Skip to main content

Astrological Combinations In Horoscope for Marrying A Rich Spouse

In the age of social media and Instagram, people are becoming more and more influenced by the lifestyles they see on social media. This gives a rise to aspirations to attain wealth and live a very comfortable if not a luxurious life. Not everyone is blessed with a good amount of wealth, born in an affluent family or have a high income. It is good to work hard towards your goals and achieve success over time but even though most people want to become wealthy, they just don't get it. We all have seen a prince marrying an ordinary woman in fairy tales.  In Korean drama, it is very common to see an extremely rich man marrying an ordinary woman or vice versa. Marrying a rich man/woman can be a shortcut for someone to escape poverty and attain the desired level of wealth and financial freedom. During my consultations, several people come up to me with these questions and through this article I want to guide you to find the best approach for your life based on your planetary placemen


Subscribe To Our Newsletter

Get Free Monthly Predictions & Special Discount Offers On Consultation.



/ ( mm / dd )





SQL Injection & Web Methodologies Development & Evolution


     This article is about how different groups of scientists and researchers discovered methods and techniques to analyze web and prevent web from the sql injection attacks. Different tools and tactics used by them are also mentioned in this article.


·         Salas et.al. use WSInject as a tool to analyse web services. A general purpose fault injection tool that unlike other security testing tools can make various scenarios of different types of attacks. Thus they were able to compare it with results of a vulnerability scanner soapUI. They also concluded that soapUI was less efficient as compared to WSInject. XSS attack was performed with WSInject tool and then they created different attack scenarios and emulated attacks with this tool. The analysis was documented and verified using WSInject technology. A number of vulnerabilities were reduced by the security and made it possible to build a number of variations to new type of XSS attacks.

·         Fabien et. al. presented a methodology in which by generating test inputs using a combination of model inference and evolutionary fuzzing one can detect web injection vulnerabilities. Knowledge of application behaviour is obtained by Model Inference. Inputs are generated using GA i.e. Genetic Algorithm, uses the formal model to automatically generate inputs with better fitness values towards triggering an instance of the given vulnerability. An automated XSS search technique was proposed which is based on model inference and evolutionary fuzzing to generate test cases.

·         Yu sun et.al. for defence against cross site scripting attacks proposed a model checking method. Bugs present in the e-commerce website were found and counter examples were shown by model checking. Proposed an automatic modelling algorithm for the HTML code and presented the case of performance of the algorithm.

·         Indrani Balasundaram et.al. presented an authentication scheme using hybrid encryption. Hybrid because the algorithm uses both Advance Encryption Standard (AES) and Rivest-Shamir-Adleman(RSA) to prevent SQL injection attacks. Two level of encryption is applied on login query in this method. A unique secret key is issued to every user and server uses combination of private key and public key for Rivest-Shamir-Adleman  (RSA) encryption. Asymmetric key encryption via server’s public key is used to encrypt the query. Symmetric key encryption via user’s secret key is used to encrypt user name and password.


·         Allen Pomeroy et.al. used network recording to reconstruct SQL Injection attack effectively. In order to find vulnerabilities in web applications the authors suggested this technique of network recording. To analyse the network packets containing get and post requests of a web application network forensic techniques and tools were used. This approach to trigger network recording of suspected application attack uses network based Intrusion Detection System (IDS).

·         Bisht et. al. to prevent SQL injection proposed a dynamic candidate evaluation approach. Candidate evaluation for Discovering Intent Dynamically(CANDID), a tool proposed by authors is used to record the programmer-intended SQL query structure on any input(candidate input) from the legitimate user. It is then compared with the query structure generated with the attackers input.

·         Michelle Ruse et.al. proposed an approach to detect SQL Injection Vulnerabilities by using automatic test case generation. This framework is built upon the idea of creating a model that deals with SQL queries automatically and captures dependencies among various components of the query. It identifies the conditions in which the queries are vulnerable and uses CREST(Automatic Test Generation Tool for C) test generator. The results show that this method is able to identify the causal set and obtain 85% and 69% reduction respectively while experimenting on few test cases.

·         Xin Wang et.al. based upon access authorization data table (AADT) proposed a hidden web crawling technology. By recording authorization information through cookies, session etc. the web crawlers can be used to gain pages behind login forms. To enhance the ability of web scanner and to raise the web page coverage of crawler model study of web vulnerability detection mechanisms is done. Each and every hidden hyperlink and form present in pages is crawled by crawlers to improve overall web page detection ability of web scanner.


·         Ezumalai et.al. proposed a signature based SQL injection detection technique. SQL queries in web applications is divided smaller units called tokens which is sent for validation. Hirschberg's algorithm which is a divide and conquer version of the Needleman-Wunsch algorithm, is used to detect SQL injection attacks to validate these tokens. No runtime changes are required as it is defined at application level.


