ºÝºÝߣshows by User: sukhsandhu / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: sukhsandhu / Sat, 09 Apr 2016 08:40:24 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: sukhsandhu Qualified Social Media Expert /slideshow/10167491/60686707 c5d39674-f1fb-4092-bf29-852ca22150e2-160409084024
From HootSuite University.]]>

From HootSuite University.]]>
Sat, 09 Apr 2016 08:40:24 GMT /slideshow/10167491/60686707 sukhsandhu@slideshare.net(sukhsandhu) Qualified Social Media Expert sukhsandhu From HootSuite University. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/c5d39674-f1fb-4092-bf29-852ca22150e2-160409084024-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> From HootSuite University.
Qualified Social Media Expert from Sukh Sandhu
]]>
299 5 https://cdn.slidesharecdn.com/ss_thumbnails/c5d39674-f1fb-4092-bf29-852ca22150e2-160409084024-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
An introduction to microsoft office 2007 lecture /slideshow/an-introduction-to-microsoft-office-2007-lecture/15359185 anintroductiontomicrosoftoffice2007-lecture-121126173719-phpapp02
Microsoft Office applications include Outlook, Word, Excel, PowerPoint, and Access. If you are new to this software or are upgrading from a previous version of Microsoft Office study this lecture to learn how to use them. Any questions, send those to me@sukh.co ]]>

Microsoft Office applications include Outlook, Word, Excel, PowerPoint, and Access. If you are new to this software or are upgrading from a previous version of Microsoft Office study this lecture to learn how to use them. Any questions, send those to me@sukh.co ]]>
Mon, 26 Nov 2012 17:37:17 GMT /slideshow/an-introduction-to-microsoft-office-2007-lecture/15359185 sukhsandhu@slideshare.net(sukhsandhu) An introduction to microsoft office 2007 lecture sukhsandhu Microsoft Office applications include Outlook, Word, Excel, PowerPoint, and Access. If you are new to this software or are upgrading from a previous version of Microsoft Office study this lecture to learn how to use them. Any questions, send those to me@sukh.co <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/anintroductiontomicrosoftoffice2007-lecture-121126173719-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Microsoft Office applications include Outlook, Word, Excel, PowerPoint, and Access. If you are new to this software or are upgrading from a previous version of Microsoft Office study this lecture to learn how to use them. Any questions, send those to me@sukh.co
An introduction to microsoft office 2007 lecture from Sukh Sandhu
]]>
32756 68 https://cdn.slidesharecdn.com/ss_thumbnails/anintroductiontomicrosoftoffice2007-lecture-121126173719-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Healthy Foods and Junk Food - Sharing some Information /slideshow/healthy-foods-and-junk-food-sharing-some-information/15030092 healthyfoodsandjunkfood-121105061553-phpapp01
Healthy Foods and Junk Food - Sharing some Information]]>

Healthy Foods and Junk Food - Sharing some Information]]>
Mon, 05 Nov 2012 06:15:52 GMT /slideshow/healthy-foods-and-junk-food-sharing-some-information/15030092 sukhsandhu@slideshare.net(sukhsandhu) Healthy Foods and Junk Food - Sharing some Information sukhsandhu Healthy Foods and Junk Food - Sharing some Information <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/healthyfoodsandjunkfood-121105061553-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Healthy Foods and Junk Food - Sharing some Information
Healthy Foods and Junk Food - Sharing some Information from Sukh Sandhu
]]>
11805 25 https://cdn.slidesharecdn.com/ss_thumbnails/healthyfoodsandjunkfood-121105061553-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
HTML standards /slideshow/notes-html-standards/15025102 notes-htmlstandards-121104210243-phpapp02
A draft standard for professional web page authoring, expressed in the language of ESA PSS-05 software engineering standards.]]>

