status code
Recently Published Documents


TOTAL DOCUMENTS

40
(FIVE YEARS 24)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
Vol 4 (2) ◽  
pp. 41-45
Author(s):  
Raflis Raflis ◽  
Mia Gusnita

Code-Mixing can occur in all circles of society or social status. Code-mixing found in a language, someone cannot prevent code-mixing. The speaker usually speaks two languages and speaker put words or phrase from other languages in the speech or it can be said that code-mixing can occur in direct or indirect situation. Code-Mixing is the change of one language or two languages into another language. Code-mixing can occur in spoken or written text. Therefore, the researcher wants to know the code mixing contained in selected podcast. This study uses Pieter Mueysken's theory of insertion, alternation, and congruent lexicalization. Researcher used qualitative methods. The purpose of this research is to divide the types and explain code mixing based on reasons and factors. After collecting all the data, the researcher found 257 utterances that contain of code-mixing. Code-mixing contained in the insertion there were 158 data 61, 5%), 81 data of alternation (31, 5%), 18 data of congruent lexicalization (7, 0%). Talking about particular topic there were 3 data (1, 17%), empathy about something there were 4 data (1, 55%), repetition used clarificarion there were 12 data (4, 67%). Message intrinsic factor 2 data (0, 77%).


Author(s):  
Vraj Vishnubhai Patel ◽  
Dr. Priyanka Sharma ◽  
Jatin Patel

A subdomain is a domain that is a part of another domain. Subdomains are used to organize and navigate to various parts of your website. For example, your primary domain could be “xyz.com,” while your blog could be on a subdomain at “blog.xyz.com.” A subdomain takeover occurs when an attacker gains control over a subdomain of a target domain. Sub-domain takeover vulnerability occurs When a subdomain (subdomain.example.com) that refers to a service (eg GitHub, AWS / S3, ..) is deleted or deleted In this way, the attacker can create pages on the service in use and forward the pages to this subdomain.. If any person wants to take over, a subdomain then the person seeks to manually check one by one subdomain that takes too much time. Moreover, are there some tools available to check the subdomain takeover is possible or not? However, these tools take input as a text file, which has a particular subdomain. This means finding a subdomain with the other tools and then using one of these tools to identify subdomain takeover vulnerability. In my tools, we find the subdomain of a particular domain, then check the CNAME is available for a list of subdomains and if CNAME finds for a specific subdomain, then check the status code of the CNAME if it returns 404-status code. We might say that a particular subdomain is possible to takeover.


2020 ◽  
Author(s):  
Moses Okello

This Paper presents improvement and extension of previous methodology about timing steganography based on network steganography. The previous article uses time interval between two successive transmissions mixed with cryptography prior to hiding. However this improvement tend to extend and provide new methods based on time format such as hours, minutes, second, millisecond and Nanosecond etc. It further examine how to handle effect of different time zone and high precision timing for ultrafast timing such as millisecond, Nanoseconds, picosecond, femtosecond which human action is too slow for perfect timing. In addition, the extension based on TCP-IP status codes where each elements of set of status code are index and the index represents certain numeric of combination for hiding. Finally, the cryptography method is improved and extended to series based cryptography with any defined number of different cryptographic methods combined altogether with multiple keys generated dynamically. The methods for both cryptography and steganography was integrated and each module carefully tested for their feasibility and appropriate analysis, comparisons is presented too.<br>


2020 ◽  
Author(s):  
Moses Okello

This Paper presents improvement and extension of previous methodology about timing steganography based on network steganography. The previous article uses time interval between two successive transmissions mixed with cryptography prior to hiding. However this improvement tend to extend and provide new methods based on time format such as hours, minutes, second, millisecond and Nanosecond etc. It further examine how to handle effect of different time zone and high precision timing for ultrafast timing such as millisecond, Nanoseconds, picosecond, femtosecond which human action is too slow for perfect timing. In addition, the extension based on TCP-IP status codes where each elements of set of status code are index and the index represents certain numeric of combination for hiding. Finally, the cryptography method is improved and extended to series based cryptography with any defined number of different cryptographic methods combined altogether with multiple keys generated dynamically. The methods for both cryptography and steganography was integrated and each module carefully tested for their feasibility and appropriate analysis, comparisons is presented too.<br>


Sign in / Sign up

Export Citation Format

Share Document