PROJECTS

International Students and Refugees

The Rewards of Cultural Exchange and Support

Posted At: 2016-05-10 04:00:00

Edited At: 2016-05-10 04:00:00

<p>Volunteering as an International Student Ambassador at my school is one of the most rewarding things I have ever done. I enjoy spending time with International Students and have volunteered as an International Student Ambassador for the past three years.</p>
<p>Researching cultural differences is a vital part of being an Ambassador, to help International Students properly integrate in Canadian society you need context. Every student has challenges, and researching helps point out culture shock from personal feelings. It is very rewarding supporting students from other countries. In my spare time, after becoming an Ambassador, I study Japanese and will be interested in taking a course at Saint Mary's University.</p>
<p>Recently, I have helped in welcoming refugee families to our community. I was asked by my Multicultural Club leader if my family would be translators for sponsoring churches in my area. They said yes, and although I cannot speak Arabic well, I understand the culture and am very proud to be a part of the welcoming committee and volunteer for the sponsor of the Hill Grove Baptist Church.</p>
<h3>Final Thoughts</h3>
<p>I found out so much about the world and I still have so much a want to learn, It's the thing that keeps every day, a great day. I am looking forward to the rest of my life, there is nothing more inspiring than, finding out about the world around you. I want an adventure. If I had never decided to be an ambassador, I think my life would have been a very sad one, filled with sameness, but now I’m surrounded by very different cultures every day, I love my life.</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Sort List Dynamically

This program sorts a list of up to ten integers. After each integer is added to the list, this program will sort the list using pointers and a bubble sort algorithm.

Posted At: 2024-02-13 17:00:00

Edited At: 2024-02-13 17:00:00

<p>This blog post explores sorting algorithms in C, focusing on the dynamic sorting of integer lists.</p><p>Let's start by looking at the <strong>getList</strong> function:</p>{code_snippet_id=1}<p>Now, let's examine the <strong>sort</strong> function:</p>{code_snippet_id=2}<p>Lastly, the <strong>getInteger</strong> function:</p>{code_snippet_id=3}<p>This concludes our exploration of sorting in C.</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Sensors

This Android application uses gravity and touch. The goal of the game is to have the circle or Ball object (which is controlled either via sensors or by touch) have contact with the Blue Square. Once the ball interacts with the Blue Square, the 'Win' scor

Posted At: 2020-01-22 05:00:00

Edited At: 2024-02-13 17:00:00

<p>Note: One of the Pink Squares is controlled via sensors, whereas the rest are controlled to move horizontally.</p><h3>CODE: BoucingBallView.java</h3><p>The method onDraw(canvas) continuously detects for a collision and responds.</p><p>The method onTouch(event) detects users' touch and resets the location of the Ball and the Goal object. The Ball's location will be based on the location of the users' touch, whereas the Goal object's location is based on a random number value within a specified range.</p><h3>CODE: Square.java</h3><p>This Class creates a Square object with shape, location, speed, and acceleration.</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Server Hardening

Windows 2016 Server Security is an important issue when planning network deployment and architecture. Understanding what needs to be done to ensure security is an important step.

Posted At: 2020-01-09 05:00:00

Edited At: 2024-02-13 17:00:00

<p>What is Server Hardening?</p><p>Server Hardening simply means to expand the level of security on a server.</p><h3>Security problems with a Basic Installation of Windows 2016 Server.</h3><p>“When you install Windows Server 2016 by using the Server Core installation option, the print spooler is installed and starts by default even when the Print Server role is not installed. To avoid this, after the first boot, set the print spooler to the disabled.”</p><p>Protect newly installed machines from hostile network traffic until the operating system is installed and hardened. Harden each new server in a DMZ network that is not open to the internet.</p><p>Enable automatic notification of patch availability. Whenever a patch is released, it should be analyzed, tested and applied in a timely manner using WSUS or SCCM.</p><p>Ensure that all appropriate patches, hotfixes and service packs are applied promptly. Security patches resolve known vulnerabilities that attackers could otherwise exploit to compromise a system. After you install Windows Server, immediately update it with the latest patches via WSUS or SCCM.</p><p>Set a BIOS/firmware password to prevent unauthorized changes to the server startup settings.</p><h3>10 steps to harden a Windows 2016 Server.</h3><p>Require complex passwords to sign-up, and a lockout after 5 attempts. Go to window server click tools then Groups and Users, create a user password or set requirements for that user.</p><p>Use a secure admin workstation. Secure Boot, restrict administrator access, and AppLocker.</p><p>Encrypt volumes (disks) and folders, so only users can have access. Built-in encryption programs (Bitlocker) or third-party encryption programs (VeraCrypt, AxCrypt or Gpg4win)</p><p>Keep servers patched and updated. Test patches prior to deployment.</p><p>Use credential guard, to stop password theft. Enable ‘Hyper-V Hypervisor’ and ‘Isolated User Mode’ in Windows features, then in Local Group Policy Editor ‘Turn on Virtualization Based Security’ (link)</p><p>Protecting servers from malware. Third-party software, and scheduled scans</p><p>Restrict software without a valid digital signature. To check, in the file explorer left-click file then click the Digital Signatures tab.</p><p>Disable local administrator account, on all PCs. Go to window server click tools then Groups and Users.</p><p>Monitor Active Directory Events, such as password attempts, removal of protective software. Install SCOM</p><p>Use DNS services and MAC filtering to block malicious domains. Install services such as Win shark</p><h3>Notable Software:</h3><p>Upguard - Checks if systems are securely configured and protects users against outages and breaches.</p><p>Attack Surface Analyzer - Views changes in the attack surface, evaluates the risk of a piece of software and gains summaries about the state of your system's security.</p><p>CIS Microsoft Windows Server 2008 R2 Benchmark (Level 1) - Server hardening that meets government, and industry standards and has secure configuration (Pre-configuration).</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Android Google Maps App

This project is a Google Maps API application, with custom markers and map drawing.

Posted At: 2019-12-18 05:00:00

Edited At: 2019-02-18 05:00:00

<p>All Google Maps platform APIs and SDKs require a valid API key to be sent with all requests. An API key is a unique string that allows Google to identify who's requesting access to the platform and verify that they have permission to do so.</p><p>The API key can also tell Google Maps your restrictions to limit how it is used. On Google Maps restricting API keys is optional but highly recommended since they help keep your account secure, preventing unauthorized use and quota theft.</p><h3>Move Camera</h3><p>Move Map Camera to Focus on Nova Scotia</p><h4>CODE:</h4><pre>// Add your code here for moving the map camera to Nova Scotia</pre><h3>Add Markers</h3><p>Add Markers for three NSCC locations</p><h4>CODE:</h4><pre>// Add your code here for adding markers for three NSCC locations</pre><h3>Draw a Circle</h3><p>Draw a circle around COGS marker</p><h4>CODE:</h4><pre>// Add your code here for drawing a circle around COGS marker</pre>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Movie Reviews Using MongoDB

Analyzes thousands of users' movie reviews using MongoDB.