A draft standard for professional web page authoring, expressed in the language of ESA PSS-05 software engineering standards.]]>
Sun, 04 Nov 2012 21:02:41 GMT /slideshow/notes-html-standards/15025102 sukhsandhu@slideshare.net(sukhsandhu) HTML standards sukhsandhu A draft standard for professional web page authoring, expressed in the language of ESA PSS-05 software engineering standards. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/notes-htmlstandards-121104210243-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A draft standard for professional web page authoring, expressed in the language of ESA PSS-05 software engineering standards.
HTML standards from Sukh Sandhu
]]>
691 3 https://cdn.slidesharecdn.com/ss_thumbnails/notes-htmlstandards-121104210243-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Mark-up languages /sukhsandhu/notes-markup-languages notes-mark-uplanguages-121104210238-phpapp02
A markup language is a modern system for annotating a document in a way that is syntactically distinguishable from the text. The idea and terminology evolved from the "marking up" of manuscripts, i.e., the revision instructions by editors, traditionally written with a blue pencil on authors' manuscripts. Examples are typesetting instructions such as those found in troff, TeX and LaTeX, or structural markers such as XML tags. Markup instructs the software displaying the text to carry out appropriate actions, but is omitted from the version of the text that is displayed to users. Some markup languages, such as HTML, have pre-defined presentation semantics, meaning that their specification prescribes how the structured data are to be presented; others, such as XML, do not. A widely-used markup language is HyperText Markup Language (HTML), one of the document formats of the World Wide Web. HTML, which is an instance of SGML (though, strictly, it does not comply with all the rules of SGML), follows many of the markup conventions used in the publishing industry in the communication of printed work between authors, editors, and printers.]]>

A markup language is a modern system for annotating a document in a way that is syntactically distinguishable from the text. The idea and terminology evolved from the "marking up" of manuscripts, i.e., the revision instructions by editors, traditionally written with a blue pencil on authors' manuscripts. Examples are typesetting instructions such as those found in troff, TeX and LaTeX, or structural markers such as XML tags. Markup instructs the software displaying the text to carry out appropriate actions, but is omitted from the version of the text that is displayed to users. Some markup languages, such as HTML, have pre-defined presentation semantics, meaning that their specification prescribes how the structured data are to be presented; others, such as XML, do not. A widely-used markup language is HyperText Markup Language (HTML), one of the document formats of the World Wide Web. HTML, which is an instance of SGML (though, strictly, it does not comply with all the rules of SGML), follows many of the markup conventions used in the publishing industry in the communication of printed work between authors, editors, and printers.]]>
Sun, 04 Nov 2012 21:02:36 GMT /sukhsandhu/notes-markup-languages sukhsandhu@slideshare.net(sukhsandhu) Mark-up languages sukhsandhu A markup language is a modern system for annotating a document in a way that is syntactically distinguishable from the text. The idea and terminology evolved from the "marking up" of manuscripts, i.e., the revision instructions by editors, traditionally written with a blue pencil on authors' manuscripts. Examples are typesetting instructions such as those found in troff, TeX and LaTeX, or structural markers such as XML tags. Markup instructs the software displaying the text to carry out appropriate actions, but is omitted from the version of the text that is displayed to users. Some markup languages, such as HTML, have pre-defined presentation semantics, meaning that their specification prescribes how the structured data are to be presented; others, such as XML, do not. A widely-used markup language is HyperText Markup Language (HTML), one of the document formats of the World Wide Web. HTML, which is an instance of SGML (though, strictly, it does not comply with all the rules of SGML), follows many of the markup conventions used in the publishing industry in the communication of printed work between authors, editors, and printers. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/notes-mark-uplanguages-121104210238-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A markup language is a modern system for annotating a document in a way that is syntactically distinguishable from the text. The idea and terminology evolved from the &quot;marking up&quot; of manuscripts, i.e., the revision instructions by editors, traditionally written with a blue pencil on authors&#39; manuscripts. Examples are typesetting instructions such as those found in troff, TeX and LaTeX, or structural markers such as XML tags. Markup instructs the software displaying the text to carry out appropriate actions, but is omitted from the version of the text that is displayed to users. Some markup languages, such as HTML, have pre-defined presentation semantics, meaning that their specification prescribes how the structured data are to be presented; others, such as XML, do not. A widely-used markup language is HyperText Markup Language (HTML), one of the document formats of the World Wide Web. HTML, which is an instance of SGML (though, strictly, it does not comply with all the rules of SGML), follows many of the markup conventions used in the publishing industry in the communication of printed work between authors, editors, and printers.
Mark-up languages from Sukh Sandhu
]]>
2179 9 https://cdn.slidesharecdn.com/ss_thumbnails/notes-mark-uplanguages-121104210238-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to build a web page - SES Magazine /slideshow/notes-how-to-build-a-web-page/15025098 notes-howtobuildawebpage-121104210230-phpapp02
How to build a web page - SES Magazine]]>

