<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-924951198664525214</atom:id><lastBuildDate>Fri, 25 Oct 2024 12:23:15 +0000</lastBuildDate><category>Ransomeware</category><category>cyber security</category><category>CVEs</category><category>Cobolt strike</category><category>RDP</category><category>Root access</category><category>black lives matters</category><category>dark web onion site</category><category>docker container. cryptocurrency mining</category><category>layers of depfense</category><category>pandemic</category><category>sodinokini</category><category>sql alter/drop/rename/table</category><title>&#128110;&#127995;‍♀️HKCent Cyber Security&#128110;&#127995;‍♂️</title><description>&#128065;‍&#128488;This site shares my summary of latest cyber security related news to increase our awareness of the importance of Cyber Security to protect companies and individuals from the threat actors. </description><link>https://cyberboahn.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>30</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>This is free resources to share with anyone who is interested in Cyber Security. </copyright><itunes:image href="https://emojipedia-us.s3.dualstack.us-west-1.amazonaws.com/thumbs/240/google/263/shield_1f6e1.png"/><itunes:keywords>cyber,security,cyberwire,information,technology,protect,data,protect,identity,cyber,incidents,security,news</itunes:keywords><itunes:summary>I will be summarize IT news on the cyber security from Cyberwire podcast and other popular security news sites. </itunes:summary><itunes:subtitle>Information Technology</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Podcasting"/></itunes:category><itunes:author>Laura Collins</itunes:author><itunes:owner><itunes:email>laura@hkcent.org</itunes:email><itunes:name>Laura Collins</itunes:name></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-6976666906662143498</guid><pubDate>Sat, 13 May 2023 15:18:00 +0000</pubDate><atom:updated>2023-05-13T08:20:34.767-07:00</atom:updated><title>ADVERSARIAL ARTIFICIAL INTELLIGENCE</title><description>&lt;p&gt;&amp;nbsp;A student at MIT developed an algorithm that trick AI to misidentify objects. For example, the algorithm can wrongly identify a headphone as a gun at an airport terminal. By switching a few pixels or adding noise to the image, AI can misidentify a gray tabby cat as a bowl of guacamole.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Resource: &lt;a href="https://www.theregister.com/2017/11/06/mit_fooling_ai/"&gt;https://www.theregister.com/2017/11/06/mit_fooling_ai/&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Solution:&amp;nbsp;&lt;a href="https://wmx-api-production.s3.amazonaws.com/courses/5741/supplementary/us-18-Parikh-Protecting-the-Protector-Hardening-Machine-Learning-Defenses-Against-Adversarial-Attacks.pdf"&gt;https://wmx-api-production.s3.amazonaws.com/courses/5741/supplementary/us-18-Parikh-Protecting-the-Protector-Hardening-Machine-Learning-Defenses-Against-Adversarial-Attacks.pdf&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>https://cyberboahn.blogspot.com/2023/05/adversarial-artificial-intelligence.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-2057010595263167254</guid><pubDate>Mon, 15 Feb 2021 01:17:00 +0000</pubDate><atom:updated>2021-02-14T17:30:13.441-08:00</atom:updated><title>Bodywire-Human Body Communication (HBC) using Electro Quasi Static Human Body Communication (EQS-HBC)</title><description>&lt;p&gt;&amp;nbsp;Dr. Sheryan Sen, an associate professor at Purdue University, shared his team's research paper titled, "Enabling New Interaction Modalities by Communicating Strictly Through Touch Using Electro-Quasistatic Human Body Communication."&amp;nbsp;&lt;/p&gt;&lt;p&gt;Dr. Sen argues that wearable devices that use Bluetooth could use our body as a wire to send information securely because the signals are not getting radiated, but only transferred by touching. Using this technology you can open a computer, a home/car door, also create a second-factor authentication by just toughing with your finger. Also, it can transfer my contact information through a handshake.&amp;nbsp;&lt;/p&gt;&lt;p&gt;As far as the applications of this technology are concerned, the possibility includes augmented reality, virtual reality, basically anything you think Bluetooth is used today around the body. This technology can replace Bluetooth technology to connect/transfer data with Human-computer Interaction utilizing low frequency Electro-Quasi Static Human Body Communication.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Currently, the team sees huge application space and multiple different large companies as well as startups have shown interest including the touch-based-ID technology and they are working with them to develop this technology and bring it to market.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Sources&lt;/p&gt;&lt;p&gt;&lt;a href="https://thecyberwire.com/podcasts/research-saturday/170/notes" target="_blank"&gt;https://thecyberwire.com/podcasts/research-saturday/170/notes&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.purdue.edu/newsroom/releases/2020/Q4/tech-makes-it-possible-to-digitally-communicate-through-human-touch.html"&gt;https://www.purdue.edu/newsroom/releases/2020/Q4/tech-makes-it-possible-to-digitally-communicate-through-human-touch.html&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>https://cyberboahn.blogspot.com/2021/02/bodywire-human-body-communication-hbc.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-4724129167782683717</guid><pubDate>Mon, 08 Feb 2021 01:09:00 +0000</pubDate><atom:updated>2021-02-07T17:09:39.820-08:00</atom:updated><title>Follow conflicts or geopolitical tensions</title><description>&lt;p&gt;&amp;nbsp;Joe Slowik, a Senior Security Researcher at DomainTools, discussed their research team's discovery based on their theory that&amp;nbsp; identifying infrastructure in adversary operations by tracking identifiers related to major events and conflict zones can yield insights into defense and response for upcoming incidents.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;During the initial investigation, the research team discovered that a document reflecting very specific themes related to the conflict in the Caucasus region between Armenia and Azerbijan. The document was masquerading as a news article and attempted to communicate with a certain domain.&lt;/p&gt;&lt;p&gt;The team found an unusually long string of numbers as a template object trying to attempt to communicate a domain: msofficeupate.org. Also, the template item is serving as a signifier to identify additional samples similarly constructed.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Based on the characteristics found, DomainTools researchers identified 35 domains matching the patterns associated with the initially observed malicious domain.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Overall, the adversary operations were related to political, military, and related subjects in the Caucasus region. By tracking identifiers and pivoting the investigation, the researcher were able to link to a phishing email that is state sponsored.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The lessons the team discovered is that the analysis of both the malicious documents and related network infrastructure by tracking identifiers can be used to gain insight to deploy defensive countermeasure that is coming in the near future because it is unlikely that adversaries will completely change their life cycle.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>https://cyberboahn.blogspot.com/2021/02/follow-conflicts-or-geopolitical.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-5574359393164301259</guid><pubDate>Sun, 31 Jan 2021 01:46:00 +0000</pubDate><atom:updated>2021-01-30T18:09:21.404-08:00</atom:updated><title>Kimsuky - the North Korean APT group</title><description>&lt;p&gt;&lt;span face="&amp;quot;Nunito Sans&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Helvetica, Arial, sans-serif" style="background-color: white; color: #4a4a4a; font-size: 16px;"&gt;Yonatan Striem-Amit, CTO and co-founder at Cybereason, discussed Kimsuky "KGH_Spy" Suite and "CSPY downloader."&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face="&amp;quot;Nunito Sans&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Helvetica, Arial, sans-serif" style="background-color: white; color: #4a4a4a; font-size: 16px;"&gt;Kimsuky is a North Korean Cyber espionage group which has been active since 2012. Their target has been expanded from Korean peninsula to US and European countries. The observed targets are COIVD-19 related research companies, Think Tanks, Human Right Groups, South Korean Military, etc.&amp;nbsp;&lt;/span&gt;&lt;span face="&amp;quot;Nunito Sans&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Helvetica, Arial, sans-serif" style="background-color: white; color: #4a4a4a;"&gt;The infrastructure&lt;/span&gt;&lt;span face="&amp;quot;Nunito Sans&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Helvetica, Arial, sans-serif" style="background-color: white; color: #4a4a4a;"&gt;&amp;nbsp;of Kimsuky consists with phishing campaign and RATs, Remote access took kits. The method of detection evasion is backdating or timestomping by changing dates to 2015, 2016 from 2020 to evade the forensic investigation.