Welcome to www.programmer2programmer.net  Its all about Programming !

programmer2programmer.net

 Tips
 Microsoft Certification
 Final Year Project Idea
 Connection Strings
 Password Recovery
 SQL Injection
 Encryption & Decryption
  
 LIVE Academic Project
 Project #1 - VB6, Access
  Project #2 - VB.Net, SQL
 Project #3 - ASP, Access
 Project #4 - ASP.NET, C#
 Project #5 - VB6, SQL
 Project #6 - Stegano
 Project #7 - C
 Project #8 - C++
 Project #9 - JAVA, MySQL
 Project #10- PHP, MySQL
 Project #11- JSP, Oracle
 Project #12- C# Face Exp
 Project #13- Mobile Bank
 Download MBA Project
 MBA Project Topic
 Project Viva Question
  2017 New Projects
 Project Synopsis Download
  
 University Question Paper and Assignment
 SMU - Question Paper
 SMU - Assignment
 SCDL - Assignment
  
 Interview Question Answer
 General & HR Round
 Visual Basic 6
 VB.Net & C#
 ASP.Net
 SQL Server
  Oracle and DBA
 My SQL
  

100% Tested
Ready Academic IT Projects

BE, ME, BTech, BCA, MCA, MBA, Bsc-IT, MS, BIT, ADIT, DOEACC, IGNOU, SMU
readymadeproject.com
One stop solution for VB6, VB.Net, C#, ASP.Net, Crystal Report, Oracle, SQL Server, MySql, PHP, XML, AJAX ....
Home Personal Member Forum Source Project Tips Contact
 

Tips of security programming, SQL Injection, Code Injection, encryption decryption, password recovery, interview question and answer, connection string and many more.

 
Encryption and Decryption
  1.   What is Encryption
Encryption is the process of changing intelligible data into unintelligible data. Decryption is the opposite of encryption it decrypt the encrypted data into intelligible data.
 
  2.   XOR Encryption
The simplest stream cipher is called the Vernam cipher or XOR Encryption. A bit from a key is added, with the carry discarded, to a bit from the plaintext to yield one bit of cipher text (this operation is called exclusive -OR).
 
  3.   Transposition Encryption
Transposition ciphers are based on the rearrangement of each character in the plain text message to prpduce a cipher text, These encryption technique include reversing the entire message, reforming the message into a geometrical shape, rearranging the plain text by scrambiling a sequence of columns, and periodically permuting the character of the plain text.
 
    4.   Symmetric or Secret Key Encryption
In this type of encryption both the sender and recipient posses the same key, to encrypt and decrypt the data, for successful operation both parties must agree upon a shared secret key.
 
    5.   Asymmetric Encryption  
Asymmetric Encryption is a form of Encryption where keys come in pairs. What one key encrypts, only the other can decrypt.
 
    6.   Certificate Authority 
Certification authority (CA) is an entity which issues digital certificates for use by other parties. It is an example of a trusted third party.
 
    7.   Decryption Logics  
There is no predefined formula for find the secret key. It is an art and normally known as cryptography or reverse engineering.
 
    8.   Sample Coding  
Source code of all the encryption algorithms.
 
 
SQL Injection
  1.   What is SQL Injection
SQL Injection the most popular method to pass SQL command deliberately from input filed in application.
 
  2.   SQL Injection by example
SQL injection is a type of security exploit in which the attacker adds SQL statements through a web application's input fields or hidden parameters to gain access to resources or make changes to data.
 
    3.   Advanced SQL Injection
SQL Injection is the hacking technique which attempts to pass SQL commands (statements) through a web application for execution by the backend database.
 
 
Password Recovery
  1.   Cracking of Secret keys
Cryptanalysis has long relied on the lengthy, patient applications of trail and error in order to crack a code. The advent of electronic computing both hardware means high processor speed, high memory and software means multi tasking, multi processing software platform dramatically enhanced that process.
 
  2.   Brute Force Cracking of Passwords
Brute force technique is very simple and efficient, basically it try out all possible combination of password by given character set. The developer of such program admitted that the software includes artificial delays to make the cracking appear to take longer than it really does. because some commercial application have restricted by numbers of attempt for password guising and automatically lock the system for preventing hack.
  3.   Password Recovery Source Code
You can download password recovery source code written in Visual Basic.
 
 
IT/Software/Database Interview Question and Answer
  1.   Tips for success in technical interview
This is the collection of Interview Question, I collected form different source, I try to give answer of all questions, if you are not satisfied or you think answers are not correct you can post your comment for that, I also appreciate you if you submit interview question and share your interview experience.
 
    2.   Interview Question answer for .NET
Interview questions and answers for VB.Net, C#, Interview question and answers for Microsoft .NET Framework, CLR. Interview question and answers for ADO.NET, Interview question and answers for basics of Microsoft Visual Studio .NET and Visual Basic .NET including Classes, OOPS, Syntaxes, Data access technologies, security. Interview question and answers for XML Web services, COM+, Server component.
 
  3.   Interview Question answer Oracle
Interview questions and answers for Oracle database development and database Administration. Oracle interview question including database concept, database architecture. Interview question and answer for oracle physical and logical database structure. Interview question and answers for oracle database designing, database implementation, administration, database objects, tables, views, triggers, index, primary key.
 
 

4.

Interview Question answer SQL Server
Interview question and answers for Microsoft SQL Server database concept, designing and administration. MS SQLServer interview question and answers for database concept, database objects tables, views, stored procedure, triggers, constraints.

 

Microsoft Certification

 

 1.

MCP eBooks
The Microsoft Certified Professional (MCP) program consist several papers, for preparing each paper you need to study the books, here I give you the source of Microsoft Press books. You can purchase MCP books from following sites or you can download the free eBook from following links. I provide links for following paper (70-305, 70-306, 70-228, 70-229, 70-300, 70-310, 70-290) which I have read to pass my MCP, MCAD, MCSD, MCDBA Certification. This books are most comprehensive books and specially made for clear the certification and covering all aspect of examination.
 

2.

MCP Test Simulators
Download this free Microsoft Certification Examination Simulator with actual question and answer for practice. Test engine can simulate real examination environment. It will help you to prepare for the examination MCP (Microsoft Certified Professional), MCAD (Microsoft Certified Application Developer), MCSD (Microsoft Certified Solution Developer) and MCDBA (Microsoft Certified Database Administrator). This engine have two part one is the core engine and databank. You must download the engine first and download the databank as per your requirement of MCP Paper.

 

Academic Project and Live Project, Source Code, Documentation

1.

Academic Project Source Code and Project Report
Free download of Live Project Visual Basic 6, VB .NET, C#, ASP.NET, SQL Server Source Code for final year college student of Mumbai, Delhi, Calcutta, Chennai, Pune, Bangalore University of India and other international university, project submission of BE, BCA, MCA, MBA, IGNOU, SMU with complete synopsis, flow chart, DFD, requirement, documentation.
 
(C) Atanu Maity, 2006-2017