Thursday, November 28, 2019

Are rules necessary essays

Are rules necessary essays My opinion on this issue is that I do think that rules are necessary; there are a lot of reasons why we need rules in our society. Legal and non-legal rules are both needed in our community. Most legal rules are enforced to keep the individuals of this society to feel safe, to make them know that walking down the street is not dangerous; the effect is it makes people be able to live their life without worrying if they are going to be in danger. There are rules everywhere in this community, the roads, home, religion, family, school and also social clubs, and in this essay I shall demonstrate why exactly rules are necessary. An example of a legal rule and its punishment in this society is murder, killing someone is the most disgusting act anyone can imagine. The punishments for murder is 25 years to life in jail and also in some other countries if committing death earns death, and they shall get hanged. Sometimes people commit murder on accounts of manslaughter and some accounts are in as self defence, a popular definition would say that it is the deliberate killing of a person, but most people don't regard self defence as murder. It is also a measure for governments to order people to kill others (in times of war for example), and people are more inclined to kill to order if the murder label is removed. Well back on track again, the punishments for murder, helps individuals in this society feel safe and make criminals more aware of what they are facing when they commit a murder. But the punishment doesnt necessarily stop criminals from not killing. We cant have murderers running lose around the streets , so locking them away is increasing the safety in the society. Having criminals in jail creates discipline and teach the criminals why they are in jail in the first place, they should all be thought a lesson. Rape is another legal rule that I think has a good reason why the criminals that commit these hideous crimes shou ...

Sunday, November 24, 2019

Bird Watching Tips for Beginners

Bird Watching Tips for Beginners Identifying a bird can be challenging. Birds are active, energetic animals and you need a quick eye to spot as many details as possible in a short span of time. The obstacles are many- the light may be dim, you could have the sun in your eyes, or the bird may dive into a bush. So to stand the best chance of landing a name for a bird, youll want to know what to look for- what matters most and how to spend your precious viewing time. Keep Your Eye on the Bird Photo  © Marc Romanelli / Getty Images. When you spot a bird, dont immediately try to flip through the pages of a field guide to identify it. Every moment of viewing time is precious. Keep your eye fixed on the bird and study it- absorb details of its markings, movements, song, feeding habits, and size. You may want to jot down notes or quickly sketch things that catch your eye. But dont focus too much on your jottings, try to maximize the time you have the bird in view, as this is your time to study it and you dont know how long it will be before the bird dashes off, out of sight. Listen for Calls and Song Listening out for a birds vocalizations is simple but its also easy to forget to do. The odds are, if you dont make a conscious effort to listen, you wont remember the birds song and youll miss out on one of the best bird identification tools there is. The good news is that you can listen to a bird while you look at it- its easy to do both at the same time. Look for bill movements along with the calls you hear, just to ensure youre associating the correct song with the bird youre trying to identify. Estimate General Size and Shape A general picture of the bird, that is its approximate size and shape, will often give you many clues when placing it into the correct family of birds. Therefore, begin with an assessment of the birds overall appearance. What is the approximate size of the bird? Its easiest to estimate size in relation to well know birds. For instance, is the bird youre observing about the size of a sparrow? A robin? A pigeon? A crow? A turkey? Think in terms of silhouettes and try to get an inkling for its general body shape. Does it stand upright and walk with ease, or is it unsteady and awkward on land? Make Note of Facial Markings and Bill Characteristics After determining its general size and shape, then youre ready to start noticing details. Start at the head first. Look for distinctive strips and patches of color including crown stripes, eye lines, nape color, eye arcs or rings. Does it have a black hood on its head? Do its feathers form a crest atop its head? Also note the color and shape of the birds bill. How long is the bill in relation to the birds head? Is it straight or curved, conical or flattened? Look for Wing Bars and Tail Shape Next look for details on the birds body, wings, and tail. Keep an eye out for wing bars, color patches, and markings on the birds body, when it is stationary or in flight. What color is its back and its belly? How long is its tail in relation to the birds body length? How does it hold its tail? Does it have a forked tail or is it square or rounded? Observe Leg Color and Length Now study the birds legs. Does the bird have long legs or short legs? What color are its legs? If you can catch a glimpse of its feet, try and determine if its feet are webbed, or if it has talons. Some birds even have toes that arranged differently than others and if youre fortunate enough to have a close-up view, see how many of its toes point forwards or backwards. Study Movement and Flight Patterns Observe the way the bird walks, how it holds its tail, or how it jumps from branch to branch. If it flies off, watch for a pattern in its flight, does it swoop up and down in gentle arcs with each wingbeat or does it glide gently and steadily? Determine Feeding Habits If you can, try and determine what the bird is eating or how it feeds. Does it cling to a tree t trunk and dig at the bark looking for insects? Or does it forage across your lawn, tilting its head to watch for insects scurrying amongst blades of grass. Does it sway its bill through the water at the edge of a pond? Describe Habitat, Region, and Climate Make note of the habitat in which you have observed the bird. You can do this even after the bird has flown off, so its best to leave this step until last. Did you spot the bird in a wetland or woodland? Are you in an urban setting or a farm field? Each species of bird has a typical region that they inhabit and making note of the region youre in when you observe a bird can narrow the possibilities when you try to identify that bird. Also, birds migrate and species composition in a region changes throughout the seasons, so make note of the time of year (or specific date you observe the bird). Record Your Observations After viewing the bird, jot down your observations for later reference. From markings to behavior, write down anything you noticed, it can all help when you later sit down with a field guide to confirm the birds species. Also, note the location, date, time of day of the siting.

Thursday, November 21, 2019

Inclusion and special educational needs (including challenging Essay

Inclusion and special educational needs (including challenging behaviour) - Essay Example This is better said than done, since in practice, there have been progressively increasing social diversities (DfES, 2001, 1-33). This poses a challenge on the practitioners as well as the state, since they are committed to provide an appropriate education for all. It is well known that factors such as ethnicity, disability and material deprivation are associated with inequality, social exclusion and the risk of low educational attainment, due to diversity of the condition and the candidates. By diversity, it is not only meant the different grades of disabilities or challenging behaviours in these people, it also reflects divergent cultural values and norms. To promote and enforce equal access to education, the current trend is to acknowledge the rights of inclusion of these people. Following lots of argument, now most agree inclusion describes a process where the pupil with special needs may be educated in an inclusive school build within the mainframe of the ordinary schools, in or der to gradually accept them in the mainstream (Croll and Moses, 2000, 1-12). The nature of provision for special educational needs has changed drastically over the last few years following the Warnock Report and the 1981 Education Act. Ideally, all education, special or ordinary should look at implementation of principles of social justice in education, as deployment of "what is good for the common interest where that is taken to include the good of each and good for all" (Griffiths, 1998, 95 in Quicke, 2007, 2-15). This implies improvement of education of all and specially of those with special needs. This should, therefore, follow certain principles guided by the code for practitioners (QCA/DfEE, 2001). In a broader sense, the inequality in education of those identified to have special education needs, can only be demolished by inclusion (DfES, 2001, 1-13) due the fact that all children, special or ordinary, have the rights to experience relationship

Wednesday, November 20, 2019

Civic Humanism and the Sidewalk Essay Example | Topics and Well Written Essays - 500 words

Civic Humanism and the Sidewalk - Essay Example However, the two terms when related to â€Å"The Sidewalk† seem to crash in their connotations. Implications concluded in this article comprise the argument of the two terms that draw their basis from human interactions in society. This is evident from the way people behave while on a sidewalk, they seem to collide but are still heading to their destinations (Wiens 120). The author’s study was in the street where he observed the behavior of the people prior to embarking on meticulous analysis (Wiens 120). His observation was that sidewalk promotes and aids pedestrian movement, thus, this being the author’s main argument. He states that pedestrianism esteems highly public space, but not in the manner of aesthetic or enhancing democracy for citizens. Since its main concern is to ensure adequate array of people plus objects, hence, giving the sidewalks the effectiveness it requires. Blomley also states that pedestrianism may work effectively below the political radar and scholastic environment. In addition, pedestrianism is more evident in the urban setting where the streets may be of private owners but its essence still holds. This is despite the case where a political space might be in a park or any other venue far from the street but still in the urban setting (Blomley