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face="&amp;quot;Nunito Sans&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Helvetica, Arial, sans-serif" style="background-color: white; color: #4a4a4a;"&gt;Cybereason Nocturnus discovered KGH_SPY and CSPY Downloader. KGH_SPY is a kit that gives the operator full control of your computer by executing a filess malware. CSPY is a tool designed to evade analysis. It installs a small beacon and once it is executed, it starts the cascading effect of downloading more content from the internet. It has built-in evasion techniques by using stolen signed signature.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face="&amp;quot;Nunito Sans&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Helvetica, Arial, sans-serif" style="background-color: white; color: #4a4a4a;"&gt;The take-home lessons from this research findings are first, IT hygiene and user training so they don't fall prey into the traps. Second, adopt endpoint protections which is effective detecting Kimsuky malware and spyware. Lastly, be vigilant.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face="&amp;quot;Nunito Sans&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Helvetica, Arial, sans-serif" style="background-color: white; color: #4a4a4a;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face="&amp;quot;Nunito Sans&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Helvetica, Arial, sans-serif" style="background-color: white; color: #4a4a4a;"&gt;Sources&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="background-color: white;"&gt;&lt;span face="Nunito Sans, -apple-system, BlinkMacSystemFont, Segoe UI, Roboto, Helvetica, Arial, sans-serif" style="color: #4a4a4a;"&gt;&lt;a href="https://www.cybereason.com/blog/back-to-the-future-inside-the-kimsuky-kgh-spyware-suite"&gt;https://www.cybereason.com/blog/back-to-the-future-inside-the-kimsuky-kgh-spyware-suite&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="background-color: white;"&gt;&lt;a href="https://thecyberwire.com/podcasts/research-saturday/168/notes"&gt;https://thecyberwire.com/podcasts/research-saturday/168/notes&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="background-color: white;"&gt;&lt;span face="Nunito Sans, -apple-system, BlinkMacSystemFont, Segoe UI, Roboto, Helvetica, Arial, sans-serif" style="color: #4a4a4a;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description><link>https://cyberboahn.blogspot.com/2021/01/kimsuky-north-korean-apt-groups-kghg.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-4428496575098384380</guid><pubDate>Sun, 24 Jan 2021 20:43:00 +0000</pubDate><atom:updated>2021-01-24T12:52:58.744-08:00</atom:updated><title>Trickbot is still alive.</title><description>&lt;p&gt;&amp;nbsp;Mark Arena, CEO of Intel471, shared his team's analysis on &lt;a href="https://en.wikipedia.org/wiki/Trickbot" target="_blank"&gt;Trickbot&lt;/a&gt; during the period from Sep 22, 2020 to Nov. 6, 2020. Trickbot has been active since Oct. 2016 and started as a bank trojan and evolved to Spyware and backdoor malware. Also, its target has been evolved from customers to corporates. Trickbot is stealthy and invisible to users, so the victims are unaware of the infection. The methods of infection are spam emails or malware as a service by providing framework to access victims computer.&amp;nbsp;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;On Sept. 22, 2020 U.S. Cyber Command modified several Trickbot configuration files that were sent by their C&amp;amp;C infrastructure. The goal was to disrupt the communication between bots and their control servers. However the actors maintained access to systems they already were engaged in their intrusion activity.&amp;nbsp;&lt;/p&gt;&lt;p&gt;On Oct. 12, 2020 Microsoft announced their action against Trickbot by appealing to the court to order&amp;nbsp; U.S. hosting companies that host Trickbot controller infrastructure to shut down the infrastructure. From Oct.13, 2020, to Nov. 1, 2020 Intel471 started noticing a significant amount of Trickbot's infrastructure was inoperable. Between Oc.28, 2020 and Nov. 6, 2020, Intel471 has not seen any new Trickbot infection campaigns.&amp;nbsp;&lt;/p&gt;&lt;p&gt;In the recent Ryuk ransomware attacks, incident responders have reported that they saw a malware known as BazarLoader instead of Trickbot.&amp;nbsp; BazarLoader is linked to the Trickbot operators in that it shared the infrastructure and code similarities. This indicates Trickbot continues to launch targeted ransomware attacks successfully despite the disruption of the Trickbot infrastructure.&amp;nbsp;&lt;/p&gt;&lt;p&gt;In conclusion, U.S. Cyber Command and Microsoft action on Trickbot by disrupting Trickbot infrastructure caused the actors to spend time and effort setting up new infrastructure instead of impacting and ransoming victims. However, we are unsure actors will continue their operation using Trickbot or move entirely to BazarLoader. Nonetheless, we see a greenlight in that the Trickbot infrastructure disruption delayed the intrusion operations.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;https://thecyberwire.com/podcasts/research-saturday/167/notes&lt;a href="https://thecyberwire.com/podcasts/research-saturday/167/notes" target="_blank"&gt;https://thecyberwire.com/podcasts/research-saturday/167/notes&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>https://cyberboahn.blogspot.com/2021/01/trickbot-is-still-alive.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-6309791206997143400</guid><pubDate>Sun, 03 Jan 2021 04:01:00 +0000</pubDate><atom:updated>2021-01-02T20:04:07.734-08:00</atom:updated><title>How Blockchain (BC) technology in medical device industry</title><description>&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;What is &lt;a href="https://en.wikipedia.org/wiki/Blockchain" target="_blank"&gt;Blockchain (BC) technology&lt;/a&gt;? Basically, it is a linked, hashed, time stamped, decentralized record which makes it very secure because no one can modify the records. The technology behind of Bitcoin is blockchain. How does it affect medical device industry? According to Yoav Raiter, Star Fish Medical, there will be significant changes in the medical device industry as listed below.&lt;/p&gt;&lt;p&gt;1. Have patient control their data not the hospital.&lt;/p&gt;&lt;p&gt;2. Have regulators take full control of real time anonymous patient data.&lt;/p&gt;&lt;p&gt;3. Arrange financial coverage by governments and insurance companies.&lt;/p&gt;&lt;p&gt;4. Support new treatment releases.&lt;/p&gt;&lt;p&gt;5. Control outbreak of disease by health organizations.&lt;/p&gt;&lt;p&gt;6. Disrupt the development and certification of medical devices.&lt;/p&gt;&lt;p&gt;7. Manage Device Master Record (DMR) and Device History File (DHF).&lt;/p&gt;&lt;p&gt;8. Manage the life cycle of each manufactured medical device unit.&lt;/p&gt;&lt;p&gt;9. Help provide faster FDA approvals.&lt;/p&gt;&lt;p&gt;10. Help regulators automate audit, even real time background audits.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Will the block chain technology change our current technology with data, which is highly centralized by Google? If then, how should we prepare our medical device industry for the new blockchain world? I clearly&amp;nbsp; see the benefit of blockchain in that it will increase security, agility, and innovation in the medical device industry.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/KhZnffHB_BE" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;&lt;p&gt;Resource:&lt;/p&gt;&lt;p&gt;&lt;a href="https://starfishmedical.com/blog/blockchain-technology/" target="_blank"&gt;https://starfishmedical.com/blog/blockchain-technology/&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;</description><link>https://cyberboahn.blogspot.com/2021/01/how-blockchain-bc-technology-in-medical.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/KhZnffHB_BE/default.jpg" width="72"/><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-7578441000833540275</guid><pubDate>Fri, 25 Dec 2020 18:40:00 +0000</pubDate><atom:updated>2020-12-26T09:01:35.340-08:00</atom:updated><title>Questionable "Mintegral" Ad Software Development Kit (SDK) </title><description>&lt;p&gt;&lt;span style="background-color: white;"&gt;&lt;span face="Nunito Sans, -apple-system, BlinkMacSystemFont, Segoe UI, Roboto, Helvetica, Arial, sans-serif" style="color: #4a4a4a;"&gt;Alyssa Miller from Synk shared their research findings on &lt;a href="https://www.mintegral.com/en/sdk/#:~:text=Lightweight%20but%20stable%2C%20safe%20and,experiences%20and%20maximized%20ad%20revenue." target="_blank"&gt;Mintegral SDK&lt;/a&gt;'s malicious behaviors in their codes.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face="&amp;quot;Nunito Sans&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Helvetica, Arial, sans-serif" style="background-color: white; color: #4a4a4a;"&gt;Mintegral SDK is a mediator between advertisers and app developers by providing an ad platform that developers can download and insert ads in their app to monetize when an app user clicks on an advertisement.