international market, which includes Networking Devices like Modems, LAN Switches, Routers (Wireless {WIFI / { LIFI (Use Optical Fiber Technology for data transfer at Lightening Speed)}}), Servers (Both Operating Systems and the computer configuration itself) and in the last the clients systems (PC's / Phablet's / Tablets / Mobiles / PDA's / etc. and their OS).

Remember never to keep the User Details / Password / User ID's / Encryption techniques Used and the Encryption Keys itself used for saving/retrieving data from a database through a DBMS connected to a data center behind, on a separate stand alone computer / PC or a USB Hard Drive or a pen drive kept in a vault safely by an unknown computer engineer who is not known to the system user's.

Remote monitoring software should be installed on the main system server and on client PC's for remote desktop services.

Proper back up's of the systems and its database and its clients credentials should be taken by using automatic back up techniques or manually by that particular software engineer who is not known to the company user's/ employee's. The Back Up's can be taken on a daily / Weekly / Monthly Basis or what ever the company owner decides, it depends on how important the data is to the company.

The main gateway which connects the system server to the internet should be settled up very carefully, enabling/using all types of options like Firewalls, device gateway interface user id / password, should be altered by the system engineer and not to kept as default to manufacturer settings.

If the system is on a domain over the internet, then please make sure only those services and ports are enabled which are related to that particular system needs or if the domain is saving the data on a different data center on any other remote location, connecting the data center database through a domain web site (pages / portal) using different credentials, then proper ports and services should be enabled which are related to the company activities where the system is being implemented and installed for clients and employees of that company. The web pages have the connection values hiding inside the encapsulated programming language known to the domain server or system server. The web pages kept on a domain will be used through a web browser or an application for mobile (iOS application / Android Application), to connect to the company system used by various types of user's. The users can be employees and company clients also or even the boss or the owner itself, will just need separately privileged user id's and password for connecting to the system. The clients will not have direct access to the system itself as they are connecting to it through a domain page which is connected in relay may be to the data center where the database is kept.

Now same goes for Email Exchange Servers / Software's, either you can buy an Exchange Server Software with Computer systems as needed to run the Exchange OS itself, confidentiality kept on a private facility used by the company employee's for day to day activities. for this the company has to buy a dedicated line with an fixed IP address if you set your own emails exchange server. This option is best suited for government firms and multinational companies as if they use other company services like email accounts provided when you register a domain with a web hosting firm. Can be costly or less costly, it depends on the company activities and client span.

Separate exchanges are needed by those companies where the company does not want to share their information with the web hosting services provided. Fixed IP can be used with domain forwarding services. etc.. The complicate the system, the greater maintenance services and procedures are required to run it which includes proper data back up's.

The Employee's should be able to use their personal devices which can connect to the company system in company premises, devices like USB Modem's (Wingle), or their personal mobile itself.

All USB port's should be monitored for data copying or theft by the employee's themselves or the USB ports should be kept disabled by checking if their is need for it by the employee using the PC as this can be a problem when somebody puts an virus affected USB hard Drives or other USB devices available or a USB wingle device which can use to hack the company network as the wingle device will be connected to the telecommunication company. So, they can download or upload company information by hacking the company network from inside using a USB Wingle with internet enabled on it.

Bluetooth Device must be kept on and or hidden always, as when it is kept on the device doesn't stay's idle and the port's used by the device will not be open to hackers. Just the other mobile device connecting, the employee should know who it is connecting, I mean the employee can give access to the hacker requesting to connect to the Bluetooth device of that particular PC or mobile or a tablet.

As these days the Laptops and Other Personal Computers are coming with built-in USB ports, so what you can also do is to request the computer companies to make customized PC's and servers for that particular end-user company. Inside a multinational company there are various devices these days which are forbidden to take inside and take some company property outside like a computer, so what you can do is to use proper locking tables and cupboard's (for LAN/WAN Switches / Routers / Mobile Devices), to keep your device out of reach of unauthorized user. Because the Devices can be connected physically like connecting to LAN Switch directly using a Laptop and accessing its Interface using the gateway and if the unauthorized personnel is lucky then, the default user id and password for that modem router or switch is at default setting so admin and admin will be the user id and password to connect to it. If you want to see the password written in the **** form, so there are various software's to see this too, like Wheel to drag a wheel on to the **** password and it will come in a text box in the wheel software, I use to use.