Posted At: 2019-11-27 05:00:00

Edited At: 2024-02-13 17:00:00

<p>This blog post analyzes thousands of users' movie reviews using MongoDB.</p>
<h3>worstMovies(score, noRevs)</h3>
<p>The following program takes in the number of ratings and the rating value to determine the 'worst' movies. The arguments entered help create rules for how low a movie's average rating can be to be considered bad and the minimum number of reviews a movie needs to count as a highly reviewed movie.</p>
<h4>CODE:</h4>{code_snippet_id=1}

<h3>avgMovieRating()</h3>
<p>The following program finds the average review for all movies in the database.</p>
<h4>CODE:</h4>{code_snippet_id=2}

<h3>whtWatching(userid)</h3>
<p>The following program uses the given user id to find out what they have been reviewing.</p>
<h4>CODE:</h4>{code_snippet_id=3}
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Bookkeeping and Automation

On Tuesday, November 19, 2019, I attended an event titled 'Pathfinder: Bookkeeping & Tax: Automation' where Julie Walters, the founder of Pathfinder spoke about how to automate bookkeeping. The topics discussed are listed below.

Posted At: 2019-11-19 05:00:00

Edited At: 2019-11-19 05:00:00

<p>Bank Reconciliations</p><p>The process of proving that your balance indicated on your accounting software matches your bank statements.</p><p>To Reconcile Your Bank Account:</p><p>Print off both your bank statements and bank ledger</p><p>Compare the two documents, check off the items that match to do this make sure the following matches; transaction number, date, type (i.e. withdraw, deposit, check fee, etc.) and amount.</p><p>Review unchecked items.</p><p>If you have unchecked items on your bank statement, then transactions are not yet posted.</p><p>If you have unchecked items on your bank ledger, this issue can occur from outstanding checks or deposits (or both).</p><p>NOTE: Example Accounting Software to use includes QuickBooks and Accountant.</p><p>Bank Feeds</p><p>Many of the major banks in Canada are able to communicate directly with accounting software, this process often takes around 20 minutes after a transaction occurs.</p><p>Once the transaction occurs in your accounting software you must tell the software what to do with this information. For example, should it be ignored or added to your records? if you choose to add the record you need to tell the software what to do with this information i.e. what is it for or if the item has HST on it.</p><p>Receipt & Statement Storage</p><p>In Canada, you should keep your bookkeeping and accounting records the first seven years, this includes final reports, ledgers, sales invoices, receipts, checks stubs, and bank statements.</p><p>Some software to help store these documents are Hubdoc, Receipt Bank and Auto Entry.</p><p>Workflow & Project Management</p><p>Workflow includes more than the typical steps in project management. Workflow encompasses things like customer history, invoicing, time tracking and chat/email.</p><p>Example software to use is monday.com, basecamp.com, dubsado.com and 7hats.com.</p><p>Bibliography</p><p><a href="www.pathfinderbookkeeping.ca/">www.pathfinderbookkeeping.ca/</a></p><p><a href="hubdoc.com">hubdoc.com</a></p><p><a href="www.autoentry.com/">www.autoentry.com/</a></p><p><a href="quickbooks.intuit.com">quickbooks.intuit.com</a></p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

IT Generalist First Year

Short Term: Pass all my courses, for the first year of IT Generalist. This will be a goal that I will regularly monitor my grades to make sure I am on track.

Posted At: 2018-10-30 04:00:00

Edited At: 2018-10-30 04:00:00

<p>Specific</p><p>By September 2019 I would like to pass all first-year IT Generalist courses by studying and making sure my grades are around 80%.</p><p>Measurable</p><p>To quantify my progress I would be making sure my grades are around 80%, via resources such as Brightspace.</p><p>Achievable</p><p>If my grades decline, I could get discouraged and not ask for help even if I need it. I will realize this pattern in myself and look at tests/assignments for any problems that are incorrect and learn how to fix them for next time.</p><p>A good marker would be for my grades to be around 80% to track when I may need to ask for help.</p><p>Relevant</p><p>This goal is very relevant for my life, for me to be an IT Generalist I must pass the program. Other goals in my life can be moved around for this goal.</p><p>Time-bound</p><p>December 2018: Pass semester 1</p><p>April 2019: Pass semester 2</p><p>Aug 2019: Pass semester 3</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Remain Current in IT

Long-term Goal: Remain current in IT. By regularly attending IT events and researching trends regularly.

Posted At: 2018-10-30 04:00:00

Edited At: 2018-10-30 04:00:00

<p>Specific</p><p>I wish to stay current in IT by finding out what the current technology and skills companies in my field are looking for. This will be accomplished at work or home. I may become stagnant in IT which can cause me to no longer research new ways of accomplishing tasks. I am setting this goal, so I may remain current in my career.</p><p>Measurable</p><p>I will have monthly reminders to look-up new IT related solutions to problems.</p><p>Achievable</p><p>Working in IT I can only imagine that a worker gets used to using the same pieces of tech to do the same job, without seeing if there is anything better for the circumstance. I want to avoid being out of date and doing anything inefficient as much as possible by;</p><ul><li>Getting to know others who are in the same industry as me.</li><li>Follow technology blogs.</li><li>Actively search for new ways to solve problems.</li></ul><p>Relevant</p><p>Remaining current in IT is very important to my career and goals.</p><p>Time-bound</p><p>There is no clear time this goal will be finished or is their checkpoints however, I will have monthly reminders to look-up new IT related solutions to problems.</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Computer Science Degree

Mid-Range Goal: Graduate with a computer science degree from Dalhousie University, by regularly monitoring grades for each semester.

Posted At: 2018-11-14 05:00:00

Edited At: 2018-11-14 05:00:00

<p>Specific</p><p>After I graduate from IT Generalist, I wish to graduate with a computer science degree from Dalhousie University, due to the school's articulation agreement this should be accomplished in two years.</p><p>Measurable</p><p>To quantify my progress I would be making sure my grades are around 80%, via resources such as Brightspace.</p><p>Achievable</p><p>If my grades decline, I could get discouraged and not ask for help even if I need it. I will realize this pattern in myself and look at tests/assignments for any problems that are incorrect and learn how to fix them for next time.</p><p>A good marker would be for my grades to be around 80% to track when I may need to ask for help.</p><p>Relevant</p><p>Many jobs ask for a degree/certificate in IT and universities tend to have a large selection of electives that are IT related. This goal is very relevant to what I wish to do. I enjoy setting-up websites and making programs, but I would also like to learn about things like the hardware of computers and how to take computers apart.</p><p>Time-bound</p><p>2021 Graduate IT Programming in NSCC December 2020: Pass semester 1 April 2022: Pass semester 2 December 2022: Pass semester 1 April 2023: Pass semester 2 Graduate</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

IT Generalist and the Future

Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 18

Posted At: 2018-12-03 05:00:00

Edited At: 2018-12-03 05:00:00


I attended Saint Mary’s University in 2017 with the intention of graduating from the Bachelor of Commerce program. During the second semester, I realized that I did not enjoy theory-based learning, instead, I needed to find a program that interested me more and that was rewarding. In the summer of 2018, I learned about the IT Generalist course at NSCC on the Burridge campus. I felt had the patience and organization skills, to succeed in an IT-related field. After graduating from the IT Generalist program, I hope to have a job in programming. I see myself in five years as a software engineer.
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Study Topic: Excel

Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 18

Posted At: 2019-01-21 05:00:00

Edited At: 2019-01-21 05:00:00


I have chosen to research Microsoft Excel’s functions and features. Excel is a spreadsheet program made by Microsoft for manipulating data. Excel can organize, calculate and display data and charts.