Monday, November 18, 2019

Multinational Corporations Essay Example | Topics and Well Written Essays - 1750 words

Multinational Corporations - Essay Example Globalization-brought about by advancement in technology, transport, and communication- has made it possible for multinational corporations to spread very fast. MNC have both negative and positive impacts on developing countries. Below I have discussed the impacts starting with positive impacts and lastly negative impacts. Employment It is a common thing in developing countries for the governments to actively seek for foreign investors. Multinational corporations provide both direct and indirect employments to developing countries which is a major challenge in these countries. Banking and telecommunication companies are some of the most common companies which have developed over large regions. Due to the size of these companies they create more job opportunities. Creating these job opportunities also account for increased domestic expenditure and income. These companies introduce new technologies to the employees and sometimes even provide training to their employees. This reduces th e cost of the government in training its citizens. Taxation revenues One of the major challenges facing developing countries is provision of social amenities to their citizens. This is due to poverty and lack of enough revenues for the government to provide such amenities as education and health services. Lack of basic education for these countries is one major cause of why they lag behind in terms of development. Poor health services contribute to high mortality rates especially to children under the age of five years. Foreign companies seeking to invest in these developing countries have always been welcomed so that they can help these countries add on to their revenues. Taxation adds to the domestic economy of the country where MNCs have invested. Due to this investment there is a direct flow of capital in the host country. Where these corporations are producing companies, they may save the host country’s revenue in terms of import. The companies may produce products that were previously imported to an extent of transforming them into exports. This will in turn earn the host country more revenue. Another source of revenue for the host country’s government is the money taxed directly from the salaries of workers. Previously we saw that multinational corporations provide employment to citizens of the host nations. The government earns revenue from salaries of all its workers in the country. From this discussion it is clear that presence of multinational corporations in a country has a significant impact on the host nation. Growth and efficiency Capital is a basic need of production; however, this is a rare commodity in underdeveloped and developing countries. MNCs offer foreign direct investment (FDI) to these countries. Developing countries may have enough natural resources available in their countries but lack resources in terms of capital and equipment. In mining, for example, most developing countries cannot afford the machinery required lea ve alone the capital. This is the opportunity for large MNCs specialized in the field to chip in. The host nations in this case have got no choice but to enter into partnership with the company. Another long term advantage to the host nation is improvement in technology. Most developing countries lack the technology needed in many industries. Introduction of foreign technology into these countries is always an advantage. The machinery and structures built, in the long run, will belong to the host nation. Sometimes the new technology is transferred the

Friday, November 15, 2019

The Role of the Farm Assurance Scheme in Food Safety

The Role of the Farm Assurance Scheme in Food Safety Name: Huan Yu Farm assurance In the UK, farm assurance schemes provide consumers and businesses with guarantees that food has been produced to particular standards. Farm assurance aims at certification for agricultural products and emphasises the principles of quality assurance. All farm assurance schemes are mainly to ensure high standards of animal welfare, and it may include standards and certification for traceability, production methods, transport as well as supplies in order to monitor the agricultural food from farm to pack. This protocol is necessary to certify that all farm foods reach required standard for food safety (Gov.uk, 2012). A typical example is the UK’s Red Tractor scheme, which was started by the UK farmers, food producers and retailers and was launched in 2000. The Red Tractor is a food assurance scheme which covers production standards developed by experts on safety, hygiene, animal welfare and the environment amongst other factors. All suppliers in the red tractor food chain are inspected and certified by an independent professional body. The red tractor certifies that food has been produced to these independently inspected standards right across the food chain-from farm to pack. The Red Tractor logo on the pack means the food or drink has met these responsible production standards and is fully traceable back to independently inspected farms in the UK (Assured Food Standards, 2015). Other schemes that are affiliated to the red tractor include soil association, quality British turkey and quality meat Scotland. Herd health plan Many organisations such as soil association and RSPCA Freedom Food develop, describe and use the herd health plan as an individual farm management tool to identify and control the particular health problems of an individual farm. Thus, improving and maintaining animal welfare, gain financial as well as increase farm efficacy (Anon, 2015). Herd health plan in farm assurance schemes includes designing plan of housing, feeding and pasture management, bio-security, health recording and monitoring as well as control measures of disease. Farmers set the health plan and it is advised to get the veterinarian involved in the elaboration as a team, and as a live document it will cover a series of record keeping policies and protocols to reduce the incidences of sickness and to make a more prolific herd. Brief summary / outline of the minimum required content of the farm assurance scheme and dairy herd health plan Minimum requirements for RTA dairy herd health plan T covers as a general three important aspects: A. Routine Preventive Measures; Treatment Plans and Management Procedures B. Health and Performance Monitoring C. Health and Performance Review The minimum set standard under the farm assurance as well as keeping an update herd held plan are as follow: Plans and procedures in place to ensure safe and legal food production Staff training with on-going courses on animal handling, welfare, hygiene etc. Clear identification of livestock to deliver food chain traceability Effective and responsible control of birds, rodents, insects and other animals to prevent contamination and food safety risk. Sick or injured animals should have good management Feed and water management with a good feeding programme adequate access to clean drinking water. Records of mixing formulas should be kept to ensure that the foodstuff was acquired from another assured source Safe, comfortable and hygienic housing for all livestock, including young animals as well as new birth animals and stocking density should suitable Appropriate and well maintained facilities, conditions are available for animals Effective bio-security measures to prevent the spread of disease and protect food safety and animal health Responsible use of medicines and veterinary treatment, prevent food contamination Livestock transport with adequate vehicles to maintain the welfare during transport, prevents spread of diseases Environmental impact evaluation and protection management of waste, to make sure no contamination, pollution or spread of disease. (Anon, 2015) Outline of where the farm assurance scheme and herd health plan sits in the food chain (pre-farm; farm; post farm) They aim to ensure that each step in the supply chain for farm production, such as meat and dairy, are food safety assured, furthermore, they provide safely produced farm food products means much lower chances of zoonotic agents present in the product when consumers purchase them. First, the aspect of agricultural supply sector (drugs, residues and hormones) attracts consumer concerns about the food they eat. Second, with on-farm, the production process (free range, organic), slaughter method, food safety aspects, such as farm bio-security measures, proper housing space etc are the role of assurance to provide information and satisfy consumers. Red Tactor assurance have a range of post-farm schemes that provide effective assurance to recognised standards and a fundamental link in an integrated chain of assurance in the food chain from farms to supermarkets. It covers legislative requirements, scientific evidence, and good practice in the industry and consumer concern, such as proper vehicles, certification requirement, keep records for traceability as well as maintain sanitary conditions (Assured Food Standards, 2015). Highlight aspects of the farm assurance scheme particularly associated with food safety. The farm assurance scheme has made a great contribution to food safety and protected public health from food-borne diseases. Simultaneously, it has raised the confidence of customers on agricultural production and the awareness to monitor the safety of food. The dairy industry takes food safety seriously, pasteurization is an essential tool for ensuring that milk and dairy products are safe. Moreover, every tank load of milk entering dairy processing plants is strictly tested for animal residues. Cleanliness of farm; quality of farm flooring and walls are also the consideration factors based on the schemes ensures food safety. Highlight aspects of the health plan particularly associated with food safety Food safety is also ensured via some parts of the herd health plan by preventing disease occurrence and spread via vaccination and treatment. Salmonella and E. coli, have caused incidences of food poisoning and infected humans from food animals. Thus, increasing control on farm there is a reduced risk of contamination of farm products. Moreover, isolation facility to reduce spread of potentially zoonotic infectious diseases. Bio-security reduces the likely introduction of potentially zoonotic infectious diseases. Named antibiotics for use in common conditions and, therefore, increases discussion with vet of use of antibiotics in food production. DHHPs also help assess risks for both zoonotic and non-infectious diseases, as every herd at a farm has a chance of obtaining a disease. This helps VPH issues as it gives farmers and veterinarians. Furthermore, this also ensures that when the cattle reach abattoirs and food industries, the chances of them being infected with zoonotic agents is lowered. Highlight some limitations of the scheme The scheme require close cooperation between farmers, government, industry and other relevant sectors, in order to find a solution which can minimize the negative public health impact whilst ensuring safe and effective food-producing animals. -Difficulty in certifying compliance beyond the annual inspection -Reluctance in farmers and vets to engage the program with genuine intentions beyond a bureaucratic paper exercise The relationship between credibility of quality signals and reductions in consumer’ quality discovery costs still needs to be considered Concluding paragraph and personal opinion on the role of the scheme and the herd health plan Farm assurance and herd health plan are the most effective measures for supervision to provide safe agricultural production to public and simultaneously the limitations are the goals that the farm assurance scheme needs to improve and achieve. Because they reduce the incidence and impact of food-borne diseases by ensuring that food reaching the consumers is safe, health, of food quality while ensuring protection of animal welfare. Therefore, they can boost consumer confidence on the farmers and food products and adherence to the scheme should be strictly enforced. References Assured Food Standards, (2015)About us Assured Food Standards [online]Available at: http://www.redtractor.org.uk/about-us[Accessed 12 May 2015] Anon, (2015)[online] Available at: http://orgprints.org/13406/1/13406.pdf[Accessed 12 May 2015] Anon, (2015) [online] Available at: http://www.assuredfood.co.uk/resources/000/965/981/DAIRY_standards_ONLINE.pdf [Accessed 25 May 2015] Gov.uk, (2012)Food certification and assurance schemes Detailed guidance GOV.UK[online] Available at: https://www.gov.uk/kitemarks-in-farmed-meat-and-produce[Accessed 12 May 2015]