Remember to use the POST method while transferring the form data (POST Method hides the values of passed parameters to the other scripting language web page for it to processed by that particular scripting page {like PHP (Personal Home Page, file extension .php and/or simple script's like VB or java script's, etc.)}) instead of transferring the form data using the GET (GET method passes the parameter values openly in a web browser link normally known as URL (Uniform Resource Locator), which is seen by in the browser where the website address is typed, after the question mark {?} all are parameter values passed to other pages for may be fetching data from a DB for a particular employee or customer) method by passing the parameters values, in an HTML 5 Form (Responsive HTML). In GET Method the data transmitted to another page or program gets hided/encapsulated inside a packet which is not seen at the presentation layer i.e. in the browser website address link bar. And https web url's are used by bank's and other financial firm's to communicate between and among the customer's and themselves as employee's. For designing a good web page or a website you can use software's like Blue Griffon, Microsoft Visual Studio .Net (ASP .Net), Flex for iOS, Linux (Red Hat / Ubuntu / Mandarin) for Android, Macromedia Dreamweaver, etc.

Microsoft Visual Studio .Net 2017 can be used for making 3D games using enhanced programming terminologies.

And always make sure the programming engine which you are using to run your website like for example if you a website or a customized desktop system use's CLR (.Net Engine) to process it's code's at the client side, then it should be regularly updated by subscribing to the Microsoft Website's for this particular software. Or if you are using java as the programming engine at the client side, then JVM (Java Virtual Machine) should be regularly and updated by subscribing to their information website or software update system. The security patches do come now and then so it is a must to have a very fast internet connection and fully activated windows operating system (copy righted), the OS should not be pirated, even though I learn all this by using pirated software's during my university course, but I never tried to earn from it by selling it may be.



Media News ! Communication 2.6 ! Bluetooth Technology ! Device ! Security Tips & News

Internet Speed Measurement's as compared to actual files on computer hard drive's

Internet Speed Measurement ! Megabytes Per Second (MBps) Vs Megabit Per Second (Mbps) MBps and Mbps speed measurements are available in calculating the speed of downloading and uploading a file from over the Internet onto a PC or a server or a mobile or a Tablet, etc. The downloaded or uploaded file itself, I mean it's size is calculated in (capital MB) Megabytes (MB) not Megabits (Mb). That is how a computer store's a downloaded or copied file on to itself, from any type of source it is connected to.

Latest Technologies like 4G (Fourth Generation) have a very high range of speed of upto 150 MBps (Megabytes Per Second) From minimum 1 MBps (Megabytes Per Second). This is what you need to be make sure that the Internet connection you are taking and it's package should be in capital MBps not in small Mbps. If it say's in small 2 Mbps (Megabits Per Second) then in actual it is 256 KBps (Kilobytes Per Second), which is 0.220 MBps (Megabytes Per Second) in actual.

Unlimited data packages provided by ISP's these day's have an internet connection speed in small Mbps (Megabits Per Second) i.e. how they earn through this, but this package has a benefit that it has a very high data download/upload limit, i.e. it might be 150 GB monthly.

There are more measurement speed's available like Bytes, Kilobytes, Megabytes, Gigabytes, Terabytes and in small Bits, kilobits, Megabits, Gigabits and may be Terabits.

Remember that the file when it get's stored onto a PC's hard drive, its file size is calculated in capital measurement's like Bytes, Kilobytes, Megabytes, Gigabytes, Terabytes.

These Two available download and upload a file speed measurement's are used only over the internet,

Bits, kilobits, Megabits, Gigabits and may be Terabits: This will be slow while downloading and uploading a file over the internet, the reason for this is the file itself in actual is in capital measurement's like in Bytes, Kilobytes, Megabytes, Gigabytes and Terabytes, so the file will take time to get uploaded or downloaded.

Bytes, Kilobytes, Megabytes, Gigabytes, Terabytes: This will be fast/actual/real while downloading and uploading a file over the internet, the reason for this is the file itself is in already in capital measurement's like in Bytes, Kilobytes, Megabytes, Gigabytes and Terabytes, so the file will take the same time to get uploaded or downloaded as the speed of internet connection and the file size itself is in same calculation measurement. That is the data transfer rate and the file itself uses the same measurement's i.e. for example: if you download a 2 MB (Megabytes) file on a 2 MBps connection, it will take 2 seconds to get downloaded.

And if you download a 2 MB file using a 2 Mbps internet connection, it will take 16 Seconds to get downloaded, approximately.

And there are some other related details like if on an 2 MBps Internet connection, if you download several or more than one 2 MB files simultaneously (at one given time), so the bandwidth i.e. 2 MBps will be shared among the downloading files. And there are some other things like when you download a file from a server over the Internet, so isn't that server also connected to the Internet and using some Internet speed package and data limit package or unlimited data package and the machine configuration is also been dealt with as if that is a server over the Internet keeping that file you might be downloading, then it is for sure that the file you are downloading, other user's might also be downloading the same file, so ultimately the server speed also comes in. But server's these day's are of very high configuration and speed both machine and Internet Connection Speed, And Data Limit's, so if you want to check just by downloading a single file then if your connection speed is 2 MBps then the downloaded file will get downloaded in 2 seconds if its size is 2 MB.