How to build a web page - SES Magazine]]>
Sun, 04 Nov 2012 21:02:27 GMT /slideshow/notes-how-to-build-a-web-page/15025098 sukhsandhu@slideshare.net(sukhsandhu) How to build a web page - SES Magazine sukhsandhu How to build a web page - SES Magazine <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/notes-howtobuildawebpage-121104210230-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to build a web page - SES Magazine
How to build a web page - SES Magazine from Sukh Sandhu
]]>
306 3 https://cdn.slidesharecdn.com/ss_thumbnails/notes-howtobuildawebpage-121104210230-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Content management system requirements checklist /slideshow/notes-content-management-system-requirements-checklist/15025097 notes-contentmanagementsystemrequirementschecklist-121104210225-phpapp02
A requirements checklist for reference purpose. ]]>

A requirements checklist for reference purpose. ]]>
Sun, 04 Nov 2012 21:02:24 GMT /slideshow/notes-content-management-system-requirements-checklist/15025097 sukhsandhu@slideshare.net(sukhsandhu) Content management system requirements checklist sukhsandhu A requirements checklist for reference purpose. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/notes-contentmanagementsystemrequirementschecklist-121104210225-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A requirements checklist for reference purpose.
Content management system requirements checklist from Sukh Sandhu
]]>
2943 8 https://cdn.slidesharecdn.com/ss_thumbnails/notes-contentmanagementsystemrequirementschecklist-121104210225-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web standards /slideshow/web-standards-and-checklists/15025096 notes-webstandardsandchecklists-121104210222-phpapp02
Web standards are the formal, non-proprietary standards and other technical specifications that define and describe aspects of the World Wide Web. In recent years, the term has been more frequently associated with the trend of endorsing a set of standardized best practices for building web sites, and a philosophy of web design and development that includes those methods.]]>

Web standards are the formal, non-proprietary standards and other technical specifications that define and describe aspects of the World Wide Web. In recent years, the term has been more frequently associated with the trend of endorsing a set of standardized best practices for building web sites, and a philosophy of web design and development that includes those methods.]]>
Sun, 04 Nov 2012 21:02:20 GMT /slideshow/web-standards-and-checklists/15025096 sukhsandhu@slideshare.net(sukhsandhu) Web standards sukhsandhu Web standards are the formal, non-proprietary standards and other technical specifications that define and describe aspects of the World Wide Web. In recent years, the term has been more frequently associated with the trend of endorsing a set of standardized best practices for building web sites, and a philosophy of web design and development that includes those methods. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/notes-webstandardsandchecklists-121104210222-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Web standards are the formal, non-proprietary standards and other technical specifications that define and describe aspects of the World Wide Web. In recent years, the term has been more frequently associated with the trend of endorsing a set of standardized best practices for building web sites, and a philosophy of web design and development that includes those methods.
Web standards from Sukh Sandhu
]]>
759 2 https://cdn.slidesharecdn.com/ss_thumbnails/notes-webstandardsandchecklists-121104210222-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The HTML Beginner Tutorial /sukhsandhu/the-html-beginner-tutorial html-basics-121104203906-phpapp02
This HTML Beginner Tutorial assumes that you have no previous knowledge of HTML or CSS. It should be quite easy to follow if you work through each step, which are all brought together at the end, before moving on to the CSS Beginner Tutorial.]]>