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span face="&amp;quot;Nunito Sans&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Helvetica, Arial, sans-serif" style="background-color: white; color: #4a4a4a;"&gt;The research team looked at the fingerprints of Mintegral SDK on iOS and found that the codes are obfuscated&lt;/span&gt;&lt;span face="&amp;quot;Nunito Sans&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Helvetica, Arial, sans-serif" style="background-color: white; color: #4a4a4a;"&gt;&amp;nbsp;as well as command&lt;/span&gt;&lt;span face="&amp;quot;Nunito Sans&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Helvetica, Arial, sans-serif" style="background-color: white; color: #4a4a4a;"&gt;&amp;nbsp;and control &lt;/span&gt;&lt;span face="&amp;quot;Nunito Sans&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Helvetica, Arial, sans-serif" style="background-color: white; color: #4a4a4a;"&gt;functions which is unusual for ad SDK&lt;/span&gt;&lt;span face="&amp;quot;Nunito Sans&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Helvetica, Arial, sans-serif" style="background-color: white; color: #4a4a4a;"&gt;. Then, the team looked at the &lt;/span&gt;&lt;a href="https://en.wikipedia.org/wiki/Attribution_(marketing)#Concept" style="background-color: white; font-family: &amp;quot;Nunito Sans&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Helvetica, Arial, sans-serif;" target="_blank"&gt;attrition&lt;/a&gt;&lt;span style="background-color: white;"&gt;&lt;span face="Nunito Sans, -apple-system, BlinkMacSystemFont, Segoe UI, Roboto, Helvetica, Arial, sans-serif" style="color: #4a4a4a;"&gt; space, and their volume was much higher than their competition attrition owners. When a user clicks an ad in the app, all the clicks of any URLs including the ads sent from other advertisement&amp;nbsp;source sent to Mintegral server and modified as if it was from Mintegral. In addition, all the user traffics were sent to Mintegral server including secret google docs while the app is open.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="background-color: white;"&gt;&lt;span face="Nunito Sans, -apple-system, BlinkMacSystemFont, Segoe UI, Roboto, Helvetica, Arial, sans-serif" style="color: #4a4a4a;"&gt;The research team cannot confirm what Mintegral SDK do with the sensitive user information and Apple Store doesn't seem too concerned about it. On the surface, Mintegral is just stealing attrition&amp;nbsp;from other advertising source and there is no user impact because of this.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="background-color: white;"&gt;&lt;span face="Nunito Sans, -apple-system, BlinkMacSystemFont, Segoe UI, Roboto, Helvetica, Arial, sans-serif" style="color: #4a4a4a;"&gt;How did the SDK pass the App Store's verification? The SDK used obfuscation&amp;nbsp;and a method called swizzling which happens on Runtime. In order to detect those behaviors, it requires in depth analysis which is impossible for AppStore to go through daily.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="background-color: white;"&gt;&lt;span face="Nunito Sans, -apple-system, BlinkMacSystemFont, Segoe UI, Roboto, Helvetica, Arial, sans-serif" style="color: #4a4a4a;"&gt;Miller advises that app developers need to be aware of malicious ad SDK that their app can serve to expose user's sensitive data by clicking ads in their app. He believes it is crucial that we research into these open source to find malicious behaviours to prevent any cyber crimes.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="background-color: white;"&gt;&lt;span face="Nunito Sans, -apple-system, BlinkMacSystemFont, Segoe UI, Roboto, Helvetica, Arial, sans-serif" style="color: #4a4a4a;"&gt;&lt;a href="https://thecyberwire.com/podcasts/research-saturday/164/notes" target="_blank"&gt;https://thecyberwire.com/podcasts/research-saturday/164/notes&lt;/a&gt;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;

&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/n-mEMkeoUqs" width="560"&gt;&lt;/iframe&gt;
</description><link>https://cyberboahn.blogspot.com/2020/12/questionable-ads-mintegral-software.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/n-mEMkeoUqs/default.jpg" width="72"/><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-3978697090281984327</guid><pubDate>Sun, 06 Dec 2020 00:29:00 +0000</pubDate><atom:updated>2020-12-05T16:58:50.946-08:00</atom:updated><title>SSL/TSL, is it our protector or enabler?</title><description>&lt;p&gt;&amp;nbsp;Deepen Desai, CISO and VP of Security Research and Operations at Zscaler, talked about Zscaler cloud research report - &lt;i&gt;&lt;a href="https://www.zscaler.com/resources/industry-reports/state-of-encrypted-attacks.pdf?_gl=1*1wdvp74*_ga*MjEyNTg3NDMyOC4xNTUxMzA3NDM4*_ga_10SPJ4YJL9*MTYwNzAyNTA1Mi4yNy4xLjE2MDcwMjUxNzguMA..&amp;amp;_ga=2.250346053.2117749544.1606841800-2125874328.1551307438&amp;amp;_gac=1.220309354.1605313467.CjwKCAiA17P9BRB2EiwAMvwNyBRy6rW_NLor9iMHlZc1cy2ANz8SzCZlF9ZG_3fc0mozOUFFofD7NBoC4KwQAvD_BwE" target="_blank"&gt;2020: The State of Encrypted Attacks&lt;/a&gt;&lt;/i&gt;, which the research team analyzed&amp;nbsp; encrypted traffic across the Zscaler cloud for the first nine months of 2020.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Zscaler Cloud blocked a 6.6 billion security threats that were encrypted which is basically average of 733 million blocked a month in 2020 compared to 283 million blocked in 2019. 1.6 billion&amp;nbsp; out of 6.6 billion encrypted threats were targeting healthcare. According to the report, 80% of all cyber traffic is encrypted and the SSL based attack has been increased 200%. Especially, the ransomware attacks has increased 500%.&lt;/p&gt;&lt;p&gt;The most popular brands that have been spoofed are Office 365, Tech Support, PayPal, Google, and Netflix. Nowadays, you cannot differentiate the spoofed site with the legitimate sites.&amp;nbsp;&lt;/p&gt;&lt;p&gt;How do we prevent the SSL/TLS based attacks? First, inspect all SSL traffic by setting up a proxy based architecture. The on-premise security tool such as next generation firewalls are incapable of performing decrypt, inspect, and re-encrypt effectively. Second, set up a true zero-trust network access architecture which means there is no network presence of any of the user laptops. Zscaler performs SSL inspect at scale as part of its platform of services.&amp;nbsp;&lt;/p&gt;&lt;p&gt;In conclusion, Desai emphasized the importance of defense in-depth to prevent the increasingly popular SSL/TLS encrypted attacks.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://thecyberwire.com/podcasts/research-saturday/162/notes"&gt;https://thecyberwire.com/podcasts/research-saturday/162/notes&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;</description><link>https://cyberboahn.blogspot.com/2020/12/ssltsl-is-it-our-protector-or-enabler.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author><enclosure length="4922560" type="application/pdf" url="https://www.zscaler.com/resources/industry-reports/state-of-encrypted-attacks.pdf?_gl=1*1wdvp74*_ga*MjEyNTg3NDMyOC4xNTUxMzA3NDM4*_ga_10SPJ4YJL9*MTYwNzAyNTA1Mi4yNy4xLjE2MDcwMjUxNzguMA..&amp;amp;_ga=2.250346053.2117749544.1606841800-2125874328.1551307438&amp;amp;_gac=1.220309354.1605313467.CjwKCAiA17P9BRB2EiwAMvwNyBRy6rW_NLor9iMHlZc1cy2ANz8SzCZlF9ZG_3fc0mozOUFFofD7NBoC4KwQAvD_BwE"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>&amp;nbsp;Deepen Desai, CISO and VP of Security Research and Operations at Zscaler, talked about Zscaler cloud research report - 2020: The State of Encrypted Attacks, which the research team analyzed&amp;nbsp; encrypted traffic across the Zscaler cloud for the first nine months of 2020.&amp;nbsp; Zscaler Cloud blocked a 6.6 billion security threats that were encrypted which is basically average of 733 million blocked a month in 2020 compared to 283 million blocked in 2019. 1.6 billion&amp;nbsp; out of 6.6 billion encrypted threats were targeting healthcare. According to the report, 80% of all cyber traffic is encrypted and the SSL based attack has been increased 200%. Especially, the ransomware attacks has increased 500%. The most popular brands that have been spoofed are Office 365, Tech Support, PayPal, Google, and Netflix. Nowadays, you cannot differentiate the spoofed site with the legitimate sites.&amp;nbsp; How do we prevent the SSL/TLS based attacks? First, inspect all SSL traffic by setting up a proxy based architecture. The on-premise security tool such as next generation firewalls are incapable of performing decrypt, inspect, and re-encrypt effectively. Second, set up a true zero-trust network access architecture which means there is no network presence of any of the user laptops. Zscaler performs SSL inspect at scale as part of its platform of services.&amp;nbsp; In conclusion, Desai emphasized the importance of defense in-depth to prevent the increasingly popular SSL/TLS encrypted attacks.&amp;nbsp; https://thecyberwire.com/podcasts/research-saturday/162/notes</itunes:subtitle><itunes:author>Laura Collins</itunes:author><itunes:summary>&amp;nbsp;Deepen Desai, CISO and VP of Security Research and Operations at Zscaler, talked about Zscaler cloud research report - 2020: The State of Encrypted Attacks, which the research team analyzed&amp;nbsp; encrypted traffic across the Zscaler cloud for the first nine months of 2020.