The more the number of Internet user's over one single connection, the Bandwidth of that connection shared among the devices the end-user's are using over the same network.

In distributed system's this terminology is used as the the Database is kept on various server's and the table's inside the database are kept in a distributed format like distributing the field's for example of customer in separate table's with same primary key's so one can access some part of data quickly without searching the whole database and fetching the whole record of that particular customer. Keeping such type of table's and record's give us a high access speed to fetch that record from a table if there thousand's of record's in a table. This is called optimization of a Database.

Keeping records or a database centrally has the benefit that it's maintenance is easily done but the record's fetching speed might degrade as while searching all the database record's are searched, so if there are thousand's of records in a table of a database, the a very high server, network and Internet connection is needed. There are various other method's of saving data, one is directly saving a record with it's hash address like memory address or hard drive address, so just keep it's file path or this hash address in a table database or one other idea is to give that hash address to the customer or client who passes parameter's to the system for fetching records, so if the client has the hash address or memory address or hard drive address of a cylinder in a track, then the system can directly access the record and show it to the end user but fetching using hash address or memory address should only be through the system interface not by any other means.

While transferring the parameters from a web page to another program or a web programming language web page, we need to take care that when we transfer values using parameter's, the value's are seen on the browser url textbox. These value's can be like http://www.oooooooooo.com/index.asp?customerid='1'. The parameter value of a customer id is seen in the weblink. One of the security loophole is that it can run sub query, like for example, http://www.ooooooooooo.com/index.php?customerid='select * from customer where customerid ='1', and status='active';' and press enter. Similarly these subquery has other functionalities built-in the DBMS, i.e. many function's are available to get stored database information using DBMS function's and object's. This method of passing values is known as GET method. While POST method hide's the parameter's value's while transferring or calling or executing to another web page with scripting languages like php and asp .net.

Make sure to check for if there any services or port's opened and not needed by the customized system for that particular company, who's system you are making, need's to be closed or be disabled and not remain idle or opened. Open Service's or port's are vulnerable for hacker's getting access to it may be by using brute forcing i.e. even if it is password protected.

FING (available in iOS by Apple (Mobile/Computer's/Tablet's/Watche's, etc. Company)) can be used to check what are the services provided on a domain or an IP Address over the Internet.

Well hacking is not Ok if it is not ethical, that is the hacker's should not harm the system or any other device or it's data stored or it's peripheral's or BIOS or it's software's or browser's history or the account's its use like Email's, Social Networking Website's, blog's, User's bank details over Internet Banking over the Internet. There are various Ethical Hacking Courses available in the market. Metasploit Project is also a very nice coding software to get information on the OS vulnerabilities or like for example what services or port's are available for getting access to it.

Click Here for More Info on Harmless Hacking Known as Ethical Hacking for World / Continent / Country / City / Area or Any crime done by an individual to check or monitor it's activities,

Click Here for More Info on Harmless Hacking Known as Ethical Hacking Sample Exam

Click Here for The Microsoft Press Store (eBooks For Programmers / Software / Network Engineer's / Etc.) ! Microsoft Virtual Academy

Click Here for The Microsoft Courses ! Microsoft Virtual Academy

One of the given options in Database from Microsoft, named as Microsoft Access, comes with Microsoft Office Software's, currently known as Office 365, is that you can hide the whole table inside a database, like for example hiding a User ID's and Password's table from the application user or the interface itself i.e. when or if the user of application have access to the database even with the password protected Database, you can hide the table separately from the user and only access that table through the user interface that is the application through which you are entering or retrieving the data and processing it through the application engine for company business activities.

To Download Latest Microsoft Office, click here

For Free Download's And Security Update's For Microsoft Product's, click here

For Microsoft Education / Product's, click here

Latest Windows From Microsoft

Database User's:

Unrestricted administrative accounts There are two administrative accounts (Server admin and Active Directory admin) that act as administrators. To identify these administrator accounts for your SQL server, open the Azure portal, and navigate to the properties of your SQL server.

Server admin: When you create an Azure SQL server, you must designate a Server admin login. SQL server creates that account as a login in the master database. This account connects using SQL Server authentication (user name and password). Only one of these accounts can exist.

Azure Active Directory admin: One Azure Active Directory account, either an individual or security group account, can also be configured as an administrator. It is optional to configure an Azure AD administrator, but an Azure AD administrator must be configured if you want to use Azure AD accounts to connect to SQL Database. For more information about configuring Azure Active Directory access, see Connecting to SQL Database or SQL Data Warehouse By Using Azure Active Directory Authentication and SSMS support for Azure AD MFA with SQL Database and SQL Data Warehouse.