Wednesday, November 13, 2019

Exploring Schizophrenia Essay example -- Research Paper Mental Disorde

Exploring Schizophrenia "Schizophrenia is a cruel disease. The lives of those affected are often chronicles of constricted experiences, muted emotions, missed opportunities, unfulfilled expectations. It leads to a twilight existence, a twentieth-century underground man...It is in fact the single biggest blemish on the face of contemporary American medicine and social services; when the social history of our era is written, the plight of persons with schizophrenia will be recorded as having been a national scandal." E. Fuller Torrey, M.D., Surviving Schizophrenia I personally don't know anyone with schizophrenia, or at least I don't think I do. Perhaps I don't realize that my neighbor is walking through life with a secret, like the homosexual who, afraid of society's unfounded prejudice, confusion, and doubts over issues not talked about, remains silent. For this reason, my interest in schizophrenia developed: not because I have been affected by the disorder in a direct (or even indirect) way, but precisely because I haven't. I haven't because mental disorders are not something discussed over coffee. In our society schizophrenia isn't everybody's problem, and so most are content not to think – and consequently not to do – anything about it. My concern with schizophrenia stemmed from the unknown; thus it was fitting that my search to discover facts about it steadily uncovered more gray areas. What are the causes of schizophrenia? No one knows for certain. The symptoms? They vary. What about treatments? They too have varied throughout history and current treatment differs from case to case. Faced with the frustration of unanswered queries, I began to wonder why I chose this topic. However, that is the nature of scienc... ...: Longman Publishers USA, 1997. Keefe, Richard & Philip Harvey. Understanding Schizophrenia. New York: The Free Press, 1994. Mortensen PB, Pedersen CB, Westergaard T, et al. "Effects of family history and place and season of birth on the risk of schizophrenia." New England Journal of Medicine 340 (1999): 603-8. O'Brien, Patrick. The Disordered Mind. New Jersey: Prentice-Hall, Inc., 1978. Rund, Bjorn Rishovd. How do neuroleptics affect cognitive dysfunctions in schizophrenia? Nordic Journal of Psychiatry 53.2 (1999): 121-125. Stephenson, Joan. "Schizophrenia researchers striving for early detection and intervention." Journal of the American Medical Association 281.20 (05/26/99): 1877. Swartzendruber, Phil. "Mainstreaming the marginalized." Printed in The Record (April 2, 1998). http://www.goshen.edu/record/1997-98/April2-1998/mainstream.html. Exploring Schizophrenia Essay example -- Research Paper Mental Disorde Exploring Schizophrenia "Schizophrenia is a cruel disease. The lives of those affected are often chronicles of constricted experiences, muted emotions, missed opportunities, unfulfilled expectations. It leads to a twilight existence, a twentieth-century underground man...It is in fact the single biggest blemish on the face of contemporary American medicine and social services; when the social history of our era is written, the plight of persons with schizophrenia will be recorded as having been a national scandal." E. Fuller Torrey, M.D., Surviving Schizophrenia I personally don't know anyone with schizophrenia, or at least I don't think I do. Perhaps I don't realize that my neighbor is walking through life with a secret, like the homosexual who, afraid of society's unfounded prejudice, confusion, and doubts over issues not talked about, remains silent. For this reason, my interest in schizophrenia developed: not because I have been affected by the disorder in a direct (or even indirect) way, but precisely because I haven't. I haven't because mental disorders are not something discussed over coffee. In our society schizophrenia isn't everybody's problem, and so most are content not to think – and consequently not to do – anything about it. My concern with schizophrenia stemmed from the unknown; thus it was fitting that my search to discover facts about it steadily uncovered more gray areas. What are the causes of schizophrenia? No one knows for certain. The symptoms? They vary. What about treatments? They too have varied throughout history and current treatment differs from case to case. Faced with the frustration of unanswered queries, I began to wonder why I chose this topic. However, that is the nature of scienc... ...: Longman Publishers USA, 1997. Keefe, Richard & Philip Harvey. Understanding Schizophrenia. New York: The Free Press, 1994. Mortensen PB, Pedersen CB, Westergaard T, et al. "Effects of family history and place and season of birth on the risk of schizophrenia." New England Journal of Medicine 340 (1999): 603-8. O'Brien, Patrick. The Disordered Mind. New Jersey: Prentice-Hall, Inc., 1978. Rund, Bjorn Rishovd. How do neuroleptics affect cognitive dysfunctions in schizophrenia? Nordic Journal of Psychiatry 53.2 (1999): 121-125. Stephenson, Joan. "Schizophrenia researchers striving for early detection and intervention." Journal of the American Medical Association 281.20 (05/26/99): 1877. Swartzendruber, Phil. "Mainstreaming the marginalized." Printed in The Record (April 2, 1998). http://www.goshen.edu/record/1997-98/April2-1998/mainstream.html.