&amp;nbsp; Zscaler Cloud blocked a 6.6 billion security threats that were encrypted which is basically average of 733 million blocked a month in 2020 compared to 283 million blocked in 2019. 1.6 billion&amp;nbsp; out of 6.6 billion encrypted threats were targeting healthcare. According to the report, 80% of all cyber traffic is encrypted and the SSL based attack has been increased 200%. Especially, the ransomware attacks has increased 500%. The most popular brands that have been spoofed are Office 365, Tech Support, PayPal, Google, and Netflix. Nowadays, you cannot differentiate the spoofed site with the legitimate sites.&amp;nbsp; How do we prevent the SSL/TLS based attacks? First, inspect all SSL traffic by setting up a proxy based architecture. The on-premise security tool such as next generation firewalls are incapable of performing decrypt, inspect, and re-encrypt effectively. Second, set up a true zero-trust network access architecture which means there is no network presence of any of the user laptops. Zscaler performs SSL inspect at scale as part of its platform of services.&amp;nbsp; In conclusion, Desai emphasized the importance of defense in-depth to prevent the increasingly popular SSL/TLS encrypted attacks.&amp;nbsp; https://thecyberwire.com/podcasts/research-saturday/162/notes</itunes:summary><itunes:keywords>cyber,security,cyberwire,information,technology,protect,data,protect,identity,cyber,incidents,security,news</itunes:keywords></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-3190150503084587832</guid><pubDate>Sat, 28 Nov 2020 02:20:00 +0000</pubDate><atom:updated>2020-11-27T18:22:26.359-08:00</atom:updated><title>The importance of least privilege in IAM role configuration</title><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsr7GZHXouyqOSfscXnoDCOsNFKeW-h2va6qK0Y1dWeCg-05WOM8TNtIEJya13Rf2bAacEVEwHQSfkQlwdWG_-7c0Uzl4q3pi5F7r4teovFpTzDaCaHeZF0oTKC5bwzmRX9N11Q5C8FK8/s1318/AssumeRole.PNG" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="906" data-original-width="1318" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsr7GZHXouyqOSfscXnoDCOsNFKeW-h2va6qK0Y1dWeCg-05WOM8TNtIEJya13Rf2bAacEVEwHQSfkQlwdWG_-7c0Uzl4q3pi5F7r4teovFpTzDaCaHeZF0oTKC5bwzmRX9N11Q5C8FK8/w524-h360/AssumeRole.PNG" width="524" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;Matt Chiodi, Chief Security Officer(CSO) for Public Cloud at Palo Alto Networks, discussed the highlights from the biannual Unit 42 Cloud Threat Report.&amp;nbsp;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The team conducted a red team exercise on a high profile company with a large cybersecurity team to find the vulnerability in their cloud configuration. Surprisingly, the team could take over the company's AWS environment due to a misconfigured IAM role ("&lt;a href="https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html" target="_blank"&gt;AssumeRole&lt;/a&gt;")which lead to access S3 buckets and encryption keys. This red team exercise revealed that the vulnerability of the system wasn't AWS misconfiguration but IAM role misconfiguration. The misconfigured identity in the cloud impact is much greater than on-premise system.&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;So, how do companies prevent from this happening? First, practice the concept of least privilege. 74% of JAPAC &amp;amp; EMEA organizations use admin role for workloads. It is recommended to grant non admin role for workloads operations. Second, automate scanning their IAM roles looking for the misconfigurations and fix it. Third, don't gloss over the cyber security due to the cost. The attackers are gotten smarter and it is harder to catch them because they design their scripts to run at a low utilization. The attackers use misconfigured environments for cryptojacking. 

&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href="https://thecyberwire.com/podcasts/research-saturday/161/notes" target="_blank"&gt;https://thecyberwire.com/podcasts/research-saturday/161/notes&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</description><link>https://cyberboahn.blogspot.com/2020/11/the-importance-of-least-privilege-in.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsr7GZHXouyqOSfscXnoDCOsNFKeW-h2va6qK0Y1dWeCg-05WOM8TNtIEJya13Rf2bAacEVEwHQSfkQlwdWG_-7c0Uzl4q3pi5F7r4teovFpTzDaCaHeZF0oTKC5bwzmRX9N11Q5C8FK8/s72-w524-h360-c/AssumeRole.PNG" width="72"/><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-5213376763159971048</guid><pubDate>Tue, 17 Nov 2020 21:09:00 +0000</pubDate><atom:updated>2020-11-21T16:37:11.432-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">CVEs</category><category domain="http://www.blogger.com/atom/ns#">cyber security</category><category domain="http://www.blogger.com/atom/ns#">Root access</category><title>Don't be afraid to fail! </title><description>&lt;p&gt;&amp;nbsp;Larry Cashdollar from Akamai talked about his first CVE experience back in 1999 and how the experience played out his career path in Cyber Security.&lt;/p&gt;&lt;p&gt;According to Larry, his first CVE was conducted without permission. He was working as a Linux system admin for Bath Iron Works&amp;nbsp; under contract by&amp;nbsp; Computer Sciences Corporation. They had a SGI Onyx/2 machine room that was allowed to only a few senior members. One day, one of the senior members taunted the junior team members that they would get the access to the room if they get the root access to the machine. There he started his first pen testing to get the root access to the Onyx machine following steps below without any permission.&amp;nbsp;&lt;/p&gt;&lt;p&gt;1. Went to /usr/sbin to look for setuid binaries.&lt;/p&gt;&lt;p&gt;2. Found "Midikeys" file which has setuid bit set on it and ran it.&lt;/p&gt;&lt;p&gt;3. Opened up the password file and put a zero in his user ID and saved it and then logged in again.&amp;nbsp;&lt;/p&gt;&lt;p&gt;4. Logged into the Onyx's LP, forward an x window back to his machine and forward back a -execute the Midikeys, bring it up, open up /etc/password, created a "Larry" account, made the user id"0"&lt;/p&gt;&lt;p&gt;5. Got a root prompt.&amp;nbsp;&lt;/p&gt;&lt;p&gt;6. Changed the root password to CTRL-D by accident thinking he was changing the password for "Larry."&lt;/p&gt;&lt;p&gt;Larry was panicked after this incident and tried to inform the admin on the password change but he was in the middle of giving a demo to Navy admiral and upper managements. Luckily, the admin was able to change the password.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Despite the ominous incident, he got the legitimacy to conduct pen testing instead of being fired from the position.&amp;nbsp;&lt;/p&gt;&lt;p&gt;He sent the CVE to Bugtraq, which is a network security notification system people used in the late 90s, and there were over 230 CVEs he had posted since then.&lt;/p&gt;&lt;p&gt;While working for Akamai CERT he started look at WordPress plugins and found lots of vulnerabilities. These days, he finds vulnerabilities in Web applications and a /temp race condition vulnerability for Solaris 11x86, where one of their utilities would create a file in /temp and then you get root access by using chmod /etc/shadow and then change the password.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The advice Larry would like to give for the students and the junior Cyber Security professionals is first, don't be afraid to fail. You learn from your failures. Second, don't lose your traction for learning new stuff. Lastly, don't do anything illegal. Make sure you get permission to do stuff.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://thecyberwire.com/podcasts/research-saturday/160/notes"&gt;https://thecyberwire.com/podcasts/research-saturday/160/notes&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Click below for more information on the race condition venerability.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://techterms.com/definition/race_condition"&gt;Race condition venerability&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;div a854="" font-color:="" helvetica="" sans-serif="" style="font-family: Arial,; font-size: 9px;" width:127px=""&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://cyberboahn.blogspot.com/2020/11/dont-be-afraid-to-fail.