The Server admin and Azure AD admin accounts has the following characteristics:
These are the only accounts that can automatically connect to any SQL Database on the server. (To connect to a user database, other accounts must either be the owner of the database, or have a user account in the user database.)
These accounts enter user databases as the dbo user and they have all the permissions in the user databases. (The owner of a user database also enters the database as the dbo user.)
These accounts do not enter the master database as the dbo user and they have limited permissions in master.
These accounts are not members of the standard SQL Server sysadmin fixed server role, which is not available in SQL database.
These accounts can create, alter, and drop databases, logins, users in master, and server-level firewall rules.
These accounts can add and remove members to the dbmanager and loginmanager roles.
These accounts can view the sys.sql_logins system table.

Configuring the firewall
When the server-level firewall is configured for an individual IP address or range, the SQL server admin and the Azure Active Directory admin can connect to the master database and all the user databases. The initial server-level firewall can be configured through the Azure portal, using PowerShell or using the REST API. Once a connection is made, additional server-level firewall rules can also be configured by using Transact-SQL.

Administrator access path
When the server-level firewall is properly configured, the SQL server admin and the Azure Active Directory admin can connect using client tools such as SQL Server Management Studio or SQL Server Data Tools. Only the latest tools provide all the features and capabilities. The following diagram shows a typical configuration for the two administrator accounts.

For More details Kindly have a look at the following web link from Microsoft on SQL Server Database's

This means very high class of web based and desktop based system's can be developed using all type's of options available in the front-end {(C# .Net, ASP .Net, PHP, VB .Net, etc.)} and {back-end (Microsoft Access, SQL Server, MySQL, etc.)} programming languages and RDBMS.

The Database user's should be used only by the developer's, I mean the client's should not be able to connect to the DBMS directly by using SQL Server Management Studio for SQL Server Database(s), the client's should only be able to connect through the front-end (presentation layer) interface developed for them by the Programmer's.

You can also use web function's or API's from other web site's like facebook.com, outlook.com, twitter.com and google.com, etc., to validate a user in your system, the benefit of this is that you don't have to keep complete user information for your system and guarding all type's of Password's and bank details, only logging will be needed that is who did what after logging in and when it logged out. And only valid user's who are genuinely over the internet will be able to log in your system.

Some Details on How To Adjust Windows 10 Firewall Rules And Settings : In Windows 10, the Windows Firewall hasn’t changed very much since Vista. Overall, it’s pretty much the same. Inbound connections to programs are blocked unless they are on the allowed list. Outbound connections are not blocked if they do not match a rule. You also have a Public and Private network profile for the firewall and can control exactly which program can communicate on the private network as opposed to the Internet.

Click here for more Information on how to control Inbound and Outbound Data On a Private or Public Network using Microsoft Windows 10

The Inbound and Outbound Data can also be setted on a pure Windows Server also, through using policies and active directory /port's. Even a computer with Microsoft Windows 10 Minimum version should be Professional or higher version should be Enterprise, can also be used as a server for desktop or web based system on a LAN or WAN. If on WAN then leased lines with registered IP address is needed to run it without registering a domain. If using a domain then it is a must that interface (coded pages with script's and HTML probably HTML 5 if using latest HTML version) designed to access the database should be on that hosting server where the domain is registered.

You can also control the inbound and outbound traffic over the Public / Private network using McAfee solutions, McAfee solutions deliver complete virus protection and internet security. Download McAfee anti-virus and anti-spyware software to protect against the latest .... One of the best Antivirus / Firewall, I have used to block hacker's even on the same network i.e. inside a LAN is Norton Antivirus. Click here for more details on Norton Product's

Click here for more details on Norton Mobile Security for your Mobile Device's like Phone's and Tablet's

Click here for more details on Norton WiFi ! Protect your data with a no-log virtual private network (VPN) that encrypts your personal information and doesn’t track or store your online activity or location.

Click here for more details on Introducing Norton Core — The secure router for your connected home ! the ultimate in WiFi security for the connected home ! Norton Core secure WiFi router protects your digital life, while delivering the highest level of performance. All the WiFi coverage you need—even prioritize speed to any device you want. Powerful tools for parents to monitor and manage screen time, control time limits and set content filters. Iconic design that is beautiful from every angle; no need to hide this work of art.

Norton AntiVirus Basic ! Powerful Security ! Simply Affordable

Norton ! Internet Security

Firewall these day's have the options to login remotely to other computer's with the same version of firewall from the same company. So, managing it is very convenient from the developer's premises. It uses IP Addresses and Password's may be User ID's too, to connect remotely. All Network traffic can be managed remotely even by using remote desktop connection even on a Windows 10 OS Professional/Enterprise Version PC / Server.

You can get a domain registered using any host too, and get it forwarded to a leased/Permanent IP Address on a Private server, i.e. the code can also be kept on a different server than the domain hosting server with a forwarder on that domain through cPanel for example. The example link will be like this https://alkahaftechnologies.com and when you enter it on web browser and enter it, it might forward you to this link with leased IP Address, http://10.52.58.1/index.html, and it will open the main index page may be for that particular web browser based company system linked to their database.