Sunday, November 10, 2019

An Approach to Detect and Prevent Sql Injection Attacks in Database Using Web Service

IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, January 2011 197 An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service IndraniBalasundaram 1 Dr. E. Ramaraj2 1 Lecturer, Department of Computer Science, Madurai Kamaraj University, Madurai 2 Director of Computer Centre Alagappa University, Karaikudi. Abstract SQL injection is an attack methodology that targets the data residing in a database through the firewall that shields it. The attack takes advantage of poor input validation in code and ebsite administration. SQL Injection Attacks occur when an attacker is able to insert a series of SQL statements in to a ‘query’ by manipulating user input data in to a web-based application, attacker can take advantages of web application programming security flaws and pass unexpected malicious SQL statements through a web application for execution by the backend database. This paper proposes a novel specification-ba sed methodology for the prevention of SQL injection Attacks. The two most important advantages of the new approach against xisting analogous mechanisms are that, first, it prevents all forms of SQL injection attacks; second, Current technique does not allow the user to access database directly in database server. The innovative technique â€Å"Web Service Oriented XPATH Authentication Technique† is to detect and prevent SQLInjection Attacks in database the deployment of this technique is by generating functions of two filtration models that are Active Guard and Service Detector of application scripts additionally allowing seamless integration with currently-deployed systems. General TermsLanguages, Security, Verification, Experimentation. Keywords Database security, world-wide web, web application security, SQL injection attacks, Runtime Monitoring changes to data. The fear of SQL injection attacks has become increasingly frequent and serious. . SQL-Injection Attacks are a cl ass of attacks that many of these systems are highly vulnerable to, and there is no known fool-proof defend against such attacks. Compromise of these web applications represents a serious threat to organizations that have deployed them, and also to users who trust these systems to store confidential data. The Web applications hat are vulnerable to SQL-Injection attacks user inputs the attacker’s embeds commands and gets executed [4]. The attackers directly access the database underlying an application and leak or alter confidential information and execute malicious code [1][2]. In some cases, attackers even use an SQL Injection vulnerability to take control and corrupt the system that hosts the Web application. The increasing number of web applications falling prey to these attacks is alarmingly high [3] Prevention of SQLIA’s is a major challenge. It is difficult to implement and enforce a rigorous defensive coding discipline. Many olutions based on defensive coding ad dress only a subset of the possible attacks. Evaluation of â€Å"â€Å"Web Service Oriented XPATH Authentication Technique† has no code modification as well as automation of detection and prevention of SQL Injection Attacks. Recent U. S. industry regulations such as the Sarbanes-Oxley Act [5] pertaining to information security, try to enforce strict security compliance by application vendors. 1. Introduction 1. 1 SAMPLE – APPLICATION Information is the most important business asset in today’s environment and achieving an appropriate level of Information Security. SQL-Injection Attacks (SQLIA’s) re one of the topmost threats for web application security. For example financial fraud, theft confidential data, deface website, sabotage, espionage and cyber terrorism. The evaluation process of security tools for detection and prevention of SQLIA’s. To implement security guidelines inside or outside the database it is recommended to access the sensitive databases should be monitored. It is a hacking technique in which the attacker adds SQL statements through a web application's input fields or hidden parameters to gain access to resources or make Application that contain SQL Injection vulnerability.The example refers to a fairly simple vulnerability that could be prevented using a straightforward coding fix. This example is simply used for illustrative purposes because it is easy to understand and general enough to illustrate many different types of attacks. The code in the example uses the input parameters LoginID, password to dynamically build an SQL query and submit it to a database. For example, if a user submits loginID and password as â€Å"secret,† and â€Å"123,† the application dynamically builds and submits the query: Manuscript received January 5, 2011 Manuscript revised January 20, 2011 198IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, January 2011 SELECT * from FROM loginID=’secret’ AND pass1=123 user_info WHERE If the loginID and password match the corresponding entry in the database, it will be redirect to user_main. aspx page other wise it will be redirect to error. aspx page. 1. dim loginId, Password as string 2. loginId = Text1. Text 3. password = Text2. Text 3. cn. open() 4. qry=†select * from user_info where LoginID=’† & loginID & â€Å"’ and pass1=† & password & â€Å"† 5. cmd=new sqlcommand(qry,cn) 6. rd=cmd. executereader() 7. if (rd. Read=True) Then 8. Response. redirect(â€Å"user_main. spx†) 9. else 10. Response. redirect(â€Å"error. aspx†) 11. end if 12. cn. close() 13. cmd. dispose() b. Union Query In union-query attacks, Attackers do this by injecting a statement of the form: UNION SELECT because the attackers completely control the second/injected query they can use that query to retrieve information from a specified table. The result of this attack is that th e database returns a dataset that is the union of the results of the original first query and the results of the injected second query. Example: An attacker could inject the text â€Å"’ UNION SELECT pass1 from user_info where LoginID=’secret – -† nto the login field, which produces the following query: SELECT pass1 FROM user_info WHERE loginID=’’ UNION SELECT pass1 from user_info where LoginID=’secret’ — AND pass1=’’ Assuming that there is no login equal to â€Å"†, the original first query returns the null set, whereas the second query returns data from the â€Å"user_info† table. In this case, the database would return column â€Å"pass1† for account â€Å"secret†. The database takes the results of these two queries, unions them, and returns them to the application. In many applications, the effect of this operation is that the value for â€Å"pass1† is displayed along with the account informationFigure 1: Example of . NET code implementation. 1. 2 Techniques of SQLIA’S Most of the attacks are not in isolated they are used together or sequentially, depending on the specific goals of the attacker. a. Tautologies Tautology-based attack is to inject code in one or more conditional statements so that they always evaluate to true. The most common usages of this technique are to bypass authentication pages and extract data. If the attack is successful when the code either displays all of the returned records or performs some action if at least one record is returned. Example: In this example attack, an attacker submits â€Å" ’ or 1=1 – -†The Query for Login mode is: SELECT * FROM user_info WHERE loginID=’’ or 1=1 – AND pass1=’’ The code injected in the conditional (OR 1=1) transforms the entire WHERE clause into a tautology the query evaluates to true for each row in the table and returns a ll of them. In our example, the returned set evaluates to a not null value, which causes the application to conclude that the user authentication was successful. Therefore, the application would invoke method user_main. aspx and to access the application [6] [7] [8]. c. Stored Procedures SQL Injection Attacks of this type try to execute stored procedures present in the database.Today, most database vendors ship databases with a standard set of stored procedures that extend the functionality of the database and allow for interaction with the operating system. Therefore, once an attacker determines which backend database is in use, SQLIAs can be crafted to execute stored procedures provided by that specific database, including procedures that interact with the operating system. It is a common misconception that using stored procedures to write Web applications renders them invulnerable to SQLIAs. Developers are often surprised to find that their stored procedures can be just as vulner able o attacks as their normal applications [18, 24]. Additionally, because stored procedures are often written in special scripting languages, they can contain other types of vulnerabilities, such as buffer overflows, that allow attackers to run arbitrary code on the server or escalate their privileges. CREATE PROCEDURE DBO. UserValid(@LoginID varchar2, @pass1 varchar2 AS EXEC(â€Å"SELECT * FROM user_info WHERE loginID=’† [email  protected]+ â€Å"’ and pass1=’† [email  protected]+ â€Å"’†);GO Example: This example demonstrates how a parameterized stored procedure can be exploited via an SQLIA. In the example, we assume that the query string constructed at ines 5, 6 and 7 of our example has been replaced by a call IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, January 2011 to the stored procedure defined in Figure 2. The stored procedure returns a true/false value to indicate whether the u ser’s credentials authenticated correctly. To launch an SQLIA, the attacker simply injects â€Å" ’ ; SHUTDOWN; –† into either the LoginID or pass1 fields. This injection causes the stored procedure to generate the following query: SELECT * FROM user_info WHERE loginID=’secret’ AND pass1=’; SHUTDOWN; -At this point, this attack works like a piggy-back attack.The first query is executed normally, and then the second, malicious query is executed, which results in a database shut down. This example shows that stored procedures can be vulnerable to the same range of attacks as traditional application code [6] [11] [12] [10] [13] [14] [15]. d. Extended stored procedures IIS(Internet Information Services) Reset There are several extended stored procedures that can cause permanent damage to a system[19]. Extended stored procedure can be executed by using login form with an injected command as the LoginId LoginId:';execmaster.. xp_xxx;-Passwo rd:[Anything] LoginId:';execmaster.. p_cmdshell'iisreset';-Password:[Anything] select password from user_info where LoginId=†; exec master.. xp_cmdshell ‘iisreset'; –‘ and Password=† This Attack is used to stop the service of the web server of particular Web application. Stored procedures primarily consist of SQL commands, while XPs can provide entirely new functions via their code. An attacker can take advantage of extended stored procedure by entering a suitable command. This is possible if there is no proper input validation. xp_cmdshell is a built-in extended stored procedure that allows the execution of arbitrary command lines. For example: exec master.. p_cmdshell ‘dir' will obtain a directory listing of the current working directory of the SQL Server process. In this example, the attacker may try entering the following input into a search form can be used for the attack. When the query string is parsed and sent to SQL Server, the server wi ll process the following code: SELECT * FROM user_info WHERE input text =† exec master.. xp_cmdshell LoginId /DELETE'–‘ 199 Here, the first single quote entered by the user closes the string and SQL Server executes the next SQL statements in the batch including a command to delete a LoginId to the user_info table in the database. . Alternate Encodings Alternate encodings do not provide any unique way to attack an application they are simply an enabling technique that allows attackers to evade detection and prevention techniques and exploit vulnerabilities that might not otherwise be exploitable. These evasion techniques are often necessary because a common defensive coding practice is to scan for certain known â€Å"bad characters,† such as single quotes and comment