Wednesday, May 14, 2014

Final Presentation

Here is the link to the Final Presentation Slides
https://docs.google.com/presentation/d/1rPqEydO4Z9Aiyt0YhA6171P2kjyeXlnW7nI3oPUSYtg/edit?usp=sharing

Here is the link to the presentation video:
https://www.youtube.com/watch?v=sSVO2ld81qM







So I have some final words. I used screen-o-matic to do my presentation but somehow managed to fit everything in 15 minutes. Time flies by fast when presenting. So I hope the ending part where I showcased my app didn't feel rushed. If it did, then let me clarify it in writing. I was presenting what the program looks like when a ping is successful and when its not. If it pings the target successfully, it means that you haven't set it up to block unwanted pings and shows port vulnerabilities. If an error page is shown, it could mean a few things. The Ip address does not exist, it does exist but it might have dropped the test packet (it happens sometimes), or that you set up the router/host to drop unwanted pings in which case good job!

Wednesday, May 7, 2014

Network Security App Presentation

Before I begin on my rants, here is the link to the presentation

https://docs.google.com/presentation/d/1rPqEydO4Z9Aiyt0YhA6171P2kjyeXlnW7nI3oPUSYtg/edit?usp=sharing

My plan for the presentation is to describe what I put on the slides. I don't like it when people read off the slides (unless the situation calls for it) and then move onto the next slide. So I will read off the slides, but then I'll discuss beyond that.

Half of the time during the presentation I want to discuss how I got the idea for it, and my journey on working on this program. That will be done through the topics on the slides. The other half I would like to show case the program. Show the viewers how it works, what it does, and the program behind the app. So that's not on a slide, so I'm going to record the screen on a web browser and show case the app

At the end of the discussion I want to tell the audience what I learned, what I need to learn to take this App to the next level, and ending remarks.

Thank you for taking the time to read my blog post.


Thursday, May 1, 2014

Client Again

So I did not meet with my client. I contacted HPU twice. They said they would get back to me but never did. So I have nothing to report. I would imagine that we would have gone over the potential risks of certain aspects of the idea of the program (not sure but they are educated enough to tell me).

Statues update:
Home page is basic, buttons don't work. Program doesn't function the way it should. Having trouble with the basic ideas, and hope to overcome them. It's embarrassing to state what I'd like the program to do and not reach it.

I'm attempting baby steps, like getting ruby to ping another computer , now I just do that in a loop and that's a basic ping attack. A testing mechanism for the program.

Lets see how that goes, next once that's done I can attempt to get program to see IP addresses on network before the mapping network portion of program.

Thursday, April 17, 2014

Lofi Diagram

Here is the image of the lofi diagram


So all my items fit on a single page. At the top of the screen will display the program name "Network Security", at least until I find a better name. There will be three buttons called map lan, test security, user on lan. Each button does there each individual job and when the job is complete, it will display the information on the box below labeled output.

Here is the video of me explaining. I'm talking softly because everyone around me is sleeping and I didn't want to wake them up.


Wednesday, March 26, 2014

User Cases

Hello there and welcome to my blog post. Today I will just post my user cases in a school project of mine.

here are the cases:

So in terms of security for a university its great to understand the process of enrolling. Students can go straight into a university however foreign students need to go through background checks. Registrar personnel have access to system that allows them to override classes where as student access is limited

Here is the link, it explains it much clearer with the pictures provided:
https://docs.google.com/drawings/d/1mJ7aDFj1FGqhwgLvXC28gRl8J7RHG1SldWGoPUjnIw4/edit?usp=sharing

Please don't abuse it guys. E-mail seems to be the primary source of communication at the university I want to work with. They haven't replied back though, again.


Activity Diagram

Hello there. Thank you for reading my post. In this blog I'm going to post a link here to my personal activity diagram to a school project.

I don't know how to post all images from the website but it looks something like this.

E-mail contact -> E-mail reply -> create plan -> deliver plan -> get decision.

Here is the link for a better understanding:
https://docs.google.com/document/d/1ODahvb5QCZEnkvHd687IlZXtkSEp6F1jWTAlYuqIHLk/edit?usp=sharing

Since its a school, I assume they use paper, e-mails, and white boards. I would assume that they use e-mail for primary use of communication. Phones are used, only among staff members.

My meeting notes are short. The staff only replied to my e-mail once. I replied back, but heard no response. I'm assuming that they have not taken my considerations seriously.  Time will tell.


Wednesday, February 26, 2014

My Interview Plan

Setting: The major stakeholder for the IT defense App are the investors, the students, and teachers. I would have to send an e-mail first, probably talking in an office after

Interview plan: I would plan to ask the following questions in the interview Does the university allow students to work with the IT department? Can a student be allowed to work on code that Setting: The major stakeholder for the IT defense App are the investors, the students, and teachers Interview plan: I would plan to ask the following questions in the interview Does the university allow students to work with the IT department? Can a student be allowed to work on code that requires higher security access? Do you know if there is a chain of command in the university that I need to go through in order to make this project? Do you have any suggestions on how we could improve the system or feature requests? Do you have any questions on the reality of this project?