Microsoft Windows Operating System Security Feature:-
Just right click on the drive or a folder or a single file itself, and select the tab with the text security.
You will be seeing the local windows user's and microsoft outlook email user's of the window's on this tab.
Now, select the user you wan to give access to your files or the drive itself.
don't change the setting of system user, because system user needs full control in order to boot the operating system. Just change the setting for the administrator's, local or Standard User's or simply user's, and then your outlook email user's.
if you make your outlook email user full control and remove the full control from other user's like administrator's, local or Standard User's or simply user's or any other outlook email user, then only you will have access to the files in a drive or folder or a file itself.
These day's the thumb or finger print login facility or option is there so if you setup your system like this then only you can access your file's.
And if for some reason the hacker's gain access to your system through the internet then even they cannot edit or delete or copy your file if you have shut control's like read, edit, delete, create, full control to the other user's apart from your own outlook email user or local user. But I haven't seen the thumb login facility using the local windows user.
Just one thing you have to keep in mind, if you setup your PC using the outlook email option, then you can setup any number of PC's using the same user ID of your outlook email address. But what if somebody have access to your outlook email address and set it up on a pc, so when it will gain access to all your file's on cloud, and if it use's that pc to hack your this PC where you have setted up the security feature, so as the hacker will have the same user installed in it's system, the hacking software will give it access to your PC. So, in order to escape this you should never give your outlook ID to anyone for anything I mean the id password, and the recovery code's or the two step verification code if it's set. So, the best method is to use thumb login option that use fingerprints to login, as finger prints are unique so only you can access your system using your ID.

How to Save Images and Videos In A Database Like MySQL for PHP, Microsoft SQL Server For ASP.Net and Other Programming Languages like C# .Net, VB .Net, etc.

If we use this option to save Images and Videos instead of their file paths in the server where they are actually saved will lead to high level of security because then we can use various encryption methods apart from the encryption options given by the Database (Server) itself.

Using encryption methods like this even if the web server or data center server gets hacked the files if videos of images if encrypted using databases like MySQL and MS SQL Server and Oracle, the chances of getting the information leaked gets highly less because even if the database file gets stolen or leaked or hacked the encyotion keys or methods will not let it get open.

The encryption methods used should be designed and kept on a different server or a stand alone pc may be where the web system is being designed.

For Example in MySQL we can use LONGBLOB field type for that particular Table created in the MySQL Database.

For Example,
Table Creation SQL Script:-

CREATE TABLE media (GAME_ID INTEGER NOT NULL PRIMARY KEY, name VARCHAR (20), VIDEO LONGBLOB );

SQL Statement For Insert Video In MySQL Table named as media:-

INSERT INTO media values ('File_Name',LOAD_FILE("C:\\Users\\Public\\Videos\\Sample Video\\ao.mp4"));

insert into media(GAME_ID,name,VIDEO) values (1,'testVideoUploadInDB', load_file('C:\Users\Mohsin\Videos\Any Video Converter\Youtube\testvideo.mp4'))

insert into media(GAME_ID,name,VIDEO) values (2,'testVideoUploadInDB', load_file('C:\Users\Mohsin\Desktop\testvideofile.mp4'))

PHP Code:-

$sql = "insert into media(GAME_ID,name,VIDEO) values (1,\'testVideoUploadInDB\', load_file(\'C:\\Users\\Mohsin\\Videos\\Any Video Converter\\Youtube\\testvideo.mp4\'))\n" . "";

For Fetching Video From Database:-

$query1=mysql_query("SELECT * FROM media where GAME_ID=2"); while($qry1=mysql_fetch_array($query1)) { $vid=$qry1['VIDEO'];

echo $query1;

For Detalis on storing Images and Videos in Microsoft SQL Server Database kindly click on the following link:-

https://docs.microsoft.com/en-us/sql/relational-databases/blob/binary-large-object-blob-data-sql-server

Table Encryption is yet to study by me if the option is available in the databases but putting encryption of such type needs a internet connection with a very high speed, I mean atleast 30 MBps will be needed to use or to fetch data from database quickly from the database using such security techniques which includes database passwords.


Fiber Optic Cable Connection And / Or Lifi Hotspot:
Mostly Recommended:

As per the technology market for the Internet (Wireless and Ethernet) Communication Device's with Normal Copper Wire Dial-up, DSL / ADSL and Wifi Capabilities, I would be recommending if the Internet speed / bandwidth varies from 64 KBps (Kilobytes Per Second) to 300 MBps (Megabytes Per Second), using Modem's which do not transmit data using Light signal's or packet's over a copper communication cable (DSL/ADSL) or Wireless (Wifi) or Mobile network's like 1G/2G/3G.