·         Avancini et.al. proposed a method of scanning web applications for testing their security. They detected application’s cross-site scripting vulnerabilities by exploiting static analysis. Through a genetic algorithm they looked at input values which uncover these vulnerabilities. To help the genetic algorithm escape local optima, symbolic constraints are gathered at run-time and go to a solver. Software developer’s index search results test cases to comprehend and settle security issues. This approach was implemented in a model and evaluated on world PHP code. They changed conditions identified by static analysis into structural constraints in this paper.


·         Rattipong et. al. presented a methodology for protecting cookies from Cross Site Script attack. This method changes cookies in such a way that they become useless for XSS attacks. Dynamic Cookie Rewriting, is a technique implemented in a web intermediary where cookies are automatically removed with randomized value before sending the cookie to the system browser. Through this way, instead of keeping the unique value sent by the web browser, the system browser will keep the randomized value. This procedure is only tested on HTTP connections.


·         Adam et.al. created an automatic system which exposes SQLI and XSS vulnerabilities through generating input test cases. In this technique, test inputs are created and changed to deliver concrete exploits and track corrupts through execution. The technique addresses second order XSS attack, it makes genuine attack vectors, works without requiring modification of application code, and handles dynamic programming constructs. This technique was executed for PHP by tool named, Ardilla, which can make input for one PHP script at once but it cannot simulate sessions ( i.e. applications which involve multiple pages user-interaction), even if the input generator makes an input that achieves sink, Ardilla cannot produce attacks for sink.



·         Mike et.al. proposed an XSS defence methodology, in spite of behaviour anomalous browser it was intended to be effective in existing browser systems. The proposed approach minimizes trust placed on system browser for interpreting untrusted content. BLUEPRINGT is a tool used to implement this approach and it was integrated with a few popular web applications. It was a strong way to prevent cross-site scripting attacks which was effective upon 96% of the system browser.


·         Wassermann et. al. presented a static analysis which specifically addresses weak or missing input validation for discovering cross-site scripting vulnerabilities. This approach combines data obtained through corrupted information flow with string analysis. Due to the numerous ways to invoke the Java interpreter input validation is troublesome. This approach confront a similar obstacle to statistically check for vulnerabilities. This is addressed by formalizing a policy based upon W3C suggestion, the Firefox source code, and online activities about closed source web browsers. An approach to find XSS vulnerabilities due to unchecked untrusted information and  insufficiently-checked entrusted data is proposed in this paper. The approach has two parts - an adjusted string analysis to track entrusted substring values and a check for endowed scripts in view of formal language methods.

·         Shanmugam, et. al. proposed an approach to detect behaviour based anomaly which presents a security layer on top of the websites, due to which whenever new threats appears the mechanisms are changed but the current websites stay unmodified. Also, to reduce processing time application parameters are acquainted, this approach gives security to websites by permitting tags to be entered in the websites. To decrease processing time it uses whitelist security model due to which it is not prone to zero-day attacks.









Subscribe To Our Newsletter

Get Offers Of Up To 50% Off On Consultation.


/ ( mm / dd )








Trending

Understanding Nirayana Bhava Chalit Chart & Its Importance in Prediction Making

On observing this sky from the Earth, we see billions of stars. A group of stars when forms a recognizable pattern, we call it a constellation. There could be uncountable number of constellations in the skies depending upon from where we see it. We see them from the Earth and the astronomers have discovered 88 constellations till now. In astrology, we only use 27 constellations and they form the entire zodiac belt. There are 12 zodiac sign in this zodiac belt and each zodiac sign has a width of 30 degrees. Each zodiac sign is owned by a certain planet and a planet can be present either in its own zodiac sign or in some other zodiac sign. The zodiac sign which a planet occupies depends upon the point of reference, the Earth. Earth is moving around the Sun along with other planets, therefore, the speeds of movement of other planets appear to be changing all the time. This happens due to the relative motion of Earth and the other planet. If we change our point of reference from Ea

Astrology Basics: Concept of Houses, Sub Lord & Cuspal Sub Lord

The ABC, Astrology Basic Concepts, continues. In previous article, you learned what planets, zodiac signs & constellations are . Now, it is time when you come down from skies and understand some of the basic concepts used in astrology to analyze an astrological chart. Zodiac signs are important and they do have their own set of characteristics as mentioned in the previous article but what actually plays a major role in deciding the fate of a person is the houses a planet signifies. Similarly, the constellation in which a planet is present is capable of changing the nature of events. The planet may not give its own result but starts giving results of the constellation if the constellation lord strongly opposes what the planet is signifying but the Sub Lord holds the final say.