I have chosen to research Excel because I find that it would serve as a very useful skill in potential IT-related jobs. Most small organizations can not afford to hire a data analysis and an IT Programmer, so understanding how spreadsheets work and how to create them is an extremely important asset.

Resources I plan on using for my study are;

LinkedIn Learning also is known as Lydia.com, as my main resource for research. LinkedIn Learning is an educational video platform that is taught by industry experts.

Support Center, Excel Help. Support Center is a source for Microsoft client’s questions to be answered and moderated by Microsoft employees.

Stack Overflow. Stack Overflow is a great tool for troubleshooting a wide range of programming and data issues. Stack Overflow is an educational website, where others in the same field can help resolve a user’s inquiry. I have used this tool many times when searching programming inquires.

YouTube, there are many YouTube videos created by educators that explain how to accomplish Excel specific goals.

Topics I will be covering in this report are;

Skills and Expectations for my study.

Timeline for study and case study finalization.

A descriptor for the use of Excel features.

A descriptor for the use of Excel formulas.

How I will assess my learning, Final Assessment.

?I look forward to completing a self-directed study for this course, ICOM 3010. In this proposal, I will include a rationale for my topic, the resources I plan on utilizing, and the skills I plan on acquiring after my study. I have developed a timeline and an assessment tool in the form of case studies to allow me to be evaluated in this self-directed course.

Skills and Expectations
I believe my current skills in programming will help me be successful in researching Microsoft Excel. I have a strong interest and skill in programming and find programming and Excel are very similar. Both programming and Excel software deals primarily with having a set script language for functions and manipulating variables by utilizing preset functions. Because I find a great number of similarities in programming and Excel, I believe my programming experience will help me greatly in my research.
I expect throughout this study to be able to learn to use Microsoft Excel to create formulas, functions, and macros, to a level that I could pass information off to a data user to complete their daily tasks.
Timeline
I have broken down my study into two main topics, functions and features that will be accomplished at different periods of time. Each week, we are given 4 hours to complete research for our study, that I have set research goals for. I will stop many times during my study to assess what I have learned and see how I can create a spreadsheet to show my learning, see Appendix 1 for details. The five spreadsheets will be created from detailed case studies describing who will be using the data and its purpose to the user or organization.
Features
Excel Features make viewing important spreadsheet entries easier through the use of headers/footers and conditional formatting. Excel features can also help users see trends in data via graphs, sparklines, and trendlines.
Formulas
One very important topic I will be studying is formulas, a large part of creating business professional spreadsheets is utilizing formulas. Excel formulas are often used to perform automated math operations to data in the spreadsheet.
Final Assessment
I will deliver my final assessment in the form of five case studies. These case studies will explore a user or organization that will benefit from visualizing data, examples being office supplies cost, seat capacity for a week and payment/interest budget. I will be assessed on how well I was able to create a detailed spreadsheet based on the predetermined wants and needs of the data user.

By following this detailed proposal commencing January 21, 2019, I will begin to research functions and features in Microsoft Excel. In between studying new concepts, I will begin creating spreadsheets based on case studies. The case studies will be accurate representations of new learning. In the research process, I will be using LinkedIn Learning as a resource. The completed case studies will be used as an assessment tool for the evaluation of my learning.
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Skills Inventory: Updated 12.12.2018

Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 18

Posted At: 2019-04-19 04:00:00

Edited At: 2019-04-19 04:00:00


Listed below is a list of skills I have demonstrated since enrolling in the IT Generalist program.

Information Technology Skills:
- Design and build database management system with MySQL
- Observe and update data using the appropriate technology
- Essential skills to develop and maintain a website
- Two years with experience working with Python, HTML, and CSS languages.
- Two years with experience working with Linux and Windows operating systems.
- Use a range of software technologies (e.g. e-mail, MS Word, Excel)
- Build Local Area Networks
- Manage server virtualization with cloud services

Miscellaneous Skills:
- WHMIS and OHS certificate
- Demonstrate interest, effort, and attention to detail
- Committed to assisting others.
- Assess a situation and identify the root cause of its problem
- Work independently or as part of a team
- Continuously monitor the success of a project or task and identify ways to improve
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Organizations Structure

Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 18

Posted At: 2019-02-28 05:00:00

Edited At: 2019-02-28 05:00:00


Understanding how organizational archetypes work is imperative to understand the organization you are working for, and whether the organization prioritizes money or employee behaviour. In this document, I discuss the five archetypes of organizational culture, organization charts, business models and business cycles.

The Five Archetypes of Organizational Culture
The five archetypes of organizational culture are:

1. Customer-Centric Culture

A customer-centric culture is a way of doing business, where customer experiences are at the forth-most importance of an organization’s decisions. The most important part of a customer-centric strategy is for an organization to listen to customers' feedback with an open mind, and learn from it by putting it to action.

Employees of a customer-centric organization must think of how to intentionally think about how to improve customer experience, this can be accomplished in 3 steps:

Look for opportunities to make the organization better for customers.

Look at the opportunity, as something you can accomplish.

Finally, do something to bring the opportunity to life.

2. One-Team Culture

One-team culture is a Japanese-style way of doing business, where the main interest of the organization is to have employees work in a group to achieve goals. One-team culture is built on sharing, trust, perspective leaning, openness and the belief that people generally have good motives.

3. Innovation Culture
The culture of innovation is a way of doing business, where the main interest of the organization is to encourage innovation within the organization. Encouragement of openness in learning, risk-taking, and curiosity are all attributes of innovation culture.

4. Achievement Culture
The culture of achievement is a way of doing business, where the main interest of the organization is to achieve goals. Achievement culture is built on accountability, healthy confrontation, communication and truthfulness.

5. People-first Culture
The people-first culture is a way of doing business, where the main interest is treating employees well. A people-first culture is built on trust, second chances, training, opportunity and a lack of hierarchy. Because the employees in people first culture tend to be treated well, people-first culture creates a culture of loyalty and better performance overall.

Table 1 Example of an organizational chart used to chart employment ranks.

Organizational Charts
An organizational chart is a diagram that structures an organization's relationship with its positions. Organization charts can be used to chart the organization's workforce, and staff performance. For an example of an organizational chart for a gaming company, See Table 1.

Business Models
Business models show how an organization earns money, by creating and viewing an organization's economic value. Business models are very important for an organization to make decisions based on trends represented in its business model. The business model structure can change greatly depending on the organization's preferences. An example of what a business model would measure would be cost and revenue over a period of time.

Business Cycle
The business cycle represents an organization's rise and fall of GDP occurring over time. It is important for organizations to understand their trends in a business cycle, this way organizations can make sensible management decisions where finance is considered.

The four phases in the business cycle are:

Expansion phase: Expansion represents when economic growth strengthens. Expansion happens between trough and peak

Peak phase: Peak happens when expansion moves into the contraction phase.