The router's used with network's with Copper (Dial-Up/DSL/ADSL) / Mobile (HSPA/1G/2G/3G/4G/5G) / Wifi Hotspot capabilities should have the following option's or functionalities,
1. WAN Port's for Connecting to a separate Modem (Dialup / DSL / ADSL) / CPE (WiMax Internet connection), for using the Internet on all the device's connected to the router. 2. LAN Port's for Connecting Personal Computer's to the Internal Network. LAN Port should also be used for connecting to an external server with Internet sharing and other network capabilities another company server with other local user's for may be authentication or logging into the network. 3. Mobile Carrier SIM Card Slot for Connecting to Internet if not using WAN ethernet port for connecting to the Internet or keepingthe SIM Card installed as back up if Internet is not functional using the WAN Ethernet port connected to a Modem. 4. WIFI Hotspot capability to connect a mobile or any type of wireless device like using Wifi Adaptor for a Desktop / Laptop PC or Tablet / Phablet, to the WIFI Hotspot network.

For more detail's on Wifi Networks kindly click on the following link Wifi Hotspot's

Highly Recommended:

As per the technology market for the Internet (Wireless and Ethernet) Communication Device's with Fiber and Lifi Capabilities, I would be recommending if the Internet speed / bandwidth varies from 100 MBps (Megabytes Per Second) to 1+ GBps (Gigabytes Per Second), using Modem's which transmit's data using Light signal's with packet's over a fiber communication cable or wireless (Lifi) or Mobile Network's (4G/5G).

The Difference between a Fiber and a copper wire connection is that Fiber transmits data using Light so ultimately the data travel's inside the communication cable with the speed of Light, and copper wire transmit data using the small amount of electricity, so electricity doesn't travels as fast as Light speed.

The router's used with network's with Fiber (Modem connected directly to the exchange using the Fiber Optic Cable) / Mobile (4G/5G+) / Lifi Hotspot capabilities should have the following option's or functionalities,

1. WAN Port's for Connecting to a separate Modem (Fiber Optic Modem) / CPE (WiMax Internet connection), for using the Internet on all the device's connected to the router. 2. LAN Port's for for Connecting Personal Computer's to the Internal Network. LAN Port should also be used for connecting to an external server with Internet sharing and other network capabilities another company server with other local user's for may be authentication or logging into the network. 3. Mobile Carrier SIM Card Slot for Connecting to Internet if not using WAN ethernet port for connecting to the Internet or keepingthe SIM Card installed as back up if Internet is not functional using the WAN Ethernet port connected to a Modem. 4. LIFI Hotspot capability to connect a mobile or any type of wireless device like using Lifi Adaptor for a Desktop / Laptop PC or Tablet / Phablet, to the LIFI Hotspot network.

For more detail's on Lifi Networks kindly click on the following link Lifi Hotspot's

Some web link's on WiMax Technology For Reference

WiMax Overview, Sanida Omerovic, Faculty of Electrical Engineering, University of Ljubljana, Slovenia

Tutorials Point

WiMAX: Technology for Broadband Wireless Access

Introduction to WiMAX Dr. Piraporn Limpaphayom

WiMAX, The First 4G Technology

WiMAX TECHNOLOGY

Security Measures Example: WIMAX Modem Without Wifi Hotspot For Internet Connectivity Devices:

First of all, check that what is the gateway address for your modem, in my case I have a Qubee WIMAX Internet Modem, so and the company uses default gateway address like 192.168.x.1 (x might range from 1 to 255). This gateway tends to be the interface for the device to control and set its features and use it in accordance with the ISP's settings given by the Internet Service Provider.

First of all login using the default password for the Modem, which is 12345, otherwise it is given on the device itself or on its instruction or user manual. And change it to your liking because when you use websites over the internet your IP (Internet Protocol) Address is being shared with that website hosting server which can be seen by the website owner through cPanel and other options, so kindly change the password for your device. Secondly, what you can do is activate or enable the built-in firewall for your device for extra protection apart from your windows firewall.

Thirdly, you can enable MAC(Machine Address) Address filtering, which are given on the device and its manual. Enabling this option will not let anyone else connect to your device apart from the MAC addresses given in the MAC Filtering List for that particular device.

Fourthly, you can change the password to your liking for your user id provided by your ISP, for connecting the device to the Internet Server. This you can do by logging on the ISP's web portal by going to their customer care support page and checking your details of connection and status of your connection and package you are using. I mean the password is generated by the administrator and given to you by the local customer care officer of that particular shop or office, so it might know your details and can use the your details on any other device by providing your credentials i.e. user id and password using the same device settings provided by the ISP.

Fifthly you can keep your device in a locked container like tv trolleys and tables or computer devices switches so that in your absence anyone can access it through the LAN port or Ethernet Port Physically, for hacking something or doing some wrong doing like using somebody's debit card for shopping from the internet.