Rashi Chart or Bhava Chalit Chart for Prediction

In Predictive Hindu Astrology , there is a major role of Bhava Chalit chart. While Rashi chart remains same for almost 2 days, Bhava Chalit chart is changing every minute . It calculates in which cusp a planet and a zodiac sign is actually present. The placement of planets in Rashi Chart & in the Ascendant Chart (Main Birth Chart) is same, it is just that the Ascendant chart is rotated till the Moon comes in the first house and we call it Rashi Chart. I personally recommend that you avoid seeing Rashi Chart as the Ascendant Chart gives the most accurate results. Moon is very important and we do take Moon's placement into account by following the time period system that is just based upon Moon & stars. Now, we have to take the placement of other planets into account. The Ascendant chart indicates which planet was transiting in your 10th house (right above your head) or 7th house (western horizon) or any other house at the time when you were born. The zodiac sign in the

Marriage: Time of Marriage, Married Life and Nature of Future Life Partner

Marriage happens when two people of opposite gender agree to live with each other with the consent of society. Telling this statement is necessary in order for you to understand how to see if marriage is promised by a planet and then to figure out the time of marriage. Marriage is not when two people agree to get into a live-in relationship or mate when they are deeply in love with each other. Mostly when astrologers who fail to predict your marriage timings may tell you this statement that, “You might have been in a live-in relationship with someone or marriage also counts when you have had sex”. This is not true.

Combinations In The Horoscope That Make A Person Rich (Millionaire OR Billionaire)

This methodology of knowing if a person is meant to become rich is not a theory, it is actually practiced and applied on horoscopes to predict about a person's life and to figure out if a person is meant to become really successful and will become rich in his life. In a horoscope, there are 12 houses and 9 planets (excluding Uranus, Neptune and Pluto). Most astrologers see 1st, 2nd, 5th, 6th, 9th, 10th and 11th house, and their lords to see if a person has the capability to become rich and successful. Some also take the benefic aspects from Jupiter, Venus, Mercury and Moon into account.The actual answer does not come through this way. To accurately know if a person is meant to become rich and successful you need to see these three things: The Person's Intelligence Benevolence of The Planets Support from The Time When these three things combine then a person actually becomes successful. I am sure that you find this very logical.

Child Birth: Timing, Suitable Time To Conceive, Twins Birth and Custody of Child via Predictive Astrology

Childbirth is the most important event in anyone's life. It is the flow of life from one generation to the next. Predicting childbirth requires the birth horoscope of both mother and the father and not just of any one of them. So, if you are trying to predict the time of childbirth just by looking at your own horoscope, then it will not work. But you can see when is the best time for you to have children through childbirth astrology. We can predict the time when the child will be conceived & not the time when the child will actually take birth. I have tried those methods of finding out the time of birth and they did not work. Sometimes, there is a difference of months between the calculated time and when the childbirth actually happened. So, instead of finding out the time of birth it would be better that you pay extra attention to the lady expecting a baby. Once conceived, we can find out the things like: Childbirth via normal delivery or cesarean Birth to

7 Questions About Your Career Answered

Career astrology is about predicting what would be the status of a person in the world. It indicates how much a person can rise in his life irrespective of how much that person is educated. We always see examples where a person who is not much qualified makes millions. Those are the people having a horoscope which does not support education but making money. Due to which these people become smart enough to make huge sums of money without having a very strong educational background. Career astrology is different from predicting & timing events of life. Either an event will happen in life or not but that’s not the case with the career. If planets support the person will attain heights, if they don’t then the person will live an average life and if they are against then a person leads a miserable life. While doing career astrology it’s important to know what is the role of each & every house and relative importance of every house regarding career.

Predict Change or Loss of Job via Career Astrology

People usually change job because they are not comfortable with their current situation. The problem can be regarding working conditions, behavior of the colleagues or necessity of a higher income. Desire for a promotion, stability and more respect is the main cause that pushes people to find a new job. But in this competitive world, it is not always possible to get that desired job. It requires a lot of hard work, experience, and some good luck to get what you want. Career Astrology can help in determining when change of job is possible. In spite of the fact that hard work is the key, we do require planetary support to make it happen. In order to make the Change of Job happen, these three things are required: Desire for growth in Career Current Job is Temporary / Paying Low Planets supporting Change of Job. Now, first two things depend on you. If you do not want it, planets cannot do anything. If you want it, then you require planetary support for it to ha

Travel Abroad - Timing and Reason Behind Going To Abroad via Predictive Astrology

People travel abroad to explore new places, get new experiences & know about people who belong to different cultural backgrounds. This widens their understanding about the people, how they think & see life and how they live their life. To some people travelling gives them peace of mind and to some it is a source of new thoughts & ideas which can be used later to do some creativity. People also travel abroad due to business reasons, getting a job or get education from a reputed college or university. While it’s not much difficult to know the reason behind the travel but we should know whether the travel will happen or not. Suppose you want to go to study abroad but the stars are not in your support to travel abroad while they support that you will get education from a reputed college, then you will study in your own country. Simple, Right? Well in this article we are going to discuss how to see travelling abroad in birth chart, also I will help you in know what cou

Astrological Combinations for Success in Civil Services Exam (IAS, IPS, IRS, IFS, etc.)

A civil servant is a person employed in the public sector for a government department or agency. Every year, hundreds of thousands of aspirants prepare for the civil services exam and compete for a few thousands of vacancies. Many of them are into administrative work and they are very much responsible for the welfare of the people & the county. They exhibit qualities like honesty, accountability, responsibility, impartiality & dedication. This is the fact due to which the civil servants are among the most respected people in the society.