operators. To evade this defense, attackers have employed alternate methods of encoding their attack strings (e. g. , using hexadecimal, ASCII, and Unicode character encoding).Common scanning an d detection techniques do not try to evaluate all specially encoded strings, thus allowing these attacks to go undetected. Contributing to the problem is that different layers in an application have different ways of handling alternate encodings. The application may scan for certain types of escape characters that represent alternate encodings in its language domain. Another layer (e. g. , the database) may use different escape characters or even completely different ways of encoding. For example, a database could use the expression char(120) to represent an alternately-encoded character x†, but char(120) has no special meaning in the application language’s context. An effective code-based defense against alternate encodings is difficult to implement in practice because it requires developers to consider of all of the possible encodings that could affect a given query string as it passes through the different application layers. Therefore, attackers have been very succe ssful in using alternate encodings to conceal their attack strings. Example: Because every type of attack could be represented using an alternate encoding, here we simply provide an example of how esoteric an alternativelyencoded attack could appear.In this attack, the following text is injected into the login field: â€Å"secret’; exec(0x73687574646f776e) – – †. The resulting query generated by the application is: SELECT * FROM user_info WHERE loginID=’secret’; exec(char(0x73687574646f776e)) — AND pass1=’’ This example makes use of the char() function and of ASCII hexadecimal encoding. The char() function takes as a parameter an integer or hexadecimal encoding of a character and returns an instance of that character. The stream of numbers in the second part of the injection is the 200 IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. , January 2011 ASCII hexadecimal encoding of the strin g â€Å"SHUTDOWN. † Therefore, when the query is interpreted by the database, it would result in the execution, by the database, of the SHUTDOWN command. References: [6] f. Deny Database service This attack used in the websites to issue a denial of service by shutting down the SQL Server. A powerful command recognized by SQL Server is SHUTDOWN WITH NOWAIT [19]. This causes the server to shutdown, immediately stopping the Windows service. After this command has been issued, the service must be manually restarted by the administrator. select password from user_info whereLoginId=';shutdown with nowait; –‘ and Password='0' The ‘–‘ character sequence is the ‘single line comment' sequence in Transact – SQL, and the ‘;' character denotes the end of one query and the beginning of another. If he has used the default sa account, or has acquired the required privileges, SQL server will shut down, and will require a restart in order to f unction again. This attack is used to stop the database service of a particular web application. Select * from user_info where LoginId=’1;xp_cmdshell ‘format c:/q /yes ‘; drop database mydb; –AND pass1 = 0 This command is used to format the C: drive used by the ttacker. 2. Related Work There are existing techniques that can be used to detect and prevent input manipulation vulnerabilities. 2. 1 Web Vulnerability Scanning Web vulnerability scanners crawl and scan for web vulnerabilities by using software agents. These tools perform attacks against web applications, usually in a black-box fashion, and detect vulnerabilities by observing the applications’ response to the attacks [18]. However, without exact knowledge about the internal structure of applications, a black-box approach might not have enough test cases to reveal existing vulnerabilities and also have alse positives. 2. 2 Intrusion Detection System (IDS) Valeur and colleagues [17] propose the use of an Intrusion Detection System (IDS) to detect SQLIA. Their IDS system is based on a machine learning technique that is trained using a set of typical application queries. The technique builds models of the typical queries and then monitors the application at runtime to identify queries that do not match the model in that it builds expected query models and then checks dynamically-generated queries for compliance with the model. Their technique, however, like most techniques based on learning, can generate large umber of false positive in the absence of an optimal training set. Su and Wassermann [8] propose a solution to prevent SQLIAs by analyzing the parse tree of the statement, generating custom validation code, and wrapping the vulnerable statement in the validation code. They conducted a study using five real world web applications and applied their SQLCHECK wrapper to each application. They found that their wrapper stopped all of the SQLIAs in their attack set without g enerating any false positives. While their wrapper was effective in preventing SQLIAs with modern attack structures, we hope to shift the focus rom the structure of the attacks and onto removing the SQLIVs. 2. 3 Combined Static and Dynamic Analysis. AMNESIA is a model-based technique that combines static analysis and runtime monitoring [1][7]. In its static phase, AMNESIA uses static analysis to build models of the different types of queries an application can legally generate at each point of access to the database. In its dynamic phase, AMNESIA intercepts all queries before they are sent to the database and checks each query against the statically built models. Queries that violate the model are identified as SQLIA’s and prevented from executing on the database.In their evaluation, the authors have shown that this technique performs well against SQLIA’s. The primary limitation of this technique is that its success is dependent on the accuracy of its static analysis f or building query models. Certain types of code obfuscation or query development techniques could make this step less precise and result in both false positives and false negatives Livshits and Lam [16] use static analysis techniques to detect vulnerabilities in software. The basic approach is to use information flow techniques to detect when tainted input has been used to construct an SQL query. These ueries are then flagged as SQLIA vulnerabilities. The authors demonstrate the viability of their technique by using this approach to find security vulnerabilities in a benchmark suite. The primary limitation of this approach is that it can detect only known patterns of SQLIA’s and, IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, January 2011 because it uses a conservative analysis and has limited support for untainting operations, can generate a relatively high amount of false positives. Wassermann and Su propose an approach that uses stati c analysis combined with automated reasoning to verify that he SQL queries generated in the application layer cannot contain a tautology [9]. The primary drawback of this technique is that its scope is limited to detecting and preventing tautologies and cannot detect other types of attacks. 3. Proposed Technique This Technique is used to detect and prevent SQLIA’s with runtime monitoring. The solution insights behind the technique are that for each application, when the login page is redirected to our checking page, it was to detect and prevent SQL Injection attacks without stopping legitimate accesses. Moreover, this technique proved to be efficient, imposing only a low overhead on the Web pplications. The contribution of this work is as follows: A new automated technique for preventing SQLIA’s where no code modification required, Webservice which has the functions of db_2_XMLGenrerator and XPATH_ Validator such that it is an XML query language to select specific part s of an XML document. XPATH is simply the ability to traverse nodes from XML and obtain information. It is used for the temporary storage of sensitive data’s from the database, Active Guard model is used to detect and prevent SQL Injection attacks. Service Detector model allow the Authenticated or legitimate user to access the web applications.The SQLIA’s are captured by altered logical flow of the application. Innovative technique (figure:1) monitors dynamically generated queries with Active Guard model and Service Detector model at runtime and check them for compliance. If the Data Comparison violates the model then it represents potential SQLIA’s and prevented from executing on the database. This proposed technique consists of two filtration models to prevent SQLIA’S. 1) Active Guard filtration model 2) Service Detector filtration model. The steps are summarized and then describe them in more detail in following sections. a. Active Guard Filtration Mod elActive Guard Filtration Model in application layer build a Susceptibility detector to detect and prevent the Susceptibility characters or Meta characters to prevent the malicious attacks from accessing the data’s from database. b. Service Detector Filtration Model Service Detector Filtration Model in application layer validates user input from XPATH_Validator where the Sensitive data’s are stored from the Database at second 201 level filtration model. The user input fields compare with the data existed in XPATH_Validator if it is identical then the Authenticated /legitimate user is allowed to proceed. c. Web Service LayerWeb service builds two types of execution process that are DB_2_Xml generator and XPATH_ Validator. DB_2_Xml generator is used to create a separate temporary storage of Xml document from database where the Sensitive data’s are stored in XPATH_ Validator, The user input field from the Service Detector compare with the data existed in XPATH_ Val idator, if the data’s are similar XPATH_ Validator send a flag with the count iterator value = 1 to the Service Detector by signifying the user data is valid. Procedures Executed in Active Guard Function stripQuotes(ByVal strWords) stripQuotes = Replace(strWords, â€Å"‘†, â€Å"†Ã¢â‚¬ ) Return stripQuotesEnd Function Function killChars(ByVal strWords) Dim arr1 As New ArrayList arr1. Add(â€Å"select†) arr1. Add(â€Å"–â€Å") arr1. Add(â€Å"drop†) arr1. Add(â€Å";†) arr1. Add(â€Å"insert†) arr1. Add(â€Å"delete†) arr1. Add(â€Å"xp_†) arr1. Add(â€Å"‘†) Dim i As Integer For i = 0 To arr1. Count – 1 strWords = Replace(strWords, arr1. Item(i), â€Å"†, , , CompareMethod. Text) Next Return strWords End Function IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, January 2011 202 Figure 2: proposed Architecture Procedures Executed in Service D etector navi. Compile(â€Å"/Main_Tag/Details[LoginId='† & userName & â€Å"‘ and Password=† & Password & â€Å"]†) _Public Sub Db_2_XML() adapt=New SqlDataAdapter(â€Å"select LoginId,Password from user_info†, cn) Dim nodes As XPathNodeIterator = navi. Select(expr) Dim count2 As Integer = nodes. Count. ToString() Return count2 dst = New DataSet(â€Å"Main_Tag†) End Function adapt. Fill(dst, â€Å"Details†) dst. WriteXml(Server. MapPath(â€Å"XML_DATAXML_D ATA. xml†)) End Sub Procedures Executed in Web Service _ Public Function XPath_XML_Validation(ByVal userName As String, ByVal Password As Integer) As Integer Dim xpathdoc As New XPathDocument(Server. MapPath(â€Å"XML_DATAX ML_DATA. xml†)) Dim navi As XPathNavigator = xpathdoc. CreateNavigator() Dim expr As XPathExpression = . Identify hotspot This step performs a simple scanning of the application code to identify hotspots. Each hotspot will be verified with the Active Server to remove the susceptibility character the sample code (figure: 2) states two hotspots with a single query execution. (In . NET based applications, interactions with the database occur through calls to specific methods in the System. Data. Sqlclient namespace, 1 such as Sqlcommand- . ExecuteReader (String)) the hotspot is instrumented with monitor code, which matches dynamically generated queries against query models. If a generated query is matched with Active Guard, then it is onsidered an attack. 3. 