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-2178477587989947337</guid><pubDate>Thu, 05 Nov 2020 16:11:00 +0000</pubDate><atom:updated>2020-11-05T08:51:50.071-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cyber security</category><category domain="http://www.blogger.com/atom/ns#">Ransomeware</category><title>APT41 and human greed</title><description>&lt;p&gt;&amp;nbsp;Jon Dimaggio from Symantec's Threat Hunter Team talked about the cyber attacks that involve China based hacker group called 'APT41' for espionage and cyber crimes. APT41 is an early adaptor of 'supply chain' attack which they leverage victims by establishing relationships with companies to use them for later bigger attacks and has been active since 2012. Jon stated that the confusing part of this investigation was that&amp;nbsp; it is unusual in that state-sponsored espionage group involved with financial gain motivated cyber crimes. The motivation behind the espionage is not for financial gains but to collect intellectual information for political and military purposes. APT41 is a custom developed sophisticated espionage malware that has invested with time and money. It is unlikely that the government would permit to use it for financial gains as it can expose its signature to researchers which result in close of the long standing operation. One crucial tactic his team used to identify the crime was to monitor the human logging event timestamps. It appeared that the cyber crime actors were active between 10 pm to 1 am which is unusual time for espionage activity to happen. It lead to a hypothesis that it could be a moonlighting activity caused by a human greed. It is well known fact that highly skilled tech individual is well paid and lives a comfortable life in China but it appears human greed lead to perform the cyber attack for a personal capital gain to earn cyber money using APT41 malware thinking that they wouldn't be caught. The US government indicted seven individuals including APT41 with variety of crimes. Two of them worked both the espionage and cyber crimes operations. He believes that his team is doing a good job with investigating this cyber attacks based on the information revealed on the indictment. As the result of this indictment, APT41 will change their tactics, retool the attacks , and slow down but comeback with new creative way of attacks.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://thecyberwire.com/podcasts/research-saturday/158/notes" target="_blank"&gt;https://thecyberwire.com/podcasts/research-saturday/158/notes&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;</description><link>https://cyberboahn.blogspot.com/2020/11/apt41-and-human-greed.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-5583994711511015307</guid><pubDate>Mon, 26 Oct 2020 18:48:00 +0000</pubDate><atom:updated>2020-11-05T14:56:17.482-08:00</atom:updated><title>Search Engine Optimization (SEO) from Thenewboston </title><description>&lt;p&gt;&lt;b&gt;&lt;span style="font-size: medium;"&gt;&amp;nbsp;How Google works?&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Spider and bots crawl all the info on webpages and save in big database. When someone types a keyword, it looks at its database and gives you the websites that are the most relevant to this keyword based on the factors listed below.&lt;/p&gt;&lt;p&gt;1. Domain name and structure. Get url that includes the keyword and change profile.php to keyword.php.&lt;/p&gt;&lt;p&gt;Ex. Key word: Pokémon&amp;nbsp; URL: www.best&lt;b&gt;poketmongo&lt;/b&gt;.com/poketmon.php&lt;/p&gt;&lt;p&gt;2. Title and Meta Description. Make the title relevant to the key word and keep the meta description minimum to show up in full.&amp;nbsp;&lt;/p&gt;&lt;p&gt;3. Don't' change &amp;lt;h1&amp;gt; to &amp;lt;h3&amp;gt; to make heading bigger. Instead change the font_size:13px.&lt;/p&gt;&lt;p&gt;4. One long article is better than many pages.&lt;/p&gt;&lt;p&gt;5. Search popular key words or use Google Trend for key words.&lt;/p&gt;&lt;p&gt;6. Add links to the popular community such as GitHub, Wikipedia, Reddit.&amp;nbsp;&lt;/p&gt;&lt;p&gt;7. Make a lot of external sites pointing to the site.&amp;nbsp;&lt;/p&gt;&lt;p&gt;8. Create social media account such as Facebook, Twitter, GitHub.&lt;/p&gt;&lt;p&gt;9. Contact the relevant review blogger and look at your site to promote.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://youtu.be/F2jfZ9AwwAQ"&gt;https://youtu.be/F2jfZ9AwwAQ&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;</description><link>https://cyberboahn.blogspot.com/2020/10/seo-for-beginners-tutorials-from.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-5485104677502518960</guid><pubDate>Mon, 26 Oct 2020 18:11:00 +0000</pubDate><atom:updated>2020-11-05T14:57:23.019-08:00</atom:updated><title>A Dual-Layer Architecture for the Protection of Medical Devices (CT, MRI, Ultra sounds)</title><description>&lt;p&gt;&amp;nbsp;Tom Mahler from Ben-Gurion University has shared a solution that will protect medial medical devices such as CT, MRI, Ultra sound systems that use a host control PC to send instructions to the gantry by developing two layered architecture: (1)an unsupervised context-free layer that detects anomalies based solely on the instructions' content and intercorrelations; and (2) a supervised context-sensitive layer that detects anomalies with respect to the classifier's output, relative to the clinical objectives. This solution improved anomaly detection performance from 71.6%&amp;nbsp; to 82.3%-98.8%.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Why do we need this solution in addition to Firewalls and other network monitoring solutions? Number one, there are big gaps in the context of these devices are being used. The same device is used for kids and adults and the device does not know which patient is being evaluated which can introduce potentially harmful threats to patients such as radiation overexposure. Number two, the host is closed system, so security updates cannot be installed to the endpoint devices. This solution can monitor the traffic between the host system and the gantry by plugging in one side and the output goes to the gantry without changing the hosting PC's networks or interface. If the system fails, simply you need to unplug the solution and everything operates without interruption. Lastly, the layer 2 utilizes AI technology to learn its context to detect the anomaly of instruction which helps manufacture to detect the cyber attacks, human errors, or host PC software bugs.&amp;nbsp;&lt;/p&gt;&lt;p&gt;This additional context sensitive layer enables to detect anomalies which cannot be detected using only context free layer that anomalies based solely on the instructions' content and intercorrelations.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://thecyberwire.com/podcasts/research-saturday/157/notes" target="_blank"&gt;https://thecyberwire.com/podcasts/research-saturday/157/notes&lt;/a&gt;&lt;br /&gt;&lt;/p&gt;</description><link>https://cyberboahn.blogspot.com/2020/10/a-dual-layer-architecture-for.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-9017173189428301397</guid><pubDate>Mon, 26 Oct 2020 17:07:00 +0000</pubDate><atom:updated>2020-10-26T10:12:23.049-07:00</atom:updated><title>ZDNet poll: Is Google guilty of antitrust violations?</title><description>&lt;p&gt;&lt;b&gt;&lt;span style="font-size: medium;"&gt;The United States Department of Justice filed a lawsuit against Google&amp;nbsp; accusing of "Exclusionary practices that are harmful to competition." Do you think they are right?&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-size: medium;"&gt;&lt;b&gt;&lt;a href="https://www.zdnet.com/article/zdnet-poll-is-google-guilty-of-antitrust-violations/"&gt;https://www.zdnet.com/article/zdnet-poll-is-google-guilty-of-antitrust-violations/&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In my opinion, they are wrong. Google is not trying to monopoly and harm its competitors but benefiting many people making information globally accessible and useful. I believe this lawsuit is simply showing how government can kill excellence. I am not an expert on tech or laws but only an average Google user. However, I know how much Google helped me fill my thirst in learning without costing any money. I have learned my programming, networking, building websites without costing any money other than my Comcast bill. I am quite ignorant of Apple but I believe Apple is doing exact the same thing that Google is being guilty of and they are not being sued for it. I think the core role of government is serving its people not other business. Is Google harming other business or people? This is different from Rockefeller's oil industry monopoly. We need to look at Google's intention or mission of its business.&amp;nbsp;&lt;/p&gt;&lt;p style="background-color: white; box-sizing: inherit; color: #333333; font-family: &amp;quot;Libre Franklin&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, helvetica, arial, sans-serif; font-size: 16px; margin: 0px 0px 1.5em; padding: 0px;"&gt;"Google’s corporate mission is “&lt;span style="box-sizing: inherit; font-weight: 700;"&gt;&lt;em style="box-sizing: inherit;"&gt;to organize the world’s information and make it universally accessible and useful&lt;/em&gt;&lt;/span&gt;.” Ever since its beginnings, the company has focused on developing its proprietary algorithms to maximize effectiveness in organizing online information. Google continues to focus on ensuring people’s access to the information they need. The company’s mission&amp;nbsp;statement adheres to a utilitarian benefit that the business provides to its users. "&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p style="background-color: white; box-sizing: inherit; margin: 0px 0px 1.5em; padding: 0px;"&gt;&lt;span face="Libre Franklin, Helvetica Neue, helvetica, arial, sans-serif" style="color: #333333;"&gt;&lt;a href="http://panmore.com/google-vision-statement-mission-statement#:~:text=In%20this%20regard%2C%20the%20following%20are%20the%20primary,information%202%20Organization%203%20Universal%20accessibility%204%20Usefulness"&gt;http://panmore.com/google-vision-statement-mission-statement#:~:text=In%20this%20regard%2C%20the%20following%20are%20the%20primary,information%202%20Organization%203%20Universal%20accessibility%204%20Usefulness&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;I believe killing Google to help its competitor is to kill its own people. I have experienced many cases Apple charging for apps that are available for free in Android app store such as Duo app while working as a security analyst at a healthcare industry. I think this lawsuit is helping other business that's aim is making money. Google has been great source of my own growth. I believe Google is an excellent company that has a strong mission to improve people's life better using their cutting edge technology. Thank you, Google!