Contraction phase: Contraction represents when economic growth is weakening. Contraction happens between peak and trough.

Trough phase: Peak happens when contraction moves into the expansion phase.
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Excel Progress Report

Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 18

Posted At: 2019-02-26 05:00:00

Edited At: 2019-02-26 05:00:00


As planned my study began on January 26, 2019, thus far I have learned about Excel's functions and created two case studies based on my knowledge.
Topics I will be covering in this report are;
• Analysis of Study
• Expectations


As of now February 23, 2019, I am directly on track with my study, currently, I am transitioning from researching Excel’s functions to learning about its basic features.
During the week of January 23, 2019, I studied functions SUM, COUNT, AVERAGE, MAX, MIN and
ROUND respectively. The week of February 02, 2019, I created a case study that describes an air travel company’s flights over a period of seven days detailing the volume of passengers. Statistics are based on daily flight capacity, were created from using functions that I learned from the week prior. Another area I focused on during the week of February 02, 2019 was learning functions IF and SUMIF. In keeping with my work plan, the week of February 09, 2019, I researched functions COUNTA, PMT, IFERROR, VLOOKUP and HLOOKUP.
Finally, on the week of February 16, 2019, I started my most recent case study that creates statistics on students based upon the grades achieved in a course. Statistics are created using the functions I’ve learned in the study thus far.
Analysis of the Study
In my opinion, I have completed fifty percent of my goal, thus far because I have completed four of the nine learning objectives I have set out for this study. It is now February 23, 2019, I have created two case studies based on my study of Excel’s functions. In keeping with my schedule, I will be beginning to learn about basic features, such as doing math with dates, headers/footers, and how to switch between relative, absolute, and mixed cells. On April 09, 2019, I would have created 5 case studies, two based on Excel's functions and three based on Excel's features.
Expectations
Going forward if there is a task not completed on schedule, my plan completes the task, on the weekend following the set time frame, this way I do not fall far behind in my study.
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Networking

In career fields networking is one of the most important skills to have. Here I will share an example of a networking event I attend hosted by Juliana Kroscen, a UX/UI Designer at HomeExcept. Where I learned very important skills to have when developing s

Posted At: 2019-04-07 04:00:00

Edited At: 2019-04-07 04:00:00

<h2>The Importance of Networking and HomeExcept Event</h2>

<p>In career fields, networking is one of the most important skills to have. Here I will share an example of a networking event I attended hosted by Juliana Kroscen, a UX/UI Designer at HomeExcept, where I learned very important skills for developing software.</p>

<h3>The Importance of Networking</h3>
<p>Networking is the act of getting to know people in your line of work, and it is a critical skill for all professions. To remain current, people in the IT branch should look at the skills employers are seeking and the preferred skills in their field. After identifying the most important skills to acquire, plan how to obtain them through online tutorials, workshops, classes, and volunteering. Networking is crucial to my career field because the ideas and skills it teaches will help me stay relevant.</p>

<p>Networking plays a significant role in job searches; in 2016, 70% of people were hired at a company based on connections within the organization. Building your personal network can be done by meeting new people, attending meetings and events, and joining online networks on websites such as LinkedIn, where users in the same field can interact.</p>

<h3>HomeExcept</h3>
<p>On Friday, January 18, 2019, I attended an event called ‘Customer Focused Design: The Story of HomeExcept,’ where Juliana Kroscen, a UX/UI Designer at HomeExcept, spoke about creating an app for users. This event was recommended to me by one of my teachers due to my interest in programming. HomeExcept allows the user to monitor a dwelling or business without the use of a camera, using sensors to detect activity in the home. This app is popular with grown adults who want to monitor their parents' well-being. Learning about the process of how HomeExcept creates an app and a product for their market was very useful.</p>

<p>Some of the steps HomeExcept took to create a market-focused product/app are:</p>
<ul>
<li><strong>Privacy:</strong> This product allows the user to monitor a room/building without the use of cameras, ensuring the privacy of the people inside the monitored space.</li>
<li><strong>Ease of Use:</strong> HomeExcept simplified its app, making it easy to use, focusing on what users really needed.</li>
<li><strong>User Persona:</strong> Creating a specific type of person who would use the product and evaluating how useful the product would be to them.</li>
<li><strong>Pencil before Pixels before Development:</strong> Before creating something digitally, it is essential to sketch it out. Before development, creating a digital prototype and gathering user feedback is crucial to saving costs.</li>
<li><strong>Prototyping:</strong> HomeExcept uses Invision, a prototype tool, to create clickable prototypes for their app.</li>
</ul>

<p>Reflecting on what I have learned, networking is an immensely important asset to have. By having an actual industry app designer visit NSCC, I was able to gain perspective on what is involved in designing software, whereas before, I was only able to see the process as a software developer. Now I can understand all the ups and downs one must take when creating software.</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Volunteer Work at a Technology Repair Company for Field Experience

From June 23, 2019, to August 04, 2019, I volunteered at a technology repair company named "Ram Computers", where I completed the following tasks:

Posted At: 2019-08-22 04:00:00

Edited At: 2024-02-14 20:10:25

<h2>Volunteer Work at a Technology Repair Company for Field Experience</h2>

<p>From June 23, 2019, to August 04, 2019, I volunteered at a technology repair company named "Ram Computers", where I completed the following tasks:</p>

<ul>
<li>Set-up Routers.</li>
<li>Clean computers of any potential viruses / malware / spyware / cookies.</li>
<li>Set-up and manage a Facebook page for a multitude of events.</li>
<li>Build a professional website with the following features: Shop Inventory, Contact, and Collapsible Common Questions.</li>
</ul>

<p>My experience at Ram Computers provided valuable field experience in technology repair and allowed me to contribute to various tasks, including router setups, computer maintenance, social media management, and website development. These hands-on experiences further enriched my skills and knowledge in the technology field.</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Skills Inventory: Excel

My research on Excel is now completed. Upon finalizing my goal, I realized that my research study has not only helped me understand Excel better but has also given me practical industry skills.

Posted At: 2019-04-14 04:00:00

Edited At: 2024-02-14 20:12:35

<ul>
<li><strong>Ability to use concepts across different disciplines:</strong> I am able to apply skills and knowledge from the past in new situations. I was able to utilize my programming skills when creating Excel spreadsheets during a project.</li>
<li><strong>Present data in a variety of formats and platforms:</strong> During a long-term project, I practiced data presenting skills by locating, gathering, and organizing information using a variety of technology.</li>
<li><strong>Research:</strong> I was able to research topics with an extensive range of sources with consistent and proper citations.</li>
<li><strong>Organization:</strong> I have strong organizational skills, as seen in my case studies. When creating my case studies, I had the ability to multitask and prioritize my workload, I was detail-oriented, and driven to achieve positive results.</li>
<li><strong>Self Management:</strong> I have practiced self-management skills, I was able to assess, weight, and manage risk during a long-term project.</li>
<li><strong>Time Management:</strong> Previously, I have practiced time management skills during a long-term project by setting time-bound goals, identifying strategies, and acting.</li>
<li><strong>Identify the root cause of a problem:</strong> I have practiced problem-solving skills during a long-term project. When I would receive unwanted outcomes, I assessed the situation, drawn the solution, tested and lastly, I would troubleshoot methods based on logic.</li>
<li><strong>Structure and Organize data:</strong> I was able to create Excel sheets that follow development processes, usability, and adhere to current industry standards. When I was creating my case studies, researching how to properly layout a document was very important to my success.</li>
<li><strong>Independence:</strong> I am able to work independently on projects. I have practiced independence skills during a long-term project where working alone was very important for my success.</li>
<li><strong>Communicate:</strong> In the past, when working on a product, I always make sure to ask questions to understand how others would like that product to look and function well.</li>
</ul>

<p>View some examples of Excel projects I've created <a href="http://dianah.infinityfreeapp.com/project_details.php?id=39">here</a>.</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

How to be Articulate; Interpersonal Communication

There are three major steps in being articulate, these are; sounding more intelligent, be more well-spoken and going the extra mile...

