Skip to main content

Astrological Combinations In Horoscope for Marrying A Rich Spouse

In the age of social media and Instagram, people are becoming more and more influenced by the lifestyles they see on social media. This gives a rise to aspirations to attain wealth and live a very comfortable if not a luxurious life. Not everyone is blessed with a good amount of wealth, born in an affluent family or have a high income. It is good to work hard towards your goals and achieve success over time but even though most people want to become wealthy, they just don't get it. We all have seen a prince marrying an ordinary woman in fairy tales.  In Korean drama, it is very common to see an extremely rich man marrying an ordinary woman or vice versa. Marrying a rich man/woman can be a shortcut for someone to escape poverty and attain the desired level of wealth and financial freedom. During my consultations, several people come up to me with these questions and through this article I want to guide you to find the best approach for your life based on your planetary placemen

Subscribe To Our Newsletter

Get Free Monthly Predictions & Special Discount Offers On Consultation.

/ ( mm / dd )

SQL Injection & Web Methodologies Development & Evolution

     This article is about how different groups of scientists and researchers discovered methods and techniques to analyze web and prevent web from the sql injection attacks. Different tools and tactics used by them are also mentioned in this article.

·         Salas use WSInject as a tool to analyse web services. A general purpose fault injection tool that unlike other security testing tools can make various scenarios of different types of attacks. Thus they were able to compare it with results of a vulnerability scanner soapUI. They also concluded that soapUI was less efficient as compared to WSInject. XSS attack was performed with WSInject tool and then they created different attack scenarios and emulated attacks with this tool. The analysis was documented and verified using WSInject technology. A number of vulnerabilities were reduced by the security and made it possible to build a number of variations to new type of XSS attacks.

·         Fabien et. al. presented a methodology in which by generating test inputs using a combination of model inference and evolutionary fuzzing one can detect web injection vulnerabilities. Knowledge of application behaviour is obtained by Model Inference. Inputs are generated using GA i.e. Genetic Algorithm, uses the formal model to automatically generate inputs with better fitness values towards triggering an instance of the given vulnerability. An automated XSS search technique was proposed which is based on model inference and evolutionary fuzzing to generate test cases.

·         Yu sun for defence against cross site scripting attacks proposed a model checking method. Bugs present in the e-commerce website were found and counter examples were shown by model checking. Proposed an automatic modelling algorithm for the HTML code and presented the case of performance of the algorithm.

·         Indrani Balasundaram presented an authentication scheme using hybrid encryption. Hybrid because the algorithm uses both Advance Encryption Standard (AES) and Rivest-Shamir-Adleman(RSA) to prevent SQL injection attacks. Two level of encryption is applied on login query in this method. A unique secret key is issued to every user and server uses combination of private key and public key for Rivest-Shamir-Adleman  (RSA) encryption. Asymmetric key encryption via server’s public key is used to encrypt the query. Symmetric key encryption via user’s secret key is used to encrypt user name and password.

·         Allen Pomeroy used network recording to reconstruct SQL Injection attack effectively. In order to find vulnerabilities in web applications the authors suggested this technique of network recording. To analyse the network packets containing get and post requests of a web application network forensic techniques and tools were used. This approach to trigger network recording of suspected application attack uses network based Intrusion Detection System (IDS).

·         Bisht et. al. to prevent SQL injection proposed a dynamic candidate evaluation approach. Candidate evaluation for Discovering Intent Dynamically(CANDID), a tool proposed by authors is used to record the programmer-intended SQL query structure on any input(candidate input) from the legitimate user. It is then compared with the query structure generated with the attackers input.

·         Michelle Ruse proposed an approach to detect SQL Injection Vulnerabilities by using automatic test case generation. This framework is built upon the idea of creating a model that deals with SQL queries automatically and captures dependencies among various components of the query. It identifies the conditions in which the queries are vulnerable and uses CREST(Automatic Test Generation Tool for C) test generator. The results show that this method is able to identify the causal set and obtain 85% and 69% reduction respectively while experimenting on few test cases.

·         Xin Wang based upon access authorization data table (AADT) proposed a hidden web crawling technology. By recording authorization information through cookies, session etc. the web crawlers can be used to gain pages behind login forms. To enhance the ability of web scanner and to raise the web page coverage of crawler model study of web vulnerability detection mechanisms is done. Each and every hidden hyperlink and form present in pages is crawled by crawlers to improve overall web page detection ability of web scanner.

·         Ezumalai proposed a signature based SQL injection detection technique. SQL queries in web applications is divided smaller units called tokens which is sent for validation. Hirschberg's algorithm which is a divide and conquer version of the Needleman-Wunsch algorithm, is used to detect SQL injection attacks to validate these tokens. No runtime changes are required as it is defined at application level.

·         Avancini proposed a method of scanning web applications for testing their security. They detected application’s cross-site scripting vulnerabilities by exploiting static analysis. Through a genetic algorithm they looked at input values which uncover these vulnerabilities. To help the genetic algorithm escape local optima, symbolic constraints are gathered at run-time and go to a solver. Software developer’s index search results test cases to comprehend and settle security issues. This approach was implemented in a model and evaluated on world PHP code. They changed conditions identified by static analysis into structural constraints in this paper.