&lt;/p&gt;</description><link>https://cyberboahn.blogspot.com/2020/10/zdnet-poll-is-google-guilty-of.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-2928471399138348139</guid><pubDate>Sat, 24 Oct 2020 01:28:00 +0000</pubDate><atom:updated>2020-10-26T09:32:17.946-07:00</atom:updated><title>VIEW from THENEWBOSTON</title><description>&lt;p&gt;&lt;span style="font-size: medium;"&gt;&lt;b&gt;Instruction: Create a temporary table called VIEW that gives you list of movie from the movie table that has greater than 8,000,000 views.&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;(Note: Views do not store data themselves and updates automatically as the source tables data updates.)&lt;/p&gt;&lt;p&gt;CREATE VIEW Jamesbond AS&lt;/p&gt;&lt;p&gt;SELECT name, view from movies&lt;/p&gt;&lt;p&gt;WHERE view&amp;gt;8,000,000&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxmr_5IeEX-pk795_234Cgxex23WitsbC-FbaILzNPjACmuXZ6A7VEYrhQFjmIIrC3f6Y5xizFDNbgV8Sh5eg_ihM6ZSShiHk2KOa4LhmQNQkBcqrPKEseaZIYWWdFSJjrRtH_auY0bAI/s1023/jamesbond.PNG" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="540" data-original-width="1023" height="235" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxmr_5IeEX-pk795_234Cgxex23WitsbC-FbaILzNPjACmuXZ6A7VEYrhQFjmIIrC3f6Y5xizFDNbgV8Sh5eg_ihM6ZSShiHk2KOa4LhmQNQkBcqrPKEseaZIYWWdFSJjrRtH_auY0bAI/w445-h235/jamesbond.PNG" width="445" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>https://cyberboahn.blogspot.com/2020/10/view.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxmr_5IeEX-pk795_234Cgxex23WitsbC-FbaILzNPjACmuXZ6A7VEYrhQFjmIIrC3f6Y5xizFDNbgV8Sh5eg_ihM6ZSShiHk2KOa4LhmQNQkBcqrPKEseaZIYWWdFSJjrRtH_auY0bAI/s72-w445-h235-c/jamesbond.PNG" width="72"/><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-6963929811303596573</guid><pubDate>Sat, 24 Oct 2020 00:44:00 +0000</pubDate><atom:updated>2020-10-26T09:32:07.539-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">sql alter/drop/rename/table</category><title>ALTER/DROP/RENAME TABLE from THENEWBOSTON</title><description>&lt;p&gt;&lt;b&gt;&lt;span style="font-size: medium;"&gt;Instruction: 1. Add 'name' column to 'movies' table. 2. Delete the added column. 3. Delete the table. 4. Rename the 'movies' table to 'netflix'.&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;ALTER TABLE movies ADD name varchar(30)&lt;/p&gt;&lt;p&gt;ALTER TABLE movies DROP COLUMN name&lt;/p&gt;&lt;p&gt;DROP TABLE movies&lt;/p&gt;&lt;p&gt;RENAME TABLE movies TO netflix&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;div class="separator" dir="rtl" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDhpMyq6TiURIzxGUHjKNzberhyEqCrKZ2XzNr0AanU_J5bh1RlGw8_Bx7MG0474G5j7Q4UVzXMlf_EmrrDIVSXPNn7haJ3hOhUzJ9kt2zydBR3Oaz0KgOrxjKh7wxZcyVglC7QyeYVrE/s732/Capture1.PNG" style="clear: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;br /&gt;&lt;/a&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoYItMiM9lk8udYzA4YgdMKYMf3OTcHr08aVzIcFTZ0uhnyNiRI5YGbGJMueCM7SgGLKHIxgCb56c6C_Bc3bAR9i_fIfb4EVRFx0mMZq1OV4w-pWtO51U1qteV4q2GHVZ8kmjk74Ou0cQ/s732/Capture1.PNG" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="164" data-original-width="732" height="121" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoYItMiM9lk8udYzA4YgdMKYMf3OTcHr08aVzIcFTZ0uhnyNiRI5YGbGJMueCM7SgGLKHIxgCb56c6C_Bc3bAR9i_fIfb4EVRFx0mMZq1OV4w-pWtO51U1qteV4q2GHVZ8kmjk74Ou0cQ/w536-h121/Capture1.PNG" width="536" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;blockquote style="border: none; margin: 0px 40px 0px 0px; padding: 0px;"&gt;&lt;blockquote style="border: none; margin: 0px 40px 0px 0px; padding: 0px;"&gt;&lt;blockquote style="border: none; margin: 0px 40px 0px 0px; padding: 0px;"&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;div class="separator" dir="rtl" style="clear: both; text-align: center;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&#129095;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;/blockquote&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;div class="separator" dir="rtl" style="clear: both; text-align: center;"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh9fM1E-8WyTeVhtob6D2HIpgHgD232WuR1zI87Y2UQHmJmPrESFuE_0ApQc80LL197l7nm-iP3zW8ZqGPi5kWhvSqzLryyvwUbbARRaCi7L2TI1FU-1nyBBP9iUIxItw3Buoqz81nK10/s648/tempsnip.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="178" data-original-width="648" height="146" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjh9fM1E-8WyTeVhtob6D2HIpgHgD232WuR1zI87Y2UQHmJmPrESFuE_0ApQc80LL197l7nm-iP3zW8ZqGPi5kWhvSqzLryyvwUbbARRaCi7L2TI1FU-1nyBBP9iUIxItw3Buoqz81nK10/w532-h146/tempsnip.png" width="532" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style="clear: right; margin-bottom: 1em; margin-left: 1em; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>https://cyberboahn.blogspot.com/2020/10/alterdroprename-table.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoYItMiM9lk8udYzA4YgdMKYMf3OTcHr08aVzIcFTZ0uhnyNiRI5YGbGJMueCM7SgGLKHIxgCb56c6C_Bc3bAR9i_fIfb4EVRFx0mMZq1OV4w-pWtO51U1qteV4q2GHVZ8kmjk74Ou0cQ/s72-w536-h121-c/Capture1.PNG" width="72"/><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-29615019034355248</guid><pubDate>Sat, 24 Oct 2020 00:11:00 +0000</pubDate><atom:updated>2020-10-26T09:31:59.809-07:00</atom:updated><title>CREATE TABLE &amp; NOT NULL &amp; AUTO INCREMENT from THENEWBOSTON</title><description>&lt;p&gt;&lt;span style="font-size: medium;"&gt;&lt;b&gt;Instruction: Create a table with id that auto-increments and columns that is not empty such as username and password.&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;CREATE TABLE movie (&lt;/p&gt;&lt;p&gt;id int NOT NULL AUTO_INCREMENT,&lt;/p&gt;&lt;p&gt;username varchar(30) NOT NULL,&lt;/p&gt;&lt;p&gt;password varchar(20) NOT NULL,&lt;/p&gt;&lt;p&gt;PRIMARY KEY(id)&lt;/p&gt;&lt;p&gt;)&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOCnhGblO9IfQH-bFC5EfUSsz_rhBbjyv-HfTv5VTW0bxUUfsRrc7lTBBhYzoVuQkl3kOQOYoLj1_NpVkKGKQD_EFgSIKWr258dj1DMNQlAeiymuM-qSwXJKYdqVjPIs_uIZ-MsADrsoI/s1129/Capture.PNG" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="422" data-original-width="1129" height="241" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOCnhGblO9IfQH-bFC5EfUSsz_rhBbjyv-HfTv5VTW0bxUUfsRrc7lTBBhYzoVuQkl3kOQOYoLj1_NpVkKGKQD_EFgSIKWr258dj1DMNQlAeiymuM-qSwXJKYdqVjPIs_uIZ-MsADrsoI/w644-h241/Capture.PNG" width="644" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>https://cyberboahn.blogspot.com/2020/10/not-null-auto-increment.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOCnhGblO9IfQH-bFC5EfUSsz_rhBbjyv-HfTv5VTW0bxUUfsRrc7lTBBhYzoVuQkl3kOQOYoLj1_NpVkKGKQD_EFgSIKWr258dj1DMNQlAeiymuM-qSwXJKYdqVjPIs_uIZ-MsADrsoI/s72-w644-h241-c/Capture.PNG" width="72"/><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-6771374322862549112</guid><pubDate>Fri, 23 Oct 2020 18:26:00 +0000</pubDate><atom:updated>2020-10-26T09:31:49.927-07:00</atom:updated><title>UPDATE &amp; DELETE from THENEWBOSTON</title><description>&lt;p&gt;&lt;span style="font-size: medium;"&gt;&lt;b&gt;&amp;nbsp;Instruction: Edit Astrazeneca PLC to Astrazeneca and delete Sinovac.&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;UPDATE company SET name="Astrazeneca" WHERE name="Astrazeneca PLC";&lt;/p&gt;&lt;p&gt;DELETE FROM company WHERE name="Sinovac"&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;table style="border-spacing: 1px; color: #333333; font-family: Helvetica, Arial, sans-serif; padding: 0px 3px; width: 667.2px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;name&lt;/th&gt;&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; height: 0px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;symbol&lt;/th&gt;&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;country&lt;/th&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Johnson &amp;amp; Johnson&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;JNJ&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;US&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Pfizer&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;PFE&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;US/Germany&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Moderna&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;MRNA&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;US&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Astrazeneca&lt;span&gt;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;AZN&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;UK&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;GlaxoSmithkilne&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;GSK&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;UK/France&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Novavax&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;NVAX&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;US&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Casino Biologics&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;6185[Hong Kong]&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;China&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description><link>https://cyberboahn.blogspot.com/2020/10/update-delete.