This HTML Beginner Tutorial assumes that you have no previous knowledge of HTML or CSS. It should be quite easy to follow if you work through each step, which are all brought together at the end, before moving on to the CSS Beginner Tutorial.]]>
Sun, 04 Nov 2012 20:39:04 GMT /sukhsandhu/the-html-beginner-tutorial sukhsandhu@slideshare.net(sukhsandhu) The HTML Beginner Tutorial sukhsandhu This HTML Beginner Tutorial assumes that you have no previous knowledge of HTML or CSS. It should be quite easy to follow if you work through each step, which are all brought together at the end, before moving on to the CSS Beginner Tutorial. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/html-basics-121104203906-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This HTML Beginner Tutorial assumes that you have no previous knowledge of HTML or CSS. It should be quite easy to follow if you work through each step, which are all brought together at the end, before moving on to the CSS Beginner Tutorial.
The HTML Beginner Tutorial from Sukh Sandhu
]]>
1236 7 https://cdn.slidesharecdn.com/ss_thumbnails/html-basics-121104203906-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security problems in TCP/IP /slideshow/security-problems-in-tcp-ip/15024681 securityproblemsintcp-ip-121104201622-phpapp01
The TCP/IP protocol suite has a number of vulnerability and security flaws inherent in the protocols. Those vulnerabilities are often used by crackers for Denial of Service (DOS) attacks, connection hijacking and other attacks. The following are the major TCP/IP security problems: TCP SYN attacks (or SYN Flooding) ¡§CThe TCP uses sequence numbers to ensure data is given to the user in the correct order. The sequence numbers are initially established during the opening phase of a TCP connection in the three-way handshake. TCP SYN attacks take advantage of a flaw in how most hosts implement TCP three-way handshake. When Host B receives the SYN request from A, it must keep track of the partially opened connection in a "listen queue" for at least 75 seconds and a host can only keep track of a very limited number of connections. A malicious host can exploit the small size of the listen queue by sending multiple SYN requests to a host, but never replying to the SYN&ACK the other host sends back. By doing so, the other host's listen queue is quickly filled up, and it will stop accepting new connections, until a partially opened connection in the queue is completed or times out. This ability to effectively remove a host from the network for at least 75 seconds can be used as a denial-of-service attack, or it can be used to implement other attacks, like IP Spoofing. IP Spoofing - IP spoofing is an attack used to gain unauthorized access to computers, whereby the attacker sends messages to a computer with a forging IP address indicating that the message is coming from a trusted host. The IP layer assumes that the source address on any IP packet it receives is the same IP address as the system that actually sent the packet -- it does no authentication. Many higher level protocols and applications also make this assumption, so it seems that anyone able to forge the source address of an IP packet could get unauthorized privileges. There are few variations of IP Spoofing such as Blind and Non-blind spoofing, man-in-the-middle- attack (connection hijacking), etc. For details, please read the IP Spoofing section. Routing attacks ¡§C This attack takes advantage of Routing Information Protocol (RIP), which is often an essential component in a TCP/IP network. RIP is used to distribute routing information within networks, such as shortest-paths, and advertising routes out from the local network. Like TCP/IP, RIP has no built in authentication, and the information provided in a RIP packet is often used without verifying it. Attacks on RIP change where data goes to, not where it came from. For example, an attacker could forge a RIP packet, claiming his host "X" has the fastest path out of the network. All packets sent out from that network would then be routed through X, where they could be modified or examined. An attacker could also use RIP to effectively impersonate any host, by causing all traffic sent to that host to be sent to the attacker's machine]]>