For MBB Hotspots

ZONG 4G Mobile Broadband (Mobile Hotspot - Huawei)

First of all, check that what is the gateway address for your modem, in my case I have a Huawei For ZONG 4G MBB Internet Modem Hotspot, so and the company uses default gateway address like 192.168.8.1 (it might range from 1 to 255 which can be altered by user liking). This gateway tends to be the interface for the device to control and set its features and use it in accordance with the ISP's settings given by the Internet Service Provider.

First of all login using the default user id and password for the Modem, which is admin, otherwise it is given on the device itself or on its instruction or user manual. And change it to your liking because when you use websites over the internet your IP (Internet Protocol) Address is being shared with that website hosting server which can be seen by the website owner through cPanel and other options, so kindly change the password for your device.

Secondly, what you can do is activate or enable the built-in firewall for your device for extra protection apart from your windows firewall.

Thirdly, you can enable MAC(Machine Address) Address filtering, which are given on the device and its manual. Enabling this option will not let anyone else connect to your device apart from the MAC addresses given in the MAC Filtering List for that particular device.

Fourthly, you can change the password to your liking for your user id provided by your ISP, for connecting the device to the Internet Server. This you can do by logging on the ISP's web portal by going to their customer care support page and checking your details of connection and status of your connection and package you are using. I mean the password is generated by the administrator and given to you by the local customer care officer of that particular shop or office, so it might know your details and can use the your details on any other device by providing your credentials i.e. user id and password using the same device settings provided by the ISP.

Fifthly you can keep your device in a locked container like tv trolleys and tables or computer devices switches so that in your absence anyone can access it through the LAN port or Ethernet Port Physically, for hacking something or doing some wrong doing like using somebody's debit card for shopping from the internet.

Media News ! Communication 2.6 ! Security Tips & News ! For Further Enhancing Security Measures,

Apart From These measures end-users can use customized Firewalls and Antivirus like Windows Defender in Microsoft Windows 10, Mcaffe and Norton Security, Avast, etc. You can buy these softwares through us, we provide all legal copies registered and bought by our company Debit Card. or you can use their free trial or free versions by going at the following URL Filehippo

Or contact us directly through the following URL, AL-Kahaf Technologies Inc.

Some Information on Component's of A Personal 5G Network For Home Based Internet End User's, is as follows,

5G internet Connection Having a Wifi/Lifi Hotspot with WAN / LAN Ports to connect to 5G Router's of speed from 300 Megabits Per Second.

A 10 Gbps Ethernet cables to connect from 5G Modem through Ethernet Port to 5G Routers with Wifi/Lifi & Ethernet Port's Hotspot.

As the cable's has to be 5G LAN Network, so ultimately the Wifi / Lifi Adaptor's and Ethernet Adaptor installed on PC's and other computing devices has to be upgraded to achieve high speed network. The computing device's like Tablets (iPad's, Tab's)/ Phablet's, PC's, Smart Phone's, Smart TV's, IPTV Box's, Set Top Box's, Smart Music Stereo's, Smart Fridge's / freezer's, Smart Air Conditioner's, Smart Door Locking System, Smart Vehicle's, etc. should have a adaptor installed whose speed of data transfer is minimum 300 Megabits Per Second.

Similarly, the Ethernet cables, Routers With Wifi / Lifi Hotspot support, LAN Switches and modem should also have a speed of data transfer rate of minimum 300 Megabits Per Second.

In this way you can create a LAN in a home connected to a 5G internet connection through a high speed modem or CPE.

The Modem and or CPE should be connected to a ISP server which provides Fiber Optic Cable 5G and or LTE internet connection to its customers which are also known as End Users. To this high speed modem / CPE all the device's in a home based personal high speed 5G network to which all types of devices are connected to and this modem serves all the devices as a DNS Server for displaying internet web pages and applications using databases over the internet.

About Me:
I'm Muhammad Mohsin Naeem, I am a citizen of Pakistan, My NIC / Citizenship Number is 42101-1601312-9, Full Name: 'Muhammad Mohsin Naeem', Father Name: 'Naeem Ahmed', I have studied BSc.(HONS) In Computing And Information System's, From College of Digital Science's, Karachi Campus, affiliated with NCC (National Computing Center) Education Service's UK And London Metropolitan University, UK. I am working as a DIRECTOR ! CEO ! Freelance Software Engineer at AL-Kahaf Technologies Inc., located in Karachi, Pakistan. Currently I am working on the company website, https://alkahaftechnologies.com. The programming languages I have used while designing and developing the company website are PHP, HTML 5 (Responsive, using Templates), scripting languages mostly is Java script, I also know VB script. The database used for the website is MySQL. The domain of AL-Kahaf Technologies Inc. website is also registered by me using my social networking contacts through the internet. The domain is resided on one of Verisign Web Server, I am using their cPanel to create companies Emails Accounts, ftp accounts, database and its associated users.