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-2117658012146854462</guid><pubDate>Fri, 23 Oct 2020 17:50:00 +0000</pubDate><atom:updated>2020-10-26T09:31:42.569-07:00</atom:updated><title>INSERT INTO from THENEWBOSTON</title><description>&lt;p&gt;&lt;span style="font-size: medium;"&gt;&lt;b&gt;&amp;nbsp;Instruction: Insert the companies in China to the company table.&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;INSERT INTO company("name, symbol, country") VALUES&amp;nbsp;&lt;/p&gt;&lt;p&gt;("Casino Biologics, 6185[Hong Kong], China"),&lt;/p&gt;&lt;p&gt;("Sinovac, Private, China")&lt;/p&gt;&lt;table style="border-spacing: 1px; color: #333333; font-family: Helvetica, Arial, sans-serif; padding: 0px 3px; width: 667.2px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;name&lt;/th&gt;&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; height: 0px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;symbol&lt;/th&gt;&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;country&lt;/th&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Johnson &amp;amp; Johnson&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;JNJ&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;US&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Pfizer&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;PFE&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;US/Germany&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Moderna&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;MRNA&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;US&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Astrazeneca PLC&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;AZN&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;UK&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;GlaxoSmithkilne&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;GSK&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;UK/France&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Novavax&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;NVAX&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;US&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Casino Biologics&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;6185[Hong Kong]&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;China&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;&lt;span style="color: black; font-family: &amp;quot;Times New Roman&amp;quot;; text-align: left;"&gt;Sinovac&lt;/span&gt;&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Private&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;China&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;


&lt;br /&gt;</description><link>https://cyberboahn.blogspot.com/2020/10/insert-into.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-6217111041757063468</guid><pubDate>Fri, 23 Oct 2020 17:32:00 +0000</pubDate><atom:updated>2020-10-26T09:31:35.062-07:00</atom:updated><title>Full-Text Searching from THENEWBOSTON</title><description>&lt;p&gt;&amp;nbsp;&lt;b&gt;&lt;span style="font-size: medium;"&gt;Instruction: Give me all the Covid-19 Vaccine Candidates in the US and exclude companies in China.&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;ALTER TABLE company ADD FULLTEXT (country)&lt;/p&gt;&lt;p&gt;SELECT name, symbol, country FROM company&amp;nbsp;&lt;/p&gt;&lt;p&gt;WHERE Match(country) Against("+US - CHINA" IN BOOLEAN MODE)&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;


&lt;table style="border-collapse: separate; border-spacing: 1px; color: #333333; font-family: Helvetica, Arial, sans-serif; padding: 0px 3px; width: 100%;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; font-weight: 700; height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;name&lt;/th&gt;
&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; font-weight: 700; height: 0px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;symbol&lt;/th&gt;
&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; font-weight: 700; height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;country&lt;/th&gt;


&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Johnson &amp;amp; Johnson&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;JNJ&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;US&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Pfizer&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;PFE&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;US/Germany&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Moderna&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;MRNA&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;US&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Astrazeneca PLC&lt;span&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;AZN&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;UK&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;GlaxoSmithkilne&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;GSK&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;UK/France&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Novavax&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;NVAX&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;US&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</description><link>https://cyberboahn.blogspot.com/2020/10/full-text-searching.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-7540441593112130097</guid><pubDate>Fri, 23 Oct 2020 16:43:00 +0000</pubDate><atom:updated>2020-10-26T09:31:24.193-07:00</atom:updated><title>UNION from THENEWBOSTON</title><description>&lt;p&gt;&lt;span style="font-size: medium;"&gt;&lt;b&gt;&amp;nbsp;Instruction: Give me all the top rated and the most watched James Bond movies.&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;SELECT name, rate, views FROM movies WHERE&amp;nbsp; rate &amp;gt;24&lt;/p&gt;&lt;p&gt;UNION&lt;/p&gt;&lt;p&gt;SELECT name, rate, views FROM movies WHERE views&amp;gt;1,000,000&lt;/p&gt;&lt;p&gt;(Note: Columns should be the same to work and this command will remove duplicate entries.)&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;


&lt;table style="border-collapse: separate; border-spacing: 1px; color: #333333; font-family: Helvetica, Arial, sans-serif; padding: 0px 3px; width: 100%;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; font-weight: 700; height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;name&lt;/th&gt;
&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; font-weight: 700; height: 0px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;rate&lt;/th&gt;&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; font-weight: 700; height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;views&lt;/th&gt;


&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Dr. No&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;24&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;1,000,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;FROM RUSSIA WITH LOVE&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;23&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;&lt;span style="background-color: #f1f1f1;"&gt;2,000,000&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;GOLDFINGER&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;22&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;3,000,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;THUNDERBALT&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;21&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;&lt;span style="background-color: #f1f1f1;"&gt;4,000,000&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;YOU ONLY LIVE TWICE&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;20&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;5,000,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;On HER MAJESTY'S SECRET SERVICE&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;19&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;&lt;span style="background-color: #f1f1f1;"&gt;6,000,000&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Diamonds Are Forever&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;18&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;&lt;span style="background-color: #f1f1f1;"&gt;7,000,000&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;LIVE AND LET DIE&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;17&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;8,000,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;MOONRAKER&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;16&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;&lt;span style="background-color: #f1f1f1;"&gt;8,000,000&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;FOR YOUR EYES