The TCP/IP protocol suite has a number of vulnerability and security flaws inherent in the protocols. Those vulnerabilities are often used by crackers for Denial of Service (DOS) attacks, connection hijacking and other attacks. The following are the major TCP/IP security problems: TCP SYN attacks (or SYN Flooding) ¡§CThe TCP uses sequence numbers to ensure data is given to the user in the correct order. The sequence numbers are initially established during the opening phase of a TCP connection in the three-way handshake. TCP SYN attacks take advantage of a flaw in how most hosts implement TCP three-way handshake. When Host B receives the SYN request from A, it must keep track of the partially opened connection in a "listen queue" for at least 75 seconds and a host can only keep track of a very limited number of connections. A malicious host can exploit the small size of the listen queue by sending multiple SYN requests to a host, but never replying to the SYN&ACK the other host sends back. By doing so, the other host's listen queue is quickly filled up, and it will stop accepting new connections, until a partially opened connection in the queue is completed or times out. This ability to effectively remove a host from the network for at least 75 seconds can be used as a denial-of-service attack, or it can be used to implement other attacks, like IP Spoofing. IP Spoofing - IP spoofing is an attack used to gain unauthorized access to computers, whereby the attacker sends messages to a computer with a forging IP address indicating that the message is coming from a trusted host. The IP layer assumes that the source address on any IP packet it receives is the same IP address as the system that actually sent the packet -- it does no authentication. Many higher level protocols and applications also make this assumption, so it seems that anyone able to forge the source address of an IP packet could get unauthorized privileges. There are few variations of IP Spoofing such as Blind and Non-blind spoofing, man-in-the-middle- attack (connection hijacking), etc. For details, please read the IP Spoofing section. Routing attacks ¡§C This attack takes advantage of Routing Information Protocol (RIP), which is often an essential component in a TCP/IP network. RIP is used to distribute routing information within networks, such as shortest-paths, and advertising routes out from the local network. Like TCP/IP, RIP has no built in authentication, and the information provided in a RIP packet is often used without verifying it. Attacks on RIP change where data goes to, not where it came from. For example, an attacker could forge a RIP packet, claiming his host "X" has the fastest path out of the network. All packets sent out from that network would then be routed through X, where they could be modified or examined. An attacker could also use RIP to effectively impersonate any host, by causing all traffic sent to that host to be sent to the attacker's machine]]>
Sun, 04 Nov 2012 20:16:21 GMT /slideshow/security-problems-in-tcp-ip/15024681 sukhsandhu@slideshare.net(sukhsandhu) Security problems in TCP/IP sukhsandhu The TCP/IP protocol suite has a number of vulnerability and security flaws inherent in the protocols. Those vulnerabilities are often used by crackers for Denial of Service (DOS) attacks, connection hijacking and other attacks. The following are the major TCP/IP security problems: TCP SYN attacks (or SYN Flooding) ¡§CThe TCP uses sequence numbers to ensure data is given to the user in the correct order. The sequence numbers are initially established during the opening phase of a TCP connection in the three-way handshake. TCP SYN attacks take advantage of a flaw in how most hosts implement TCP three-way handshake. When Host B receives the SYN request from A, it must keep track of the partially opened connection in a "listen queue" for at least 75 seconds and a host can only keep track of a very limited number of connections. A malicious host can exploit the small size of the listen queue by sending multiple SYN requests to a host, but never replying to the SYN&ACK the other host sends back. By doing so, the other host's listen queue is quickly filled up, and it will stop accepting new connections, until a partially opened connection in the queue is completed or times out. This ability to effectively remove a host from the network for at least 75 seconds can be used as a denial-of-service attack, or it can be used to implement other attacks, like IP Spoofing. IP Spoofing - IP spoofing is an attack used to gain unauthorized access to computers, whereby the attacker sends messages to a computer with a forging IP address indicating that the message is coming from a trusted host. The IP layer assumes that the source address on any IP packet it receives is the same IP address as the system that