Posted At: 2019-10-02 04:00:00

Edited At: 2024-02-14 20:17:44

<h2>How to be Articulate; Interpersonal Communication</h2>

<p>There are three major steps in being articulate, these are; sounding more intelligent, be more well-spoken and going the extra mile.</p>

<h3>Be Informed</h3>
<ol>
<li><strong>Expatiate:</strong> Know about the subject matter of which you are explaining. If you are not well-versed in the subject matter, make sure to let others talk.</li>
<li><strong>Learn about alternate perspectives:</strong> When researching topics, it is good practice to understand where other theories and thought processes come from. Learning about other perspectives is great; you can be prepared for counter-arguments.</li>
<li><strong>Speak with passion:</strong> Have a desire to add something to a conversation.</li>
<li><strong>Speak carefully:</strong> Think about what you will say before you say it. Pausing can be a great tool in conveying a message, making the presenter seem more thoughtful and intelligent.</li>
<li><strong>Expand your vocabulary:</strong> This creates color in your speech. If you do not understand a word, make sure to research its meaning.</li>
<li><strong>Do not use slang:</strong> Speak in full sentences and do not use contractions.</li>
<li><strong>Use correct grammar:</strong> Example: do not use double negatives.</li>
<li><strong>Confidence:</strong> Accomplished by making eye contact, believing in your words, and speaking loud enough for people to understand you.</li>
<li><strong>Improve posture:</strong> Try not to hunch over. While talking, do not cross your arms over your chest or put your hands in your pockets.</li>
<li><strong>Be prepared:</strong> Prepare and rehearse what you will say. Study the presentation to a point where you can change it if needed.</li>
</ol>

<h3>Be Well-Spoken</h3>
<ol>
<li><strong>Be concise:</strong> Be specific about what point you are trying to make.</li>
<li><strong>Avoid verbal pauses:</strong> Verbal pauses detract from the presentation flow.</li>
<li><strong>Speak more slowly:</strong> This is beneficial when getting a message across to the audience. Speaking slowly shows that you are thinking about what you have to say and makes it clear to the audience.</li>
<li><strong>Use your hands:</strong> Use hands to direct your audience, like a maestro in a band. Talking with hands can add confidence to what you say.</li>
<li><strong>Limit distractions:</strong> Keep your phone on silent and stay in the moment, so you will not lose your train of thought.</li>
</ol>

<h3>Going the Extra Mile</h3>
<ol>
<li><strong>Expand your knowledge:</strong> Watch the news and read more books (both fiction and non-fiction).</li>
<li><strong>Learn about your Audience:</strong> To know your audience is important, so you can adjust your vocabulary and references accordingly.</li>
<li><strong>Tell a Story:</strong> Stories are a comfortable way to get a point across.</li>
<li><strong>Get Inspired by Others:</strong> Watch speeches and take notes.</li>
<li><strong>Make your Content more Interesting:</strong> Include stories and engage listeners.</li>
<li><strong>Join a Public Speaking Club:</strong> Surround yourself with people that have the same goals as you.</li>
</ol>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Skills Inventory: Updated 10.11.2019

Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 18

Posted At: 2019-10-11 04:00:00

Edited At: 2024-02-14 20:20:40

<h2>Skills Inventory: Updated 10.11.2019</h2>

<p><strong>Information Technology Skills:</strong></p>

<p><strong>Software Development Skills:</strong></p>
<ul>
<li>Over two years of experience working with Python and Java languages.</li>
<li>Conceptualize, develop, and test Android applications.</li>
<li>Practical experience programming in C++ and C#.</li>
<li>Capable of creating UML diagrams based on customer needs and process flows.</li>
</ul>

<p><strong>Database Skills:</strong></p>
<ul>
<li>Design and build database management systems with MySQL.</li>
<li>Strong understanding of source versioning tool, Git.</li>
<li>Observe and update data using the appropriate technology.</li>
</ul>

<p><strong>Website Development Skills:</strong></p>
<ul>
<li>Essential skills to develop and maintain a website.</li>
<li>Two years of experience working with HTML and CSS languages.</li>
</ul>

<p><strong>Networking Skills:</strong></p>
<ul>
<li>Build Local Area Networks.</li>
<li>Manage server virtualization with cloud services.</li>
</ul>

<p><strong>Other IT Related Skills:</strong></p>
<ul>
<li>Use a range of software technologies (e.g., Outlook, MS Word, Excel).</li>
<li>Two years of experience working with Linux and Windows operating systems.</li>
<li>Develop and maintain documentation appropriate for entry-level Information Technology professionals.</li>
</ul>

<p><strong>Miscellaneous Skills:</strong></p>
<ul>
<li>WHMIS and OHS certificate.</li>
<li>Demonstrate interest, effort, and attention to detail.</li>
<li>Committed to assisting others.</li>
<li>Assess a situation and identify the root cause of its problem.</li>
<li>Work independently or as part of a team.</li>
<li>Continuously monitor the success of a project or task and identify ways to improve.</li>
</ul>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Building Subnets

Subnetting is a big help when companies are wishing to relieve congestion on their network.

Posted At: 2019-05-24 04:00:00

Edited At: 2024-02-14 20:45:54

<h2>Building Subnets</h2>
<p>Subnetting is a big help when companies are wishing to relieve congestion on their network.</p>

<p>As an administrator, once you are given an IP address and subnet mask, you will be able to calculate information about the subnet.</p>

<h3>Creating Subnets</h3>

<p><strong>Typically Addressing Information Required for Network Devices</strong></p>
<p>The four pieces of addressing information that are typically required by every network device are the IP address, DNS address, gateway address, and network mask information.</p>

<p><strong>Purpose of the Network Masks</strong></p>
<p>The network mask identifies the range of IP addresses that can be used in a network. The network mask also works with an IP address to determine whether a packet should be sent locally or remotely, by using a bitwise AND operation.</p>

<!-- Continue with the content ... -->

<h3>Subnetting Examples</h3>

<!-- Include content for subnetting examples -->

Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Address Resolution Protocol

The purpose of this simulation exercise is to show how the ARP protocol interacts with devices in a network, and how ARP ensures that network devices are able to get information delivered on local LANs. This exercise also goes over how this service can be

