Skip to main content

3 Signs Of Divorce & Separation From Spouse In Horoscope

Commitment, harmony and love are essential for a happy and successful marriage. When a couple is neither willing to make their relationship work nor they want to live with each other they go for divorce. The reason could be anything, everyday quarrels, not being happy with the relationship, extra marital affair or feeling that the decision of marriage was a mistake.

Your horoscope can tell many things about your married life:
How will be your married life?Any possibility for divorce or separation from spouse?Possible reason(s) for divorce or separation?
This article is focused on analyzing an individual's horoscope for signs of divorce and separation.

If you wish to know how will be your relationship/married life with your partner/spouse then you can refer to Most Accurate Method of Matching Horoscopes. The article will help you understand how horoscopes indicate a happy or troubled married life, and how you can find an ideal partner for yourself.

If you are a consistent reader/fo…

Subscribe To Our Newsletter

Get Free Monthly Predictions & Special Discount Offers On Consultation.

/ ( mm / dd )

Follow On

SQL Injection & Web Methodologies Development & Evolution

     This article is about how different groups of scientists and researchers discovered methods and techniques to analyze web and prevent web from the sql injection attacks. Different tools and tactics used by them are also mentioned in this article.

·         Salas use WSInject as a tool to analyse web services. A general purpose fault injection tool that unlike other security testing tools can make various scenarios of different types of attacks. Thus they were able to compare it with results of a vulnerability scanner soapUI. They also concluded that soapUI was less efficient as compared to WSInject. XSS attack was performed with WSInject tool and then they created different attack scenarios and emulated attacks with this tool. The analysis was documented and verified using WSInject technology. A number of vulnerabilities were reduced by the security and made it possible to build a number of variations to new type of XSS attacks.

·         Fabien et. al. presented a methodology in which by generating test inputs using a combination of model inference and evolutionary fuzzing one can detect web injection vulnerabilities. Knowledge of application behaviour is obtained by Model Inference. Inputs are generated using GA i.e. Genetic Algorithm, uses the formal model to automatically generate inputs with better fitness values towards triggering an instance of the given vulnerability. An automated XSS search technique was proposed which is based on model inference and evolutionary fuzzing to generate test cases.

·         Yu sun for defence against cross site scripting attacks proposed a model checking method. Bugs present in the e-commerce website were found and counter examples were shown by model checking. Proposed an automatic modelling algorithm for the HTML code and presented the case of performance of the algorithm.

·         Indrani Balasundaram presented an authentication scheme using hybrid encryption. Hybrid because the algorithm uses both Advance Encryption Standard (AES) and Rivest-Shamir-Adleman(RSA) to prevent SQL injection attacks. Two level of encryption is applied on login query in this method. A unique secret key is issued to every user and server uses combination of private key and public key for Rivest-Shamir-Adleman  (RSA) encryption. Asymmetric key encryption via server’s public key is used to encrypt the query. Symmetric key encryption via user’s secret key is used to encrypt user name and password.

·         Allen Pomeroy used network recording to reconstruct SQL Injection attack effectively. In order to find vulnerabilities in web applications the authors suggested this technique of network recording. To analyse the network packets containing get and post requests of a web application network forensic techniques and tools were used. This approach to trigger network recording of suspected application attack uses network based Intrusion Detection System (IDS).

·         Bisht et. al. to prevent SQL injection proposed a dynamic candidate evaluation approach. Candidate evaluation for Discovering Intent Dynamically(CANDID), a tool proposed by authors is used to record the programmer-intended SQL query structure on any input(candidate input) from the legitimate user. It is then compared with the query structure generated with the attackers input.

·         Michelle Ruse proposed an approach to detect SQL Injection Vulnerabilities by using automatic test case generation. This framework is built upon the idea of creating a model that deals with SQL queries automatically and captures dependencies among various components of the query. It identifies the conditions in which the queries are vulnerable and uses CREST(Automatic Test Generation Tool for C) test generator. The results show that this method is able to identify the causal set and obtain 85% and 69% reduction respectively while experimenting on few test cases.

·         Xin Wang based upon access authorization data table (AADT) proposed a hidden web crawling technology. By recording authorization information through cookies, session etc. the web crawlers can be used to gain pages behind login forms. To enhance the ability of web scanner and to raise the web page coverage of crawler model study of web vulnerability detection mechanisms is done. Each and every hidden hyperlink and form present in pages is crawled by crawlers to improve overall web page detection ability of web scanner.