·         Rattipong et. al. presented a methodology for protecting cookies from Cross Site Script attack. This method changes cookies in such a way that they become useless for XSS attacks. Dynamic Cookie Rewriting, is a technique implemented in a web intermediary where cookies are automatically removed with randomized value before sending the cookie to the system browser. Through this way, instead of keeping the unique value sent by the web browser, the system browser will keep the randomized value. This procedure is only tested on HTTP connections.

·         Adam created an automatic system which exposes SQLI and XSS vulnerabilities through generating input test cases. In this technique, test inputs are created and changed to deliver concrete exploits and track corrupts through execution. The technique addresses second order XSS attack, it makes genuine attack vectors, works without requiring modification of application code, and handles dynamic programming constructs. This technique was executed for PHP by tool named, Ardilla, which can make input for one PHP script at once but it cannot simulate sessions ( i.e. applications which involve multiple pages user-interaction), even if the input generator makes an input that achieves sink, Ardilla cannot produce attacks for sink.

·         Mike proposed an XSS defence methodology, in spite of behaviour anomalous browser it was intended to be effective in existing browser systems. The proposed approach minimizes trust placed on system browser for interpreting untrusted content. BLUEPRINGT is a tool used to implement this approach and it was integrated with a few popular web applications. It was a strong way to prevent cross-site scripting attacks which was effective upon 96% of the system browser.

·         Wassermann et. al. presented a static analysis which specifically addresses weak or missing input validation for discovering cross-site scripting vulnerabilities. This approach combines data obtained through corrupted information flow with string analysis. Due to the numerous ways to invoke the Java interpreter input validation is troublesome. This approach confront a similar obstacle to statistically check for vulnerabilities. This is addressed by formalizing a policy based upon W3C suggestion, the Firefox source code, and online activities about closed source web browsers. An approach to find XSS vulnerabilities due to unchecked untrusted information and  insufficiently-checked entrusted data is proposed in this paper. The approach has two parts - an adjusted string analysis to track entrusted substring values and a check for endowed scripts in view of formal language methods.

·         Shanmugam, et. al. proposed an approach to detect behaviour based anomaly which presents a security layer on top of the websites, due to which whenever new threats appears the mechanisms are changed but the current websites stay unmodified. Also, to reduce processing time application parameters are acquainted, this approach gives security to websites by permitting tags to be entered in the websites. To decrease processing time it uses whitelist security model due to which it is not prone to zero-day attacks.

Subscribe To Our Newsletter

Get Offers Of Up To 50% Off On Consultation.

/ ( mm / dd )


Astrology Basics: Concept of Houses, Sub Lord & Cuspal Sub Lord

The ABC, Astrology Basic Concepts, continues. In previous article, you learned what planets, zodiac signs & constellations are . Now, it is time when you come down from skies and understand some of the basic concepts used in astrology to analyze an astrological chart. Zodiac signs are important and they do have their own set of characteristics as mentioned in the previous article but what actually plays a major role in deciding the fate of a person is the houses a planet signifies. Similarly, the constellation in which a planet is present is capable of changing the nature of events. The planet may not give its own result but starts giving results of the constellation if the constellation lord strongly opposes what the planet is signifying but the Sub Lord holds the final say.

Understanding Nirayana Bhava Chalit Chart & Its Importance in Prediction Making

On observing this sky from the Earth, we see billions of stars. A group of stars when forms a recognizable pattern, we call it a constellation. There could be uncountable number of constellations in the skies depending upon from where we see it. We see them from the Earth and the astronomers have discovered 88 constellations till now. In astrology, we only use 27 constellations and they form the entire zodiac belt. There are 12 zodiac sign in this zodiac belt and each zodiac sign has a width of 30 degrees. Each zodiac sign is owned by a certain planet and a planet can be present either in its own zodiac sign or in some other zodiac sign. The zodiac sign which a planet occupies depends upon the point of reference, the Earth. Earth is moving around the Sun along with other planets, therefore, the speeds of movement of other planets appear to be changing all the time. This happens due to the relative motion of Earth and the other planet. If we change our point of reference from Ea

Combinations In The Horoscope That Make A Person Rich (Millionaire OR Billionaire)

This methodology of knowing if a person is meant to become rich is not a theory, it is actually practiced and applied on horoscopes to predict about a person's life and to figure out if a person is meant to become really successful and will become rich in his life. In a horoscope, there are 12 houses and 9 planets (excluding Uranus, Neptune and Pluto). Most astrologers see 1st, 2nd, 5th, 6th, 9th, 10th and 11th house, and their lords to see if a person has the capability to become rich and successful. Some also take the benefic aspects from Jupiter, Venus, Mercury and Moon into account.The actual answer does not come through this way. To accurately know if a person is meant to become rich and successful you need to see these three things: The Person's Intelligence Benevolence of The Planets Support from The Time When these three things combine then a person actually becomes successful. I am sure that you find this very logical.