Posted At: 2019-01-09 05:00:00

Edited At: 2024-02-14 20:55:55

<h3>Examining ARP at the Command Line</h3>
<ul>
<li>Delete static ARP entries in Windows Command Line</li>
<li>Issue an ARP command that will display all entries in the local ARP cache.</li>
<li>Issue a command to delete one of the ARP entries above.</li>
<li>Issue a command to delete all ARP cache entries.</li>
<li>View the ARP cache.</li>
<li>Add a static ARP entry for the network gateway using the entry you recorded above.</li>
<li>Flush the cache again.</li>
</ul>

<p>Now the static entries are deleted. Previously, flushing the ARP cache did not delete static entries, but now with the newest version of Windows 10, deleting the cache does delete the static entries as well. Here is a list of the commands used above:</p>

<table>
<tr><th>Command</th><th>Description</th></tr>
<tr><td>arp -a</td><td>Displays ARP cache</td></tr>
<tr><td>arp -d [IP address]</td><td>Deletes one entry</td></tr>
<tr><td>arp -d *</td><td>Deletes all cache entries</td></tr>
<tr><td>netsh interface ip delete arpcache</td><td>Displays ARP cache</td></tr>
<tr><td>arp -a</td><td>Creates a static entry</td></tr>
<tr><td>arp -s [IP address] [MAC Address (-) ]</td><td>Deletes all cache entries</td></tr>
</table>

<h3>How do different ARP Entries "Age Out"?</h3>
<p>A device's ARP cache will hold both static and dynamic ARP entries. A Static ARP entry is a permanent entry in your ARP cache that can be managed in Windows Command Prompt (Run as Administrator), where an Administrator can manually bind an IP address with a MAC address.</p>

<span> More content... </span>

<h3>Countering ARP Spoofing</h3>
<p>A possible layer of protection from ARP spoofing is offered by manually inputting static ARP entries. Manually inputting static entries creates a permanent entry in a device's ARP cache, that can help add a layer of protection from ARP spoofing. Another layer of protection against ARP spoofing is via a VPN. A VPN encrypts any online data that goes through it, to prevent hacks such as ARP spoofing.</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Navigating the Cybersecurity Landscape: Insights and Practices

Posted At: 2023-07-07 04:00:00

Edited At: 2024-02-14 21:38:32

<p>In the fast-paced world of cybersecurity, understanding the core principles and practices is vital for safeguarding digital assets. Let's explore key takeaways from recent exercises, shedding light on various aspects of cybersecurity.</p>

<h3>CIA Triangle: Safeguarding Data</h3>
<p>The CIA triangle encapsulates the core tenets of confidentiality, integrity, and availability. These principles form the bedrock of secure data management, ensuring that information is kept confidential, accurate, and accessible as needed.</p>

<h3>Defense in Depth: Layered Security Strategies</h3>
<p>Defense in Depth introduces a multi-layered approach to security. Beyond the foundational computer security, pillars such as Data Security and Network Security play crucial roles. This layered strategy aims to fortify defenses against diverse cyber threats.</p>

<h3>Human Element: Impact on Cybersecurity</h3>
<p>One recurring theme is the human factor and its significant role in cybersecurity. The video "What is your Password?" underscores the vulnerability arising from users' lack of awareness. Education and awareness initiatives become pivotal in addressing this potential weak link.</p>

<h3>Penetration Testing: Ensuring Security</h3>
<p>Penetration testing is a proactive measure to identify system vulnerabilities. Key elements include robust contracts that protect both the client and the analyst, and comprehensive reports that provide insights into vulnerabilities, empowering clients to enhance their security posture.</p>

<h3>Port Scanning: Unveiling Weaknesses</h3>
<p>Port scanning is a critical component of penetration testing, revealing open ports and services. While ethical hackers leverage this for system fortification, malicious actors exploit it for unauthorized access. Securing these entry points becomes paramount.</p>

<h3>Web Defacement: Unauthorized Alterations</h3>
<p>Web defacement involves unauthorized modifications to a website's content or appearance. The frequency of web servers being defaced is a stark reality, emphasizing the need for robust cybersecurity measures.</p>

<h3>Reconnaissance and Scanning: Enhancing Understanding</h3>
<p>Exercises in reconnaissance involve utilizing various tools like Google advanced searches, Wayback Machine, Netcraft, telnet, and Shodan.io. Scanning with Nmap unveils live hosts, operating systems, and services, providing practical insights into cybersecurity practices.</p>

<h3>Conclusion</h3>
<p>As we navigate the cybersecurity landscape, the insights gained from these exercises lay a strong foundation for implementing robust security measures. Stay tuned for more explorations into the evolving world of cybersecurity practices.</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

NAT

NAT or Network Address Translation was designed to prolong the use of IPV4 and delay the adoption of IPV6. NAT prolongs the use of IPV4 by translating multiple network addresses in a local network to one public network address. Without NAT, large corporat

Posted At: 2018-11-26 05:00:00

Edited At: 2024-02-14 21:00:01

<h3>Operation Of NAT</h3>
<p>NAT operates by translating the destination IP and port address going
out of a network and retranslates it coming back. NAT is able to send
information back to the proper devices by keeping a table internally, that
keeps track of what ports and what addresses are sending information.</p>

<h3>Example Steps:</h3>

<ol>
<li>When a private machine wishes to access a webpage. The device
will send a request to the webserver.</li>

<li>On the way to the web server, the request is sent to the gateway,
NAT will translate the source IP Address and source port number.
The IP Address will change to its gateway address and the port
address as a unique number that will be stored in a NAT table.</li>

<li>The packet will now be sent to the webserver.</li>

<li>The web server will send the webpage back to the gateway.</li>

<li>The gateway looks at its NAT table and translates information
back.</li>

<li>The packets will be sent to the receiving device.</li>
</ol>
</div>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Navigating Network Protocols: Insights and Practical Analysis

Posted At: 2024-07-10 04:00:00

Edited At: 2024-02-14 21:38:59

<p>In the dynamic realm of cybersecurity, understanding network protocols is essential for effective data communication. Here are key insights and practical analyses from an exploration into the intricacies of these protocols:</p>

<h3>1. TCP vs. UDP: Distinctive Communication Approaches</h3>
<p>TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) differ in their communication approaches. While TCP offers reliable, connection-oriented communication, UDP provides a more straightforward, connectionless approach without error checking or flow control.</p>

<h3>2. TCP/IP Model: Structuring Network Communication</h3>
<p>The TCP/IP model, comprising the Application Layer, Transport Layer, Internet Layer, and Network Interface Layer, serves as a structured framework for comprehending the intricacies of network communication.</p>

<h3>3. Wireshark: Unveiling Network Traffic Dynamics</h3>
<p>Wireshark stands out as a powerful packet sniffer, enabling real-time analysis of network activities. The tool reveals insights into HTTP and FTP traffic, emphasizing the significance of secure data transmission practices, especially in the context of clear-text protocols.</p>