1 Comparison of Data at Runtime Monitoring When a Web application fails to properly sanitize the parameters, which are passed to, dynamically created SQL statements (even when using parameterization techniques) it is possible for an attacker to alter the construction of back-end SQL statements. IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, January 2011 When an attacker is able to modify an SQL statement, the statement will execute with t he same rights as the application user; when using the SQL server to execute commands that interact with the operating system, the rocess will run with the same permissions as the component that executed the command (e. g. , database server, application server, or Web server), which is often highly privileged. Current technique (Figure: 1) append with Active Guard, to validate the user input fields to detect the Meta character and prevent the malicious attacker. Transact-SQL statements will be prohibited directly from user input. For each hotspot, statically build a Susceptibility detector in Active Guard to check any malicious strings or characters append SQL tokens (SQL keywords and operators), delimiters, or string tokens to the legitimate command.Concurrently in Web service the DB_2_Xml Generator generates a XML document from database and stored in X_PATH Validator. Service Detector receive the validated user input from Active Guard and send through the protocol SOAP (Simple Obj ect Access Protocol) to the web service from the web service the user input data compare with XML_Validator if it is identical the XML_Validator send a flag as a iterator count value = 1 to Service Detector through the SOAP protocol then the legitimate/valid user is Authenticated to access the web application, If the data mismatches the XML_Validator send a flag as a count alue = 0 to Service Detector through the SOAP protocol then the illegitimate/invalid user is not Authenticated to access the web application. In figure 3: In the existing technique query validation occur to validate a Authenticated user and the user directly access the database but in the current technique, there is no query validation . From the Active Guard the validated user input fields compare with the Service Detector where the Sensitive data is stored, db_2_XML Generator is used to generate a XML file and initialize to the class XPATH document the instance Navigator is used to search by using cursor in the selected XML document.With in the XPATH validator, Compile is a method which is used to match the element with the existing document. The navigator will be created in the xpathdocument using select method result will be redirected to the XPATH node iterator. The node iterator count value may be 1 or 0, If the flag value result in Service Detector as 1 then the user consider as Legitimate user and allowed to access the web application as the same the flag value result in Service Detector as 0 then the user consider as Malicious user and reject/discard from accessing the web application If the script builds an SQL query by concatenating hard-coded trings together with a string entered by the user, As long as injected SQL code is syntactically correct, tampering cannot be detected programmatically. String concatenation is the primary point of entry for script injection Therefore, 203 we Compare all user input carefully with Service Detector (Second filtration model). If the user input and Sensitive data’s are identical then executes constructed SQL commands in the Application server. Existing techniques directly allows accessing the database in database server after the Query validation. Web Service Oriented XPATH Authentication Technique does not allow directly to ccess database in database server. 4. EVALUATIONS The proposed technique is deployed and tried few trial runs on the web server. Table 1: SQLIA’S Prevention Accuracy SQL Injection Types Unprotected Protected 1. TAUTOLOGIES Not Prevented Prevented 2. PIGGY BACKED QUERIES Not Prevented Prevented 3. STORED PROCEDURE Not Prevented Prevented 4. ALTERNATIVE ENCODING Not Prevented Prevented 5. UNION Not Prevented Prevented Table 2: Execution Time comparison for proposed technique Total Number of Entries in Database Execution Time in Millisecond Existing Proposed Technique Technique 1000 1640000 46000 2000 1420000 93000 3000 1040000 6000 4000 1210000 62000 5000 1670000 78000 6000 1390000 107000 T he above given table 2 illustrate the execution time taken for the proposed technique with the existing technique. 4. 1 SQLIA Prevention Accuracy Both the protected and unprotected web Applications are tested using different types of SQLIA’s; namely use of Tautologies, Union, Piggy-Backed Queries, Inserting additional SQL statements, Second-order SQL injection and various other SQLIA s. Table 1 shows that the proposed technique prevented all types of SQLIA s in all cases. The proposed technique is thus a secure and robust solution to defend against SQLIA’sIJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, January 2011 204 4. 2 Execution Time at Runtime Validation The runtime validation incurs some overhead in terms of execution time at both the Web Service Oriented XPATH Authentication Technique and SQL-Query based Validation Technique. Taken a sample website ETransaction measured the extra computation time at the query validation, th is delay has been amplified in the graph (figure: 4 and figure:5) to distinguish between the Time delays using bar chart shows that the data validation in XML_Validator performs better than query validation.In Query validation(figure:5) the user input is generated as a query in script engine then it gets parsed in to separate tokens then the user input is compared with the statistical generated data if it is malicious generates error reporting. Web Service Oriented XPATH Authentication Technique (figure: 4) states that user input is generated as a query in script engine then it gets parsed in to separate tokens, and send through the protocol SOAP to Susceptibility Detector, then the validated user data is sequentially send to Service Detector through the protocol SOAP then the user input is ompared with the sensitive data, which is temporarily stored in dataset. If it is malicious data, it will be prevented otherwise the legitimate data is allowed to access the Web application. 5. C ONCLUSION SQL Injection Attacks attempts to modify the parameters of a Web-based application in order to alter the SQL statements that are parsed to retrieve data from the database. Any procedure that constructs SQL statements could potentially be vulnerable, as the diverse nature of SQL and the methods available for constructing it provide a wealth of coding options. 1800000 Execution time in Milli Sec 1600000 1400000 1200000 000000 Proposed Technique Existing Technique 800000 600000 400000 200000 0 1000 2000 3000 4000 5000 6000 Total Number of Entries in Database Figure4: Execution Time comparison for proposed technique (data validation in X-path) with existing technique The primary form of SQL injection consists of direct insertion of code into parameters that are concatenated with SQL commands and executed. This technique is used to detect and prevent the SQLI flaw (Susceptibility characters & exploiting SQL commands) in Susceptibility Detector and prevent the Susceptibility att acker Web Service Oriented XPATH Authentication Technique hecks the user input with valid database which is stored separately in XPATH and do not affect database directly then the validated user input field is allowed to access the web application as well as used to improve the performance of the server side validation This proposed technique was able to suitably classify the attacks that performed on the applications without blocking legitimate accesses to the database (i. e. , the technique produced neither false positives nor false negatives). These results show that our technique represents a promising approach to countering SQLIA’s and motivate further work in this irection References [1] William G. J. Halfond and Alessandro Orso , â€Å"AMNESIA: Analysis and Monitoring for Neutralizing SQLInjection Attacks†, ASE’05, November 7–11, 2005 [2] William G. J. Hal fond and Alessandro Orso, â€Å"A Classification of SQL injection attacks and countermeasure s†,proc IEEE int’l Symp. Secure Software Engg. , Mar. 2006. IJCSNS International Journal of Computer Science and Network Security, VOL. 11 No. 1, January 2011 [3] Muthuprasanna, Ke Wei, Suraj Kothari, â€Å"Eliminating SQL Injection Attacks – A TransparentDefenceMechanism†, SQL Injection Attacks Prof. Jim Whitehead CMPS 183. Spring 2006, May 17, 2006 4] William G. J. Hal fond, Alessandro Orso, â€Å"WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation IEEE Software Engineering, VOL. 34, NO. 1January/February 2008 [5] K. Beaver, â€Å"Achieving Sarbanes-Oxley compliance for Web applications†, http://www. spidynamics. com/support/whitepapers/, 2003 [6] C. Anley, â€Å"Advanced SQL Injection In SQL Server Applications,† White paper, Next Generation Security Software Ltd. , 2002. [7] W. G. J. Halfond and A. Orso, â€Å"Combining Static Analysis and Runtime Monitoring to Counter SQL Injection Attacks,† 3rd International Workshop on Dynamic Analysis, 2005, pp. – 7 [8] Z. Su and G. Wassermann, â€Å"The Essence of Command Injection Attacks in Web Applications,† 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2006, pp. 372-382. [9] G. Wassermann and Z. Su. An Analysis Framework for Security in Web Applications. In Proceedings of the FSE Workshop on Specification and Verification of componentBased Systems (SAVCBS 2004), pages 70–78, 2004. [10] P. Finnigan, â€Å"SQL Injection and Oracle – Parts 1 & 2,† Technical Report, Security Focus, November 2002. http://securityfocus. com/infocus/1644 [11] F. Bouma, â€Å"Stored Procedures are Bad, O’kay,† Technical report,Asp. Net Weblogs, November 2003. http://weblogs. asp. net/fbouma/archive/2003/11/18/38178. as px. [12] E. M. Fayo, â€Å"Advanced SQL Injection in Oracle Databases,† Technical report, Argeniss Information Security, Black Hat Briefings, Black Hat USA, 2 005. [13] C. A. Mackay, â€Å"SQL Injection Attacks and Some Tips on How to Prevent them,† Technical report, The Code Project, January 2005. http://www. codeproject. com/cs/database/ qlInjectionAttacks. asp. [14] S. McDonald. SQL Injection: Modes of attack, defense, and why it matters. White paper, GovernmentSecurity. org, April 2002. http://www. governmentsecurity. rg/articles/SQLInjectionM odesofAttackDefenceandWhyItMatters. php [15] S. Labs. SQL Injection. White paper, SPI Dynamics, Inc. ,2002. http://www. spidynamics. com/assets/documents/Whitepaper SQLInjection. pdf. [16] V. B. Livshits and M. S. Lam. Finding Security Errors in Java Programs with Static Analysis. In Proceedings of the 14th Usenix Security Symposium, pages 271–286, Aug. 2005. [17] F. Valeur and D. Mutz and G. Vigna â€Å"A Learning-Based Approach to the Detection of SQL Attacks,† In Proceedings of the Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA), July 20 05. [18] Kals, S. Kirda, E. , Kruegel, C. , and Jovanovic, N. 2006. SecuBat: a web vulnerability scanner. In Proceedings of the 205 15th International Conference on World Wide Web. WWW '06. ACM Press, pp. 247-256. [19] Sql injection – HSC Guides – Web App Security Written by Ethical Hacker sunday, 17 February 2008. http://sqlinjections. blogspot. com/2009/04/sql-injection-hscguides-web-app. html. Prof. E. Ramaraj is presently working as a Technology Advisor, Madurai Kamaraj University, Madurai, Tamilnadu, India on lien from Director, computer centre at Alagappa university, Karaikudi. He has 22 years teaching experience and 8 years esearch experience. He has presented research papers in more than 50 national and international conferences and published more than 55 papers in national and international journals. His research areas include Data mining, software engineering, database and network security. B. Indrani received the B. Sc. degree in Computer Science, in 2002; t he M. Sc. degree in Computer Science and Information Technology, in 2004. She had completed M. Phil. in Computer Science. She worked as a Research Assistant in Smart and Secure Environment Lab under IIT, Madras. Her current research interests include Database Security.