Rashi Chart or Bhava Chalit Chart for Prediction

In Predictive Hindu Astrology , there is a major role of Bhava Chalit chart. While Rashi chart remains same for almost 2 days, Bhava Chalit chart is changing every minute . It calculates in which cusp a planet and a zodiac sign is actually present. The placement of planets in Rashi Chart & in the Ascendant Chart (Main Birth Chart) is same, it is just that the Ascendant chart is rotated till the Moon comes in the first house and we call it Rashi Chart. I personally recommend that you avoid seeing Rashi Chart as the Ascendant Chart gives the most accurate results. Moon is very important and we do take Moon's placement into account by following the time period system that is just based upon Moon & stars. Now, we have to take the placement of other planets into account. The Ascendant chart indicates which planet was transiting in your 10th house (right above your head) or 7th house (western horizon) or any other house at the time when you were born. The zodiac sign in the

Child Birth: Timing, Suitable Time To Conceive, Twins Birth and Custody of Child via Predictive Astrology

Childbirth is the most important event in anyone's life. It is the flow of life from one generation to the next. Predicting childbirth requires the birth horoscope of both mother and the father and not just of any one of them. So, if you are trying to predict the time of childbirth just by looking at your own horoscope, then it will not work. But you can see when is the best time for you to have children through childbirth astrology. We can predict the time when the child will be conceived & not the time when the child will actually take birth. I have tried those methods of finding out the time of birth and they did not work. Sometimes, there is a difference of months between the calculated time and when the childbirth actually happened. So, instead of finding out the time of birth it would be better that you pay extra attention to the lady expecting a baby. Once conceived, we can find out the things like: Childbirth via normal delivery or cesarean Birth to

Astrological Combinations for Success in Civil Services Exam (IAS, IPS, IRS, IFS, etc.)

A civil servant is a person employed in the public sector for a government department or agency. Every year, hundreds of thousands of aspirants prepare for the civil services exam and compete for a few thousands of vacancies. Many of them are into administrative work and they are very much responsible for the welfare of the people & the county. They exhibit qualities like honesty, accountability, responsibility, impartiality & dedication. This is the fact due to which the civil servants are among the most respected people in the society.

Marriage: Time of Marriage, Married Life and Nature of Future Life Partner

Marriage happens when two people of opposite gender agree to live with each other with the consent of society. Telling this statement is necessary in order for you to understand how to see if marriage is promised by a planet and then to figure out the time of marriage. Marriage is not when two people agree to get into a live-in relationship or mate when they are deeply in love with each other. Mostly when astrologers who fail to predict your marriage timings may tell you this statement that, “You might have been in a live-in relationship with someone or marriage also counts when you have had sex”. This is not true.

Eleventh House - Why 11th House Is The Most Powerful House In Astrology?

The sky is divided into 12 parts and these parts in an astrological chart are represented by houses. In an astrological chart, there are 12 houses each holding its own significance and controls certain aspects of our life. Planets in a horoscope are bound to give results based on the houses they get associated with through placement and ownership. Not all houses are alike, some are benevolent and some are malevolent in nature. A single house never indicates anything, a combination of houses decides which aspect of life will be effected and whether the effect will be positive or negative. Therefore, planets trigger various good and bad events depending on the set of houses they are associated with. You will find aspects of life, relationships and body parts governed by each house in this article: Astrology Basic Concepts 2 What is the Eleventh House? The 11th house in astrology is called the house of gains(labha sthan). This house fulfills your desires, brings wealth, prospe

3 Most Important Houses For A Happy Marriage

Marriage is a union of two people who are willing to stay together as partners in a personal relationship with the consent of the society. This is how we look at marriage. Nadi astrology also looks at the marriage in the same way and only houses that indicates these things are required to predict marriage. Generally, astrologers look for planets related to the seventh house to predict marriage. The seventh house is the prime house of marriage but the seventh house alone it cannot make the marriage happen. Due to which a possibility of an incorrect prediction arises.

Vehicle Purchase : When a Person will Buy a Vehicle & Class of Vehicle via Predictive Astrology

Vehicle means comfort & luxury. For many people it is a symbol of status & reflects their personality. People buy a vehicle to spend good time with their family & friends while travelling. Vehicle provides comfort while travelling to places where it is difficult to go through public transport. But when a person will buy a vehicle? Can we predict the time or suggest when a person should buy a vehicle? Yes. Such questions can be easily answered via Predictive Astrology when you get a consultation from an astrologer who can accurately predict the time when you will be able to buy a vehicle. Kindly, visit the Consultation page if you want an answer regarding any such query. A Planet Signifies Vehicle Purchase When It Signifies Houses 4, 11 & 12 House 4: Vehicle House 11: Fulfilment of Desire / Gain House 12: Expenditure Meaning: Gain (11) of vehicle (4) when you spend money (12) Dasha (main period), bhukti (sub period) or antra (sub sub period) lor