 Followup plan: I would send an e-mail the day after and check up on the progress of my request. If however they denied it on the first try, I would have to find a different company. If I can't I will work on it myself I guess. With a completed version I could show companies a demo and find one that would be willing to improve on it with me

Thursday, February 20, 2014

Stakeholders

DDoS Defense System

Stakeholders
- user (another obvious reason, it benefits the company)
- The company (an obvious reason)
- IT department (an obvious reason since the IT department will be the most skilled and qualified to understand how to use the system properly)

I have expanded on this idea to include defense. Not sure how but i'll think of something. Probably detects irregular pinging. I'm doing more research on it.

Calender Project

Stakeholdes
- The company (duh)
- the user (duh)
- manager (the manager benefits the most since they are the ones responsible for keeping track of vacation days, etc)
- employees (employees are the ones requesting vacation days)

Since this project is something I did in the past. I would like to expand on it.

Mass e-mail program

Stakeholders
- User (yes)
- Marketing Department (they are the ones to most likely use the program as the program is intended for guerrilla marketing)
- Company (program benefits the company)

I have given up on this idea since I would be creating a basic version of mailchimp, and mailchinp is a vast program with lots of benefits that outweigh my own.

Tuesday, February 18, 2014

HPU on DDoS system

I would like to reach out to HPU on my project.

HPU is consistently trying to improve their systems security. I would know this because I tried to attack them last year. Sadly with failure.

I understand there is a chain of command that I have to go through first. I think I might bring it up with my adviser, and he could point me in the direction I would need to get this ball rolling. For example which department and who, or who would most likely allow me to test it out on their servers, etc.

I'm willing to negotiate all requirements for this.

I will try e-mailing my adviser and if I receive no reply within the week, I will talk to him about the idea.
Then I will discuss if there is a possibility at all. However if their is not with Patrick Eagle (my adviser), I will try a different route since this school is a chain and command. Next, I will contact Milika, a professor in the Computer Science Department and see if their is a different way I can do this.

If not, well then I'll just have to find a company.

Throughout this I will be civil and respectful of criticism in this idea from those I try to discuss this with, of course.

Sunday, February 2, 2014

Mass E-Mail Program (Project 3)

Mass E-Mail Program

Problem Description:
It must be tiring to send emails one by one to everyone you want to send and email. I propose creating a program that would end this strife. Even though their are programs like MailChimp, I would like to create a program that contains the barebones essential of MailChimp. I would like to create a program that sends out e-mails once a day, adds emails to the list, and best of all no human interaction. Once you press start the program will run everyday sending emails.

System Capabilities:
- Program should store and retrieve emails
- Sends emails based on the settings (once a day, hour, minute, etc)
- able to change the email you send
- can be improved with basic AI

Business Benefits:
- easy to send emails
- Allows for Guerilla Marketing through emails
- No interaction with program whatsoever

DDoS System (Project 2)

DDoS System

Problem Description:
Over the past months, I've noticed an increase in DDoS attacks (Distributed Denial of Service Attacks). The one that got the most attention of course would be the DDoS attack on the League Of Legends Server in North America (where many of United States players play the game). For those of you who don't know League of legends is an online game where people play against each other mainly in teams of 5v5. The attack on the server lasted an entire day leaving all of North America unable to play for a day. I believe its possible to recreate a system that does the same thing on a smaller scale, for small businesses who can't afford the programmers and technicians that a big company like LOL can. I thought this would be a cool idea to recreate a system. 

System Capabilities:
- Able to disrupt internet connections of local companies, house routers, and universities.
- Mac addresses and IP addresses should be untraceable
- Attacks should last no more than 1-2 hours (enough to disrupt but not kill productivity of the "victim")

Business Benefits:
- Edge over competition
- Fun to use

Vacation Organizer (Project 1)

Vacation Organizer System

Problem Description:
I have already worked on this in the past. I would like to add on to this program what I couldn't do last year in a similar class. The problem with many companies is that they don't have an app that allows the user to store employee vacation dates. Its normally done on paper, as it doesn't require much and the employee tends to remind the manager that their vacation day is coming up (as employees never forget). So I built an app that stores the information, I did not store a process in which the manager and employee are sent e-mails to remind them of upcoming and finished vacation days. 

System Capabilities:
- Program should store and retrieve vacation date info
- Displays built in Calender
- Sends e-mail to individual and owner of reminders of upcoming vacation dates.
- Sends e-mail to manager and employee that vacation days are over.

Business Benefits:
- Ease of mind
- Improves vacation cordination
- Maintain correct info of data

Sunday, January 26, 2014

Aspects of Blogging


The internet has revolutionized all aspects of life. Before the internet, humans needed to gather information through newspapers, television, and most importantly word of mouth. The internet however has made all of those obsolete.  With just a click of the button we are able to get our news from the comfort of our homes.

Blogs are important because, unlike old medium such as television, the user owns the content. Their is an old saying in the television, he who controls the pipeline controls the content. This is tired and true, especially for news media such as CNN, MSNBC, and FOXNEWS. Since users own their blogs, they are free to post content they see as fit. In other words you control the content that you allow the world to see.

Blogging also adds other benefits for the user.
You'll become a better writer. As long as you constantly post things, you'll notice that stringing sentences together become easier. Almost fluid.
You’ll become a better thinker. Since the process of writing is putting thoughts on paper, the same applies with typing words on a computer. The more you do it, the easier words flow into your head as you type out what you want to say.
On top of that blogging is like your personal journal for the world to see, you'll gain confidence as you write what you think knowing its open for the world to see, and above all else it's free.