Friday, November 8, 2019

bio shizz Essay

bio shizz Essay bio shizz Essay Tempera and PH Effects on Enzyme’s Catalyze Reactions Introduction Enzymes are proteins and polymers of amino acids. Amino acids are organic compounds that contain two groups of atoms identified as â€Å"amino group and carboxylic acid group† (Encyclopedia of Science, 5 Oct. 2013). Enzymes are billions of years old and are the end result of various chemical reactions. Richard Wolfenden, a biochemistry professor at the University of Ohio, explains that unique enzymes are needed to perform a particular function, such as chemical reactions and evolution processes. For example, DNA and RNA strands require the participation of enzymes to make them complete, and without these, the process would take millions of years. Wolfenden discovered that they contribute to a substance evolution that would take place in milliseconds versus two billion years in their absence. Chemical reactions performed by enzymes vary in weight. The scale starts at 10,000 Daltons, which is a unit of mass in the atomic units system, and it reaches 1,000,000. He highlights in h is research that for synthetic chemical reactions, the starting scale is reflected to be very substantial; therefore, enzymes are very unique. Enzymes that carry out â€Å"nuclear magnetic resonance spectroscopy† activities are singled out because they make it possible to see and study their movements that otherwise would be concealed (ScienceDaily, 6 Oct. 2013). Biologists have succeeded in reproducing chemical reactions in the lab to slow them down, and that helps them manufacture inhibitor drugs for different diseases such as high blood pressure. In our body, enzymes come together in greater numbers on the cells where they catalyze a reaction; therefore, examining a blood serum sample helps identify a disease because â€Å"damaged enzymes leak into the circulation from damaged cells and tissues† (Encyclopedia Britannica, 5 Oct. 2013). Energy must be present for chemical reactions to be manifested, and the amount of time varies if enzymes are involved in the process. In addition, they catalyze or speed up reactions. Although energy is needed to start the reaction, it would take less time and less energy to complete it if catalysts are present. Some forms of energy are heat and electricity, but our body uses cellular respiration to collect chemical energy from the food we eat and change it to ATP energy that all cells need to work. We cannot live without enzymes because they are responsible for â€Å"thousands of chemical reactions† needed to perform various tasks in our body (Encyclopedia of Science, 5 Oct. 2013). Every life form that makes oxygen also makes Hydrogen Peroxide, which is a â€Å"bi-product of some chemical reactions† (Enzymes, 5 Oct. 2013). The human body produces catalase enzymes that get rid of this bi-product by transforming it into water and oxygen that cells use, otherwise cells wo uld be harmed. Primarily, proteins are created of amino acids, which respond to each other and come together, forming a strand that has a â€Å"tridimensional shape† (Encyclopedia of Science, 5 Oct. 2013). This shape makes it possible for proteins to join other molecules matching their own shape. Substrates are molecules that attach to enzymes and can be broken down by these during chemical reactions. Catalyst reactions do not destroy the enzymes; for this reason, they do this process over and over again. Usually, a reaction is blocked by a â€Å"small regulatory molecule† that join an enzyme in sites other than the active site, changing the enzyme’s shape and it no longer fits into its substrate (Encyclopedia Britannica, 5 Oct. 2013). This concept is recognized as induce-fit theory that states that the â€Å"binding of substrates† either start or impede a reaction. The intent of these trials was to find out the degree of catalyze reaction as enzymes are exposed to different solutions as well as temperature effects. It is important to know how enzymes work and to know how they are affected by their surroundings because

