You are on page 1of 3

In 1977, Kent concisely described the potential for covert channel signaling in

general network communication protocols, even if the traffic is encrypted (in a


footnote) in "Encryption-Based Protection for Interactive User/Computer
Communication," Proceedings of the Fifth Data Communications Symposium, September
1977.

In 1987, Girling first studied covert channels on a local area network (LAN),
identified and realised three obvious covert channels (two storage channels and one
timing channel), and his research paper entitled “Covert channels in LAN’s”
published in IEEE Transactions on Software Engineering, vol. SE-13 of 2, in
February 1987.[30]

In 1989, Wolf implemented covert channels in LAN protocols, e.g. using the reserved
fields, pad fields and undefined fields in the TCP/IP protocol.[31]

In 1997, Rowland used the IP identification field, the TCP initial sequence number
and acknowledge sequence number fields in TCP/IP headers to build covert channels.
[32]

In 2002, Kamran Ahsan made an excellent summary of research on network


steganography.[33]

In 2005, Steven J. Murdoch and Stephen Lewis contributed a chapter entitled


"Embedding Covert Channels into TCP/IP" in the "Information Hiding" book published
by Springer.[34]

All information hiding techniques that may be used to exchange steganograms in


telecommunication networks can be classified under the general term of network
steganography. This nomenclature was originally introduced by Krzysztof
Szczypiorski in 2003.[35] Contrary to typical steganographic methods that use
digital media (images, audio and video files) to hide data, network steganography
uses communication protocols' control elements and their intrinsic functionality.
As a result, such methods can be harder to detect and eliminate.[36]

Typical network steganography methods involve modification of the properties of a


single network protocol. Such modification can be applied to the PDU (Protocol Data
Unit),[37][38][39] to the time relations between the exchanged PDUs,[40] or both
(hybrid methods).[41]

Moreover, it is feasible to utilize the relation between two or more different


network protocols to enable secret communication. These applications fall under the
term inter-protocol steganography.[42] Alternatively, multiple network protocols
can be used simultaneously to transfer hidden information and so-called control
protocols can be embedded into steganographic communications to extend their
capabilities, e.g. to allow dynamic overlay routing or the switching of utilized
hiding methods and network protocols.[43][44]

Network steganography covers a broad spectrum of techniques, which include, among


others:

Steganophony — the concealment of messages in Voice-over-IP conversations, e.g. the


employment of delayed or corrupted packets that would normally be ignored by the
receiver (this method is called LACK — Lost Audio Packets Steganography), or,
alternatively, hiding information in unused header fields.[45]
WLAN Steganography – transmission of steganograms in Wireless Local Area Networks.
A practical example of WLAN Steganography is the HICCUPS system (Hidden
Communication System for Corrupted Networks)[46]
Steganography (/ˌstɛɡəˈnɒɡrəfi/ (About this soundlisten) STEG-ə-NOG-rə-fee) is the
practice of concealing a file, message, image, or video within another file,
message, image, or video. The word steganography comes from New Latin
steganographia, which combines the Greek words steganós (στεγανός), meaning
"covered or concealed", and -graphia (γραφή) meaning "writing".[1]

The first recorded use of the term was in 1499 by Johannes Trithemius in his
Steganographia, a treatise on cryptography and steganography, disguised as a book
on magic. Generally, the hidden messages appear to be (or to be part of) something
else: images, articles, shopping lists, or some other cover text. For example, the
hidden message may be in invisible ink between the visible lines of a private
letter. Some implementations of steganography that lack a shared secret are forms
of security through obscurity, and key-dependent steganographic schemes adhere to
Kerckhoffs's principle.[2]

The advantage of steganography over cryptography alone is that the intended secret
message does not attract attention to itself as an object of scrutiny. Plainly
visible encrypted messages, no matter how unbreakable they are, arouse interest and
may in themselves be incriminating in countries in which encryption is illegal.[3]

Whereas cryptography is the practice of protecting the contents of a message alone,


steganography is concerned both with concealing the fact that a secret message is
being sent and its contents.

