Featured post

How to decode Tag-Length-Value Quickly

Basically, in TLV, the format is Tag, Length, and Value. In the list of protocols, TLV is one of the types. Transmitting the data depends on the protocol you used. However, many financial transactions still follow the TLV format. According to IBM, TLV data is three parts. The tag tells what type of data it is. The length field has a length of the value. The Value field has actual value.

Structure of TLV.TLV comprises three field values.  TagLengthValueEMV formulated different tags. They have their own meanings. Usually, the Tag and Length together takes 1 to 4 bytes.
The Best example for TLV.In the below example, you can find the sample TAG, LENGTH, and VALUE fields.

[Tag][Value Length][Value] (ex. "9F4005F000F0A001")
where

Tag Name = 9F40

Value Length (in bytes) = 05 
Value (Hex representation of bytes. Example, "F0" – 1-byte) = F000F0A001

In the above message, tag 9F40 has some meaning designed by EMV company. Here you can find a list of EMV Tags.
How to read the TLVTag: 1…

Cloud Computing: AWS Tutorial for Beginners

What you can do with AWS
  • Store public or private data.
  • Host a static website.These websites use client-side technologies (such as HTML, CSS, and JavaScript) to display content that doesn't change frequently. A static website doesn't require server-side technologies (such as PHP and ASP.NET).
  • Host a dynamic website, or web app. These websites include classic three-tier applications, with web, application, and database tiers.
  • Support students or online training programs.
  • Process business and scientific data.
  • Handle peak loads.
AWS (Amazon Web services different features)

AWS Management Console A web interface. To get started, see the Getting Started with the AWS Management Console. 

AWS Command Line Interface (AWS CLI) Commands for a broad set of AWS products.To get started, see AWS Command Line Interface User Guide. Command Line Tools Commands for individual AWS products. 

For more information, see Command Line Tools. AWS Software Development Kits (SDK) APIs that are specific to your programming language or platform. For more information, see SDKs.

Basics of AWS and its features explained for beginner cloud computing engineers.


Query APIs Low-level APIs that you access using HTTP requests. For more information, see the API documentation for each service. 


Global Security Features in AWS
  • Physical access to AWS data centers is strictly controlled, monitored, and audited.
  • Access to the AWS network is strictly controlled, monitored, and audited.
  • You can manage the security credentials that enable users to access your AWS account using AWS Identity and Access Management (IAM).You can create fine-grained permissions to AWS resources and apply them to users or groups of users.
  • You can apply ACL-type permissions on your data and can also use encryption of data at rest.
  • You can set up a virtual private cloud (VPC), which is a virtual network that is logically isolated from other virtual networks in the AWS cloud.You can control whether the network is directly routable to the Internet.
  • You control and configure the operating system on your virtual server.
  • You can set up a security group, which acts as a virtual firewall to control the inbound and outbound traffic for your virtual servers.
  • You can specify a key pair when you launch your virtual server, which is used to encrypt your login information. When you log in to your virtual server, you must present the private key of the key pair to decrypt the login information.

Comments

Popular posts from this blog

Hyperledger Fabric: 20 Real Interview Questions

How to Fix Python Syntax Errors Quickly

Tokenization: Vault based Vs Vault-less