·         Ezumalai proposed a signature based SQL injection detection technique. SQL queries in web applications is divided smaller units called tokens which is sent for validation. Hirschberg's algorithm which is a divide and conquer version of the Needleman-Wunsch algorithm, is used to detect SQL injection attacks to validate these tokens. No runtime changes are required as it is defined at application level.

·         Avancini proposed a method of scanning web applications for testing their security. They detected application’s cross-site scripting vulnerabilities by exploiting static analysis. Through a genetic algorithm they looked at input values which uncover these vulnerabilities. To help the genetic algorithm escape local optima, symbolic constraints are gathered at run-time and go to a solver. Software developer’s index search results test cases to comprehend and settle security issues. This approach was implemented in a model and evaluated on world PHP code. They changed conditions identified by static analysis into structural constraints in this paper.

·         Rattipong et. al. presented a methodology for protecting cookies from Cross Site Script attack. This method changes cookies in such a way that they become useless for XSS attacks. Dynamic Cookie Rewriting, is a technique implemented in a web intermediary where cookies are automatically removed with randomized value before sending the cookie to the system browser. Through this way, instead of keeping the unique value sent by the web browser, the system browser will keep the randomized value. This procedure is only tested on HTTP connections.

·         Adam created an automatic system which exposes SQLI and XSS vulnerabilities through generating input test cases. In this technique, test inputs are created and changed to deliver concrete exploits and track corrupts through execution. The technique addresses second order XSS attack, it makes genuine attack vectors, works without requiring modification of application code, and handles dynamic programming constructs. This technique was executed for PHP by tool named, Ardilla, which can make input for one PHP script at once but it cannot simulate sessions ( i.e. applications which involve multiple pages user-interaction), even if the input generator makes an input that achieves sink, Ardilla cannot produce attacks for sink.

·         Mike proposed an XSS defence methodology, in spite of behaviour anomalous browser it was intended to be effective in existing browser systems. The proposed approach minimizes trust placed on system browser for interpreting untrusted content. BLUEPRINGT is a tool used to implement this approach and it was integrated with a few popular web applications. It was a strong way to prevent cross-site scripting attacks which was effective upon 96% of the system browser.

·         Wassermann et. al. presented a static analysis which specifically addresses weak or missing input validation for discovering cross-site scripting vulnerabilities. This approach combines data obtained through corrupted information flow with string analysis. Due to the numerous ways to invoke the Java interpreter input validation is troublesome. This approach confront a similar obstacle to statistically check for vulnerabilities. This is addressed by formalizing a policy based upon W3C suggestion, the Firefox source code, and online activities about closed source web browsers. An approach to find XSS vulnerabilities due to unchecked untrusted information and  insufficiently-checked entrusted data is proposed in this paper. The approach has two parts - an adjusted string analysis to track entrusted substring values and a check for endowed scripts in view of formal language methods.

·         Shanmugam, et. al. proposed an approach to detect behaviour based anomaly which presents a security layer on top of the websites, due to which whenever new threats appears the mechanisms are changed but the current websites stay unmodified. Also, to reduce processing time application parameters are acquainted, this approach gives security to websites by permitting tags to be entered in the websites. To decrease processing time it uses whitelist security model due to which it is not prone to zero-day attacks.


Subscribe To Our Newsletter

Get Offers Of Up To 50% Off On Consultation.

/ ( mm / dd )


What Made Disha Patani Suddenly a Huge Sensation? Predictions about her Stardom & Marriage

Disha Patani is an Indian film actress and model who starred in a Chinese Movie, Kung Fu Yoga. Her first movie was in Telugu and later she starred in M.S. Dhoni - The Untold Story along with Sushant Singh Rajput, an Indian biographical sports film based on the life of former Indian Cricket Team captain Mahendra Singh Dhoni, which was her Bollywood debut movie released in 2016.

Before starring into movies, she gained a lot of popularity when she appeared in the Cadbury Dairy Milk ad.

7 Questions About Your Career Answered

Career astrology is about predicting what would be the status of a person in the world. It indicates how much a person can rise in his life irrespective of how much that person is educated. We always see examples where a person who is not much qualified makes millions.

Those are the people having a horoscope which does not support education but making money. Due to which these people become smart enough to make huge sums of money without having a very strong educational background.