ONLY&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;15&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;8,000,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;OCTOPUSSY&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;14&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;&lt;span style="background-color: #f1f1f1;"&gt;8,000,000&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;NEVER SAY NEVER AGAIN&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;13&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;&lt;span style="background-color: #f1f1f1;"&gt;8,000,000&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;A VIEW TO A KILL&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;12&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;8,000,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;THE LIVING DAY LINGTS&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;5&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;&lt;span style="background-color: #f1f1f1;"&gt;8,000,000&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;LICENSE TO KILL&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;6&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;8,000,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;GOLDEN EYE&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;1&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;10,000,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Tomorrow Never Dies&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;2&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;10,000,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;The World Is Not Enough&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;3&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;&lt;span style="background-color: #e1dddd;"&gt;10,000,000&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;DIE ANOTHER DAY&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;4&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;10,000,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;CASINO ROYALE&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;7&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;9,000,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;QYUANTUM OF SOLACE&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;8&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;&lt;span style="background-color: #f1f1f1;"&gt;9,000,000&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Skyfall&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;9&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;9,000,000&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Spectre&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;10&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;&lt;span style="background-color: #f1f1f1;"&gt;9,000,000&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;No Time to Die&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;11&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;9,000,000&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</description><link>https://cyberboahn.blogspot.com/2020/10/union.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-3588306381878829092</guid><pubDate>Fri, 23 Oct 2020 15:37:00 +0000</pubDate><atom:updated>2020-10-26T09:31:12.461-07:00</atom:updated><title>LEFT OUTER JOIN ... ON...from THENEWBOSTON</title><description>&lt;p&gt;&lt;span style="font-size: medium;"&gt;&lt;b&gt;Instruction: Give me all customers with their selling items even if they are not selling any items.&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;SELECT customers.name, items.name&lt;/p&gt;&lt;p&gt;FROM customers&amp;nbsp;&lt;/p&gt;&lt;p&gt;LEFT OUTER JOIN items ON customers.id=seller_id&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;



&lt;table style="border-collapse: separate; border-spacing: 1px; color: #333333; font-family: Helvetica, Arial, sans-serif; padding: 0px 3px; width: 100%;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; font-weight: 700; height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;name&lt;/th&gt;
&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; font-weight: 700; height: 0px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;name&lt;/th&gt;



&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Henry Jackson&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Google Pixel 3&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Harry Potter&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: right; transition: all 0.3s ease 0s; width: auto;"&gt;NULL&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Sherry Gibbons&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Samsung Ear Pods&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Jedi Simpson&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Beer&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Luke Skywalker&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Alexa&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Darth Vader&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Google Home&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</description><link>https://cyberboahn.blogspot.com/2020/10/left-outer-join-on.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-5268778960882829080</guid><pubDate>Mon, 19 Oct 2020 21:25:00 +0000</pubDate><atom:updated>2020-10-26T09:30:48.253-07:00</atom:updated><title>SQL basics - Join tables from THENEWBOSTON</title><description>&lt;p&gt;&amp;nbsp;&lt;b&gt;&lt;span style="font-size: medium;"&gt;Instruction: Add seller information to the items table. (You need to join two tables by finding the relation between two tables.)&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;SELECT customers.id, customers.name, items.name, items.cost&lt;/p&gt;&lt;p&gt;FROM customers, items&lt;/p&gt;&lt;p&gt;&lt;b&gt;WHERE customers.id=seller_id&lt;/b&gt;&lt;/p&gt;&lt;p&gt;ORDER BY customers.id&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;table style="border-collapse: separate; border-spacing: 1px; color: #333333; font-family: Helvetica, Arial, sans-serif; padding: 0px 3px; width: 100%;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; font-weight: 700; height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;id&lt;/th&gt;
&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; font-weight: 700; height: 0px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;name&lt;/th&gt;
&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; font-weight: 700; height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;name&lt;/th&gt;
  &lt;th style="background: rgb(177, 182, 175); border-radius: 0px; font-weight: 700; height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;cost&lt;/th&gt;


&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;1&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Laura Kwon&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Chocolate&lt;/td&gt;
  &lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;10&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;2&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Bucky Parker&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Books&lt;/td&gt;
  &lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;20&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;3&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Noah Burger&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Pixel 10&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;30&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;4&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;David Smith&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Laptop&lt;/td&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;40&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;5&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Teresa Jackson&lt;/td&gt;&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Yoga pants&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;50&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;6&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Gary Foster&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;Monitor&lt;/td&gt;&lt;td style="background: rgb(225, 221, 221); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;60&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;</description><link>https://cyberboahn.blogspot.com/2020/10/sql-basics-join-tables.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-9175170386653969087</guid><pubDate>Mon, 19 Oct 2020 20:47:00 +0000</pubDate><atom:updated>2020-10-26T09:30:33.020-07:00</atom:updated><title>SQL Basics -Subquery from THENEWBOSTON</title><description>&lt;p&gt;&lt;b&gt;&lt;span style="font-size: medium;"&gt;  Instruction: Give me the name of an item that costs the least. &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt; SELECT name, MIN(cost)&lt;/p&gt; &lt;p&gt;FROM items&lt;/p&gt; &lt;p&gt;WHERE name LIKE "%boxes of chocolates"&lt;/p&gt; &lt;p&gt;AND seller_id &lt;/p&gt;&lt;p&gt;IN(&lt;/p&gt;
  
&lt;p&gt;  SELECT seller_id FROM items WHERE name LIKE "%boxes of chocolates"&lt;/p&gt;
  
&lt;p&gt;  )
&lt;/p&gt;





&lt;table style="border-collapse: separate; border-spacing: 1px; color: #333333; font-family: Helvetica, Arial, sans-serif; padding: 0