Wednesday, November 6, 2019

Free Essays on ManMirror

â€Å"Oh would some Power the giftie give us To see ourselves as others see us! ‘It would from many a blunder free us, And foolish notion.† ~ Robert Burns The lyrics of â€Å"Man in the Mirror† sung by Michael Jackson, written to examine how one can make a difference, but a closer look into the concept of self- awareness really starts with the age-old question, â€Å"Who am I?† Johari’s Window is based on the principle that of all the things about us that exist can be found through positive and honest information. The theory consists of four windowpanes. This visual is monumental in grasping the true message of observation and trust, or does it? Johari’s first pane, â€Å"the arena,† embraces the notion that if I tell you about me and you tell me about you, this shared information is the basis for all our mutual dealings with each other. This comfort zone provides effective communication, by trusting, understanding and confronting issues â€Å"the arena† is maximized. The larger the area, the more it dominates negative panes in his window. The second pane believes that some information will be known to us but not to the people we deal with. This is the pane, better known as â€Å"Mask,† encourages us to engage in game playing, trickery, and the like. The larger this pane, the less chance we have of developing true relationships with others because such relationships are usually based heavily on trust. Pane three is potentially dangerous because there is information known by others, that we do not know about ourselves. Called the â€Å"Blind- spot,† we risk exposing weakness not known to us and can be exploited by others. Finally the forth pane, â€Å"the great unknown,† describes a special place that is secret. It is a source, for the most part, of personal creativity and other resources, which we may never have even suspected. Although one might see this theory as the least threatening, it real... Free Essays on ManMirror Free Essays on ManMirror â€Å"Oh would some Power the giftie give us To see ourselves as others see us! ‘It would from many a blunder free us, And foolish notion.† ~ Robert Burns The lyrics of â€Å"Man in the Mirror† sung by Michael Jackson, written to examine how one can make a difference, but a closer look into the concept of self- awareness really starts with the age-old question, â€Å"Who am I?† Johari’s Window is based on the principle that of all the things about us that exist can be found through positive and honest information. The theory consists of four windowpanes. This visual is monumental in grasping the true message of observation and trust, or does it? Johari’s first pane, â€Å"the arena,† embraces the notion that if I tell you about me and you tell me about you, this shared information is the basis for all our mutual dealings with each other. This comfort zone provides effective communication, by trusting, understanding and confronting issues â€Å"the arena† is maximized. The larger the area, the more it dominates negative panes in his window. The second pane believes that some information will be known to us but not to the people we deal with. This is the pane, better known as â€Å"Mask,† encourages us to engage in game playing, trickery, and the like. The larger this pane, the less chance we have of developing true relationships with others because such relationships are usually based heavily on trust. Pane three is potentially dangerous because there is information known by others, that we do not know about ourselves. Called the â€Å"Blind- spot,† we risk exposing weakness not known to us and can be exploited by others. Finally the forth pane, â€Å"the great unknown,† describes a special place that is secret. It is a source, for the most part, of personal creativity and other resources, which we may never have even suspected. Although one might see this theory as the least threatening, it real...

Monday, November 4, 2019

Geology and the Environment Research Paper Example | Topics and Well Written Essays - 1000 words

Geology and the Environment - Research Paper Example The paper outlines the perspective of using solar power as the future source of energy, compared to coal-mining industry. As the world gets bigger, as economies get larger, as the human population increases, the demand for energy also amplifies. Everyone wants the maximum amount of energy that can be produced; over the centuries, man has found numerous ways to bring power into their lives, ranging from combustion of fossil fuels, to wind power. This essay will compare and contrast two of these possible energy sources, coal with solar energy, and attempt to find out which source produces energy in the most effective and desirable way. Solar power is more environmental friendly as compared to power released from coal, in terms of the physical effects it has on the environment. As mentioned earlier, solar power is generated using only radiation from the sun; we receive sunlight every single day on earth, and solar panels only have to capture this radiation and convert it into power to u se. Generating power using coal, however, requires coal to be dug out from the ground. There are several ways of extracting coal from the ground, including strip mining, surface mining, open pit mining, mountain top removal. These types of mining inflict tremendous amount of damage to the environment since they involve the complete destruction of all trees, mountains, rivers, anything that is in the vicinity of the coal mine. Mining for coal can also lead to the pollution of the air and water bodies near the coal mine. (Shah, 2011); toxic materials from the mining process can get washed away into rivers or lakes that are near the mining site ("Coal," page 8). Also, the removal of trees can lead to increased chances of landslides and subsidence ("Coal," page 4). All in all, the process of extracting coal leaves behind a barren, ugly landscape, whereas solar power is generated in a way that does not harm the physical environment. Solar power also means no more grid systems (Whitburn, no date). Solar power can be generated using solar panels that are attached onto the roofs of houses, there is no need to be connected to electrical grids to receive power. This feature of solar power is particularly useful to the people living in isolated areas far away from electrical grid, since it means they no longer have to face the problem of "frequent power-cuts," and expensive electricity, (Whitburn, no date). Indeed, this "transmission infrastructure," is the  "major culprit  behind skyrocketing electricity prices"; also, reliance on off-grid solar power means that the 7 - 10%  line loss  that occurs as power is being transmitted along the power lines, can be avoided, (Land use: Solar Power Vs. Coal Fired Electricity Generation, 2010). Energy produced by coal however, does require the support of grid systems to transfer it to people. How do people working in the coal mining and solar

Friday, November 1, 2019

Ibn Jubayr and Islam in the West Assignment Example | Topics and Well Written Essays - 250 words

Ibn Jubayr and Islam in the West - Assignment Example Menocal (2002) notes that he therefore wanted to show the importance of Islam in his bid to woo more people into it and salvage the situation (p. 54-61). Across his travels, Jubayr points at the practices which were being practiced yet they were not acceptable in the Muslim teachings. For example, while talking about the Palemo Muslims, he notes that they have teachers in their Madrasas yet the same practiced as merchants. He condemned the act. It is important to note that Jubayr condemns most Christian practices and personalities. According to Bush-Joseph (2012), for instance he describes King Baldwin IV and his mother as pig and sow respectively due to their actions in maintaining Jerusalem and Acre under Christian control (p. 43). However, he shows religious tolerance when describing King William whom he says is admirable for his just conduct (p. 44). This shows that his condemnation of some Christian aspects is not biased as he is fast to note when there is anything to be commended about the same group. Looking at his work, he has critically addressed the significant of the Muslim religion in the west during his travels and interaction with the