Career astrology is different from predicting & timing events of life. Either an event will happen in life or not but that’s not the case with the career. If planets support the person will attain heights, if they don’t then the person will live an average life and if they are against then a person leads a miserable life.

While doing career astrology it’s important to know what is the role of each & every house and relative importance of every house regarding career.

Astrology Basics: Concept of Houses, Sub Lord & Cuspal Sub Lord

The ABC, Astrology Basic Concepts, continues. In previous article, you learned what planets, zodiac signs & constellations are. Now, it is time when you come down from skies and understand some of the basic concepts used in astrology to analyze an astrological chart.
Zodiac signs are important and they do have their own set of characteristics as mentioned in the previous article but what actually plays a major role in deciding the fate of a person is the houses a planet signifies.
Similarly, the constellation in which a planet is present is capable of changing the nature of events. The planet may not give its own result but starts giving results of the constellation if the constellation lord strongly opposes what the planet is signifying but the Sub Lord holds the final say.

Understanding Nirayana Bhava Chalit Chart & Its Importance in Prediction Making

On observing this sky from the Earth, we see billions of stars. A group of stars when forms a recognizable pattern, we call it a constellation. There could be uncountable number of constellations in the skies depending upon from where we see it. We see them from the Earth and the astronomers have discovered 88 constellations till now.

In astrology, we only use 27 constellations and they form the entire zodiac belt. There are 12 zodiac sign in this zodiac belt and each zodiac sign has a width of 30 degrees. Each zodiac sign is owned by a certain planet and a planet can be present either in its own zodiac sign or in some other zodiac sign.

The zodiac sign which a planet occupies depends upon the point of reference, the Earth. Earth is moving around the Sun along with other planets, therefore, the speeds of movement of other planets appear to be changing all the time. This happens due to the relative motion of Earth and the other planet. If we change our point of reference from Earth …

How Planets Indicate Depression And Suicide In A Horoscope?

Depression has become a common problem for hundreds of millions of people across the world, it negatively impacts how you feel and a person suffering from depression feels low and loses interest in work or performing any activity.

Depression is a serious problem as it not only affects your performance at work and mental health but it is also bad for your relationships and physical health.

Due to the current COVID-19 pandemic, people are forced to stay at home and millions of people have already lost their jobs. Unemployment and financial problems are some of the major contributors to depression.

Depression is like a black hole, once you start falling into it you just keep going and coming back feels really difficult.

Let's say difficult relationships often spoil your mood, this affects your performance at work which then becomes a hurdle to achieve your goals, and this further affects your relationships in the future.

Some people are better in handling their own feelings and emot…

Combinations In The Horoscope That Make A Person Rich (Millionaire OR Billionaire)

This methodology of knowing if a person is meant to become rich is not a theory, it is actually practiced and applied on horoscopes to predict about a person's life and to figure out if a person is meant to become really successful and will become rich in his life.

In a horoscope, there are 12 houses and 9 planets (excluding Uranus, Neptune and Pluto). Most astrologers see 1st, 2nd, 5th, 6th, 9th, 10th and 11th house, and their lords to see if a person has the capability to become rich and successful.

Some also take the benefic aspects from Jupiter, Venus, Mercury and Moon into account.The actual answer does not come through this way.

To accurately know if a person is meant to become rich and successful you need to see these three things:
The Person's IntelligenceBenevolence of The PlanetsSupport from The Time When these three things combine then a person actually becomes successful. I am sure that you find this very logical.

Rashi Chart or Bhava Chalit Chart for Prediction

In Predictive Hindu Astrology, there is a major role of Bhava Chalit chart. While Rashi chart remains same for almost 2 days, Bhava Chalit chart is changing every minute. It calculates in which cusp a planet and a zodiac sign is actually present.

The placement of planets in Rashi Chart & in the Ascendant Chart (Main Birth Chart) is same, it is just that the Ascendant chart is rotated till the Moon comes in the first house and we call it Rashi Chart. I personally recommend that you avoid seeing Rashi Chart as the Ascendant Chart gives the most accurate results.

Moon is very important and we do take Moon's placement into account by following the time period system that is just based upon Moon & stars. Now, we have to take the placement of other planets into account. The Ascendant chart indicates which planet was transiting in your 10th house (right above your head) or 7th house (western horizon) or any other house at the time when you were born.

The zodiac sign in the Asc…