actually sent the packet -- it does no authentication. Many higher level protocols and applications also make this assumption, so it seems that anyone able to forge the source address of an IP packet could get unauthorized privileges. There are few variations of IP Spoofing such as Blind and Non-blind spoofing, man-in-the-middle- attack (connection hijacking), etc. For details, please read the IP Spoofing section. Routing attacks ¡§C This attack takes advantage of Routing Information Protocol (RIP), which is often an essential component in a TCP/IP network. RIP is used to distribute routing information within networks, such as shortest-paths, and advertising routes out from the local network. Like TCP/IP, RIP has no built in authentication, and the information provided in a RIP packet is often used without verifying it. Attacks on RIP change where data goes to, not where it came from. For example, an attacker could forge a RIP packet, claiming his host "X" has the fastest path out of the network. All packets sent out from that network would then be routed through X, where they could be modified or examined. An attacker could also use RIP to effectively impersonate any host, by causing all traffic sent to that host to be sent to the attacker's machine <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securityproblemsintcp-ip-121104201622-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The TCP/IP protocol suite has a number of vulnerability and security flaws inherent in the protocols. Those vulnerabilities are often used by crackers for Denial of Service (DOS) attacks, connection hijacking and other attacks. The following are the major TCP/IP security problems: TCP SYN attacks (or SYN Flooding) ¡§CThe TCP uses sequence numbers to ensure data is given to the user in the correct order. The sequence numbers are initially established during the opening phase of a TCP connection in the three-way handshake. TCP SYN attacks take advantage of a flaw in how most hosts implement TCP three-way handshake. When Host B receives the SYN request from A, it must keep track of the partially opened connection in a &quot;listen queue&quot; for at least 75 seconds and a host can only keep track of a very limited number of connections. A malicious host can exploit the small size of the listen queue by sending multiple SYN requests to a host, but never replying to the SYN&amp;ACK the other host sends back. By doing so, the other host&#39;s listen queue is quickly filled up, and it will stop accepting new connections, until a partially opened connection in the queue is completed or times out. This ability to effectively remove a host from the network for at least 75 seconds can be used as a denial-of-service attack, or it can be used to implement other attacks, like IP Spoofing. IP Spoofing - IP spoofing is an attack used to gain unauthorized access to computers, whereby the attacker sends messages to a computer with a forging IP address indicating that the message is coming from a trusted host. The IP layer assumes that the source address on any IP packet it receives is the same IP address as the system that actually sent the packet -- it does no authentication. Many higher level protocols and applications also make this assumption, so it seems that anyone able to forge the source address of an IP packet could get unauthorized privileges. There are few variations of IP Spoofing such as Blind and Non-blind spoofing, man-in-the-middle- attack (connection hijacking), etc. For details, please read the IP Spoofing section. Routing attacks ¡§C This attack takes advantage of Routing Information Protocol (RIP), which is often an essential component in a TCP/IP network. RIP is used to distribute routing information within networks, such as shortest-paths, and advertising routes out from the local network. Like TCP/IP, RIP has no built in authentication, and the information provided in a RIP packet is often used without verifying it. Attacks on RIP change where data goes to, not where it came from. For example, an attacker could forge a RIP packet, claiming his host &quot;X&quot; has the fastest path out of the network. All packets sent out from that network would then be routed through X, where they could be modified or examined. An attacker could also use RIP to effectively impersonate any host, by causing all traffic sent to that host to be sent to the attacker&#39;s machine
Security problems in TCP/IP from Sukh Sandhu
]]>
2776 5 https://cdn.slidesharecdn.com/ss_thumbnails/securityproblemsintcp-ip-121104201622-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Personal development plan /slideshow/personal-development-plan-15023945/15023945 personaldevelopmentplan-121104185434-phpapp02
Step by step instruction and personal development plan instructions, template in an easy to follow guide. ]]>