I also have experience in developing LAN Systems using ASP .Net and C# .Net at front-end and MS SQL Server at back-end for Sidat Hyder Morshed Associates Pvt. Ltd. The System I developed was named as Accounts Receivable for Port Qasim Authority in Pakistan.

I have knowledge and 3+ years experience in hardware /software installation and troubleshooting including windows and other software�s like antivirus, service packs, MS Office, MS Outlook, Lotus Notes, Macromedia Dreamweaver for PHP scripts, Microsoft Paint, etc. i.e. carried out various Desktop Support procedures during various jobs.

I have more than 4 years professional programming experience along with solid Hardware/software installation and troubleshooting knowledge and experience. I have 2 years experience of working as a System Analyst/Programmer. I have developed various customised software�s using Visual Basic 6.0, C# .Net and have experience in database management.

I have 3 years of solid experience in customer service department, working for JCI. I use to work as a warranty coordinator in JCI Dubai � ME, www.johnsoncontrols.com.

I have more than 3 years of experience in data entry.

The complete information regarding payments you will find on the "Payment Accounts" page.
• Islamic Republic of Pakistan Account Details
Account Title: 'MUHAMMAD MOHSIN NAEEM'
Bank Name: Bank Islami Pakistan
Account # 108300028010201
Account Type: PLS SAVINGS
Branch: 1083-N.NAZIMABAD BLOCK D KARACHI
Currency: PKR (Pakistani Rupees)
IBAN Number: PK60BKIP0108300028010201

• United States of America Account Details
Account Title: 'MUHAMMAD MOHSIN NAEEM'
Bank Name: First Century Bank
Account # 4016898828605
Account Type: CHECKING
Beneficiary Name: 'Muhammad Mohsin Naeem'
Currency: US Dollar's
Please Note! Only ACH (US local bank) transfers in USD can be accepted,
Transfers must be made from a company account,
Transfers from individuals will be automatically rejected,
Wire transfers are not supported,
Kindly contact www.payoneer.com for more details on my Account in the USA.

• Telenor Pakistan Easy Paisa Mobile Account Details
NIC (Citizenship) # '42101-1601312-9'
Name: 'MUHAMMAD MOHSIN NAEEM'
Mobile Account Number : 03428184057
Check EasyPaisa Account Details

• JazzCash Mobile Account Details
NIC (Citizenship) # '42101-1601312-9' Name: 'MUHAMMAD MOHSIN NAEEM'
Mobile Account Number : 03049266409
Check JazzCash Account Details

• PayMax Mobile Account Details
NIC (Citizenship) # '42101-1601312-9'
Name: 'MUHAMMAD MOHSIN NAEEM'
Mobile Account Number : 03162998439
Check PayMax Account Details

• Block Chain Bitcoin Account Details
Bitcoin Account Holder Name: 'MUHAMMAD MOHSIN NAEEM'
Block Chain Bitcoin Account Wallet ID: 1b53b2aa-b2e5-42d4-ac7d-852a58874e09
Bitcoin Currency United States of America Dollars US$

• Coinbase Bitcoin Account Details
Bitcoin Account Holder Name: 'MUHAMMAD MOHSIN NAEEM'
Coinbase Bitcoin Account Wallet ID: 1H2pZBLMvQ1kwJR2nRia6WAx8mT3rJSEsF
Bitcoin Currency Pakistani Rupee PKR

• Keenu.pk Account Details
NIC (Citizenship) # '42101-1601312-9'
Name: 'MUHAMMAD MOHSIN NAEEM'
Mobile Account Number : 03049266409
KEENU Website Weblink: www.keenu.pk

Best Regards,
Muhammad Mohsin Naeem
My Online Web Domain: https://alkahaftechnologies.com

My Contact Numbers:
+923428184057
+923401242369
+923049266409
+923162998439
+923400398249

MY PERSONAL EMAILS
m.mohsin.n.80@gmail.com
mohsin.naeem@yahoo.co.uk
mohsin.naeem@hotmail.com
m.mohsin.n@outlook.com
mozain007@yahoo.com
mmn@eclipso.eu
aktech757@outlook.com
Jibrael.Gabriel@outlook.com
lord.liono@outlook.com
mohsin-naeem@outlook.com
Sentinel.Cybertron@outlook.com
voltron.defender@outlook.com
alkahaftechnologies@gmail.com
m.mohsin.n.80@outlook.com

MY FREELANCE DOMAIN COMPANY EMAILS
info@alkahaftechnologies.com
humanresource@alkahaftechnologies.com
domainsupport@alkahaftechnologies.com
orders@alkahaftechnologies.com
mmohsinn@alkahaftechnologies.com
mohsin.naeem@alkahaftechnologies.com

WEB URL's FOR MY DOCUMENT'S
My Document's Softcopie's
Customized Softwares Setup's Developed By Me