<h3>4. IP and TCP Protocols: Core Functions</h3>
<p>The Internet Protocol (IP) plays a pivotal role in addressing and routing data packets across networks. Simultaneously, the Transmission Control Protocol (TCP) ensures reliable, connection-oriented communication through handshakes and acknowledgment flags.</p>

<h3>5. Sockets: Bridging Computer Nodes</h3>
<p>Sockets, formed by port numbers and IP addresses, facilitate communication between computer nodes. They allow applications on different devices to establish communication by specifying destination IP addresses and port numbers.</p>

<h3>6. Network ID (NID) and Host ID (HID) in IP Addresses</h3>
<p>Breaking down IP addresses, the Network ID (NID) encompasses the first 16 bits, while the Host ID (HID) identifies the specific device within the network.</p>

<!-- Include the rest of the points similarly -->

<h3>15. ARP Protocol: Resolving IP to MAC</h3>
<p>The Address Resolution Protocol (ARP) plays a crucial role in resolving IP addresses to corresponding MAC addresses on a local network.</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Safeguarding Digital Communication: An In-Depth Exploration of Encryption and Cybersecurity Practices

Posted At: 2023-07-16 04:00:00

Edited At: 2024-02-14 21:39:19

<p>In the rapidly evolving realm of cybersecurity, the comprehension of encryption and related practices is paramount to fortifying digital communication against ever-present threats. This comprehensive exploration seeks to unravel key concepts and considerations in the dynamic field of encryption, providing a nuanced understanding of its role in securing the digital landscape.</p>

<h3>1. Encryption Fundamentals:</h3>
<p>At the heart of cybersecurity lies encryption, a powerful technique that transforms readable data (plaintext) into an unintelligible format (ciphertext). Employing intricate algorithms and cryptographic keys, encryption stands as the bedrock for ensuring data confidentiality and shielding sensitive information from unauthorized access.</p>

<h3>2. Symmetric vs. Asymmetric Encryption:</h3>
<p>Diving deeper, the distinction between symmetric and asymmetric encryption becomes apparent. Symmetric encryption hinges on a single shared key for both encryption and decryption, offering speed but necessitating secure key distribution. In contrast, asymmetric encryption introduces a pair of keys – a public key for encryption and a private key for decryption – fostering a more secure key management process at the expense of speed.</p>

<!-- Include the rest of the points similarly -->

<h3>7. Challenges and PKI Protection:</h3>
<p>The potential creation of false certificates poses a significant threat to cybersecurity. In instances of certificate forgery, browsers display security warnings. To counteract this threat, Public Key Infrastructure (PKI) emerges as a safeguard, ensuring the authenticity of certificates through digital signatures from trusted certificate authorities. The browser's verification of these digital signatures provides a robust defense against fraudulent certificates.</p>

<p>In summation, this in-depth exploration underscores the critical role of encryption and related practices in fortifying digital communication. By unraveling the intricacies of these concepts, individuals and organizations are equipped to navigate the complexities of the cybersecurity landscape, fostering a resilient and secure online environment.</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Unraveling the Depths of Cybersecurity: A Journey through Network Protocols, Exploits, and SQL Injection

Posted At: 2023-07-20 04:00:00

Edited At: 2024-02-14 21:39:29

<p>In the ever-evolving landscape of cybersecurity, it is imperative to delve into the intricate realms of network protocols, exploits, and vulnerabilities. This blog post serves as a comprehensive guide, drawing insights from hands-on exercises and exploring the nuances of cybersecurity practices.</p>

<h3>Navigating Network Protocols: Insights and Practical Analysis</h3>
<p>Understanding network protocols is the cornerstone of effective data communication. From the distinctive approaches of TCP and UDP to the structured framework of the TCP/IP model, this section unveils the dynamics of communication in the digital realm. Wireshark, a powerful packet sniffer, takes center stage, revealing the significance of secure data transmission practices, especially in clear-text protocols.</p>

<!-- Include the rest of the sections similarly -->

<h3>Conclusion: Empowering Cybersecurity Enthusiasts</h3>
<p>As we conclude this journey through network protocols, exploits, and database vulnerabilities, it is evident that cybersecurity is a multifaceted field. Empowering enthusiasts to navigate this landscape, the blog encourages continuous learning, hands-on practice, and a vigilant approach to securing digital ecosystems. Whether you are a beginner or a seasoned professional, the quest for knowledge and mastery in cybersecurity is a never-ending expedition.</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Mastering Linux Security: Permissions, Scans, and SSH Exploits

Posted At: 2023-07-24 04:00:00

Edited At: 2024-02-14 21:39:42

<p>In the dynamic world of Linux security, understanding permissions, conducting thorough scans, and navigating the intricacies of SSH exploits are crucial skills. This blog post unravels Module 6, exploring key concepts and practical exercises that empower cybersecurity enthusiasts to fortify Linux systems.</p>

<h3>Demystifying Linux Permissions: A Closer Look at chmod</h3>
<p>The blog commences with a dive into Linux file permissions, dissecting the intricacies of the chmod command with a numerical representation (754). Readers gain insights into the permission sets for owners, group members, and all users, ensuring a comprehensive understanding of access control in Linux.</p>

<!-- Include the rest of the sections similarly -->

<h3>Conclusion: Elevating Linux Security Proficiency</h3>
<p>As we conclude this exploration of Linux security fundamentals and practical exercises, the blog emphasizes the importance of continuous learning and hands-on practice. Armed with insights into permissions, password security, SSH best practices, and vulnerability scanning, readers are empowered to navigate the intricate landscape of Linux security with confidence and proficiency. Whether you are a novice or an experienced cybersecurity enthusiast, the quest for mastering Linux security is an ongoing journey of discovery and empowerment.</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Unraveling the World of Web Application Security: SQL Injection, XSS, and CSRF

Posted At: 2023-07-30 04:00:00

Edited At: 2024-02-14 21:39:57

<p>In the ever-evolving landscape of cybersecurity, web application vulnerabilities pose significant threats. This blog post delves into the intricacies of SQL Injection (SQLi), Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF), shedding light on their mechanisms, implications, and potential exploits.</p>

<h3>Understanding SQL Injection (SQLi)</h3>
<p>SQLi is a powerful attack vector where attackers exploit vulnerabilities in a web application's input fields to inject malicious SQL code. By inserting single quotes ('), attackers can manipulate SQL queries, gaining unauthorized access to databases, potentially compromising sensitive information or altering data. The blog explores SQLi techniques, such as Union-based attacks, and provides insights into how attackers can exploit these vulnerabilities to gain unauthorized access.</p>

<!-- Include the rest of the sections similarly -->

<h3>The Art of Shell Access: Bind Shell vs. Reverse Shell</h3>
<p>The post concludes by unraveling the nuances of shell access in SQLi scenarios. It distinguishes between bind shells and reverse shells, explaining how each connection type works. A practical example involving PowerShell and netcat showcases the power of these connections, enabling attackers to execute commands on the target system.</p>

<p>In the realm of web application security, knowledge is the key to defense. This blog post equips readers with insights into common vulnerabilities and potential exploits, empowering them to adopt proactive measures to secure their web applications against emerging cyber threats.</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Blackjack

Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 18

Posted At: 2019-01-23 05:00:00

Edited At: 2024-02-14 21:57:09

<p>This program simulates the card-based game Blackjack.</p>

<p>When playing Blackjack, the hand that's value is as close to 21 as possible without going over wins. To ‘hit’ is to ask for another card for your hand and to ‘stand’ is to end your turn.</p>

<h2>total(hand)</h2>

<p>Computes the value of a given blackjack hand.</p>

<pre>
<code>
def total(hand):
'compute the total of a blackjack hand'

values = {'2':2, '3':3, '4':4, '5':5, '6':6, '7':7, '8':8, '9':9, '1':10, 'J':10, 'Q':10, 'K':10, 'A':11}

result = 0
numAces = 0
for card in hand: # find number of Aces in hand
result += values[card[0]]
if card[0] == 'A':
numAces += 1
# hand now has a value where every ace is 11
# if value > 21 then reduce first ace by 10
# to have value of 1. Repeat until value < 21
while result > 21 and numAces > 0:
result -= 10
numAces -= 1
return result
</code>
</pre>

<h2>shuffleDeck()</h2>

<p>Creates a deck of cards that is shuffled.</p>

<pre>
<code>
def shuffleDeck():
'create a random deck of 52 cards'
import random
# suits is a set of 4 Unicode symbols for suits
suits = {'u2660', 'u2661', 'u2662', 'u2663'}
ranks = {'2','3','4','5','6','7','8','9','10','J','Q','K','A'}
deck = []
# create deck of 52 cards
for suit in suits: # deck of 52 cards that contains ranks and suits
for rank in ranks:
deck.append(rank + suit) # put rank & suit together
random.shuffle(deck) # shuffle the deck and return
return deck
</code>
</pre>

Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Mastermind

Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 18

Posted At: 2018-12-28 05:00:00

Edited At: 2024-02-14 22:04:20

<p>This program simulates the code-breaking game, Mastermind. This program checks the players guess against the initial for random numbers between 1-6. Enter four guesses from 1-6, for example: 1234.</p>

<h2>guessInput(self) - Retrieve user input in the form of a 4-digit integer.</h2>

<pre>
<code>
def guessInput(self):
'Retrieve user input in the form of a 4-digit integer'
while True:
guess=(input('Enter your guess: '))
if (isinstance(guess, int)) or (len(str(guess)) != self.width):
self.whtType()
else:
listGuess = [int(x) for x in str(guess)]
return listGuess
</code>
</pre>

<h2>blackBox(self, guess) - Compares two lists and finds if the index and value are the same for each value.</h2>

<pre>
<code>
def blackBox(self, guess): #works
'''
Compares two lists and finds if the index and value are the same for each value
:param guess: a list of 4 numbers
:return: updated list of elements, with matching elements from guess being replaced with u"u25A0"
'''
for i in range(len(guess)):
if self.key[i] == guess[i]:
guess[i]=u"u25A0"
return guess
</code>
</pre>

<h2>whiteBox(self, guess) - Compares two lists and finds if any values are the same.</h2>

<pre>
<code>
def whiteBox(self, guess):
'''
Compares two lists and finds if values are the same
:param guess: a list of 4 numbers
:return: updated list of elements, with matching elements from guess being replaced with u"u25A0"
'''
for i in self.key:
if i in guess:
newguess= guess.index(i)
guess[newguess]=u"u25A1"
return guess
</code>
</pre>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Microsoft Excel Projects

The following mockup case studies demonstrate my knowledge and experience utilizing Microsoft Excel.

Posted At: 2019-04-30 04:00:00

Edited At: 2019-04-30 04:00:00

<h2>Abstract</h2>
<p>This compilation delves into a practical exploration of Microsoft Excel, showcasing the depth of skills and versatility in their application...</p>
<h2>Introduction</h2>
<p>In the realm of professional proficiency, Microsoft Excel stands out as a ubiquitous tool, fostering efficiency and data management across various domains...</p>
<h2>Case 1: Flight Capacity</h2>
<p>Blue Skies Airline seeks an efficient Excel spreadsheet for tracking daily flight statistics. The spreadsheet includes features such as passenger count, averages, rounded averages, medians, least and most full flights, and the number of flights per day...</p>
<img src="images/blogs/image2.png" alt="Case Study 1: Flight Capacity">

<h2>Case Study 2: Grade Book</h2>
<p>A professor managing CS 101 uses an Excel grade book to track student performance. This case study involves determining pass/fail criteria, calculating percentage and letter grades, and presenting course statistics...</p>
<img src="images/blogs/image3.png" alt="Case Study 2: Grade Book">

<h2>Case Study 3: Products</h2>
<p>A business owner needs an Excel spreadsheet to visualize stock and earnings each quarter. The Products_DataSet sheet imports data and adds calculated columns, while the Sales_Summary sheet provides a pivot table summary...</p>
<img src="images/blogs/image4.png" alt="Case Study 3: Products">

<h2>Case Study 4: Check Book</h2>
<p>A university student utilizes Excel to track earnings and expenses over time. The BUDGET_SUMMARY sheet summarizes financial data, and the WHAT-IF_GOAL SEEK sheet assists in calculating a loan...</p>
<img src="images/blogs/image5.png" alt="Case Study 4: Check Book">

<h2>Extra: Notes</h2>
<p>A supplementary Notes file provides practical examples for VLOOKUP/HLOOKUP and demonstrates the usage of graphs, trendlines, and sparklines in Excel...</p>
<img src="images/blogs/image6.png" alt="Extra: Notes">

<h2>Conclusion</h2>
<p>As we conclude this compilation, it becomes evident that Excel proficiency transcends the boundaries of spreadsheet software. The showcased case studies exemplify a nuanced understanding of Excel's capabilities, incorporating not only fundamental features but also advanced functions and features crucial for complex real-world applications.</p>
<p>Whether it be in the aviation industry, education sector, business management, or personal finance, Excel emerges as a versatile ally, streamlining processes and providing insightful data analysis. This document stands as a testament to the practical utility of Excel skills and the adaptability required to navigate diverse professional landscapes.</p>
<p>As we navigate the ever-evolving terrain of professional requirements, the showcased Excel skills serve as valuable assets, contributing to efficiency, accuracy, and informed decision-making. In a world where data-driven insights are paramount, mastering Excel is not just a skill but a strategic advantage for professionals in various fields.</p>
<p>May this compilation inspire further exploration and mastery of Excel, unlocking new possibilities for efficient data management and analysis in the dynamic landscape of modern professions.</p>
Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Card Dealer

This module will deal 5 cards from a string representing a deck. After dealing 5 cards from the deck those cards will be removed. This module will return a hand of 5 cards. This program will run 8 times, continuously updating the list of cards. If

Posted At: 2019-03-02 05:00:00

Edited At: 2019-03-02 05:00:00

Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image

Password Checker and Directory Printer

Here are a few sample projects I have created using Linux Script.

Posted At: 2019-04-11 04:00:00

Edited At: 2019-04-11 04:00:00

Deprecated: htmlspecialchars(): Passing null to parameter #1 ($string) of type string is deprecated in /volume1/web/Dianas_Resume_PHP/pages/projects.php on line 22 Cover Image