Step by step instruction and personal development plan instructions, template in an easy to follow guide. ]]>
Sun, 04 Nov 2012 18:54:32 GMT /slideshow/personal-development-plan-15023945/15023945 sukhsandhu@slideshare.net(sukhsandhu) Personal development plan sukhsandhu Step by step instruction and personal development plan instructions, template in an easy to follow guide. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/personaldevelopmentplan-121104185434-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Step by step instruction and personal development plan instructions, template in an easy to follow guide.
Personal development plan from Sukh Sandhu
]]>
3167 7 https://cdn.slidesharecdn.com/ss_thumbnails/personaldevelopmentplan-121104185434-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to write a good business letter /slideshow/how-to-write-a-good-business-letter/14943251 howtowriteagoodbusinessletter-online-121029230619-phpapp01
Help with formal and business letter writing. A summary of writing rules including outlines for business letters and letters of inquiry, and abbreviations used in letters. ]]>

Help with formal and business letter writing. A summary of writing rules including outlines for business letters and letters of inquiry, and abbreviations used in letters. ]]>
Mon, 29 Oct 2012 23:06:17 GMT /slideshow/how-to-write-a-good-business-letter/14943251 sukhsandhu@slideshare.net(sukhsandhu) How to write a good business letter sukhsandhu Help with formal and business letter writing. A summary of writing rules including outlines for business letters and letters of inquiry, and abbreviations used in letters. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/howtowriteagoodbusinessletter-online-121029230619-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Help with formal and business letter writing. A summary of writing rules including outlines for business letters and letters of inquiry, and abbreviations used in letters.
How to write a good business letter from Sukh Sandhu
]]>
66250 32 https://cdn.slidesharecdn.com/ss_thumbnails/howtowriteagoodbusinessletter-online-121029230619-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
When You Are Angry /slideshow/when-you-are-angry/8787173 whenyouareangry-13126307011512-phpapp01-110806064043-phpapp01
Never getting angry is impossible. Instead, remember that how you act when you\’re angry can make the situation better or worse. Don\’t let anger be the boss of you. Take charge of it!]]>

Never getting angry is impossible. Instead, remember that how you act when you\’re angry can make the situation better or worse. Don\’t let anger be the boss of you. Take charge of it!]]>
Sat, 06 Aug 2011 06:39:10 GMT /slideshow/when-you-are-angry/8787173 sukhsandhu@slideshare.net(sukhsandhu) When You Are Angry sukhsandhu Never getting angry is impossible. Instead, remember that how you act when you\’re angry can make the situation better or worse. Don\’t let anger be the boss of you. Take charge of it! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/whenyouareangry-13126307011512-phpapp01-110806064043-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Never getting angry is impossible. Instead, remember that how you act when you\’re angry can make the situation better or worse. Don\’t let anger be the boss of you. Take charge of it!
When You Are Angry from Sukh Sandhu
]]>
693 6 https://cdn.slidesharecdn.com/ss_thumbnails/whenyouareangry-13126307011512-phpapp01-110806064043-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-sukhsandhu-48x48.jpg?cb=1739804533 Sukh is an experienced training, compliance and risk executive, project manager with 9000+ hours of direct project management experience, ISO 9001:2008 Quality Management Lead Auditor, Registered MARA Migration Agent with more than seventeen years of experience in the VET and Higher Education sectors including Australian Government, TAFE, Not-for-profits, International organisations, Private RTOs and Universities. Sukh has worked across a variety of areas including General Management, Online Learning, Student Engagement, Business Development, Instructional Design / Curriculum Development, Assessment Validation and Moderation, Training Delivery, Marketing, Staff Recruitment and Management,... www.sukhsandhu.com https://cdn.slidesharecdn.com/ss_thumbnails/c5d39674-f1fb-4092-bf29-852ca22150e2-160409084024-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/10167491/60686707 Qualified Social Media... https://cdn.slidesharecdn.com/ss_thumbnails/anintroductiontomicrosoftoffice2007-lecture-121126173719-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/an-introduction-to-microsoft-office-2007-lecture/15359185 An introduction to mic... https://cdn.slidesharecdn.com/ss_thumbnails/healthyfoodsandjunkfood-121105061553-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/healthy-foods-and-junk-food-sharing-some-information/15030092 Healthy Foods and Junk...