Steganography includes the concealment of information within computer files. In


digital steganography, electronic communications may include steganographic coding
inside of a transport layer, such as a document file, image file, program or
protocol. Media files are ideal for steganographic transmission because of their
large size. For example, a sender might start with an innocuous image file and
adjust the color of every hundredth pixel to correspond to a letter in the
alphabet. The change is so subtle that someone who is not specifically looking for
it is unlikely to notice the change.आयुर्वेद का मुख्य उद्देश्य स्वस्थ व्यक्ति के स्वास्थय की रक्षा और रोगों से बचाव करना
है | रोगों से बचाव के लिए ऋषियों ने अनेक बातों पर ध्यान दिया है ,आयुर्वेद के अनुसार कोई भी रोग के वल शारीरिक या मानसिक नहीं होता ,
शारीरिक रोगों का असर मन पर और मानसिक रोगों का असर शरीर पर पड़ता है ,इसलिए आयुर्वेद में सभी रोगों को मनोदैहिक मानकर चिकित्सा की जाती
है | आयुर्वेद का चिकित्सक के वल रोगों के लक्षण के आधार पर ही नहीं बल्कि उनके साथ साथ रोगी की आत्मा ,मन , शारीरिक प्रकृ ति , वात ,
पित्त , कफ आदि दोषों , मलों तथा धातुओं की स्थिति को ध्यान में रखकर रोगी की चिकत्सा करता है , आयुर्वेद में प्रयुक्त होने वाली प्रत्येक औषधि
रसायन का रूप है , रोग प्रतिरोधक औषधियों और पथ्य आहार का विस्तृत विवरण विश्व को आयुर्वेद की ही देन है |

चिकित्सा के साथ साथ दिनचर्या , सुबह उठना , खाली पेट जल सेवन की विधि ,मल त्याग की विधि , दांत साफ़ करने की विधि ,शरीर की
मालिश तथा व्यायाम से लेकर वस्त्र और आभूषण धारण करने का वर्णन भी आयुर्वेद में किया गया है , इसी तरह से रात्रिचर्या , रात को सोने का समय
, रात का भोजन तथा आचार का भी सम्यक वर्णन आयुर्वेद में किया गया है |

विभिन्न ऋतुओं के अनुसार किये जाने वाले आचरण , खान-पान ,रहन -सहन ,आदि का ज्ञान भी आयुर्वेद से प्राप्त होता है , जिसके अनुसार आहार-
विहार अपनाने से स्वास्थय की रक्षा होती हैं और मनुष्य रोगों से बचा रहता हैं | जीवन में स्वस्थ तथा सुखी रहने के लिए धर्म ,अर्थ , काम तथा
मोक्ष का वर्णन भी आयुर्वेद से प्राप्त होता है ,आयुर्वेद भारतीय परंपरा एवं सम्पूर्ण मानव जीवन का शास्त्र तथा जीवन दर्शन है |

तो ये था आयुर्वेद का थोड़ा सा वर्णन , आयुर्वेद एक बहोत बड़ा और गहन विषय है , इसका शब्दों में वर्णन करना काफी मुश्किल है , लेकिन मैं पूरी
कोशिश करुँ गी की जितना भी मैं सीखूं वो सब आप लोगो के साथ साझा करूँ , ताकि हम सब मिलजुलकर आगे बढ़ सकें और ज्ञान प्राप्त कर सकें ,
मैं कोई आयुर्वेद की डॉक्टर नहीं हूँ या मैंने कोई बहोत ज्यादा गहन अध्ययन नहीं किया है , बस धीरे -धीरे सीख रही हूँ और आप सभी को सामान्य
जानकारी देती रहूंगी 🙂

हँसते रहिये , मुस्कु राते रहिये , बहोत सारा प्यार और दुआएं आपके लिए 🙂

आपकी गौरी 🙂

POSTED ONAPRIL 13, 2020


IMPORTANT INFORMATION FROM PATIENTS RECOVERING FROM CORONA OR COVID – 19

Everyday in the hospital we take :


Take Vitamin C-1000 mg
Vitamin E
10:00 – 11:00 sunlight for 15-20 minutes.
Egg one item
Take a rest / get a 7-8 hour min
Drink 1.5 L of water daily and every meal should be warm (not cold).
That’s what we do at the hospital.

This is to tell all of us that the pH for the coronary virus varies from 5.5 to 8.5

What we need to do, to defeat the coronary virus, is to consume more alkaline foods
above the virus’s pH level.

Some of them are :

Lemon – 9.9 pH
Lime – 8.2 pH
Avocados – 15.6 pH
Garlic – 13.2 pH *
Mango – 8.7pH
Tangerine – 8.5pH
Pineapple – 12.7 pH
Dandelion – 22.7 pH
Orange – 9.2 pH
How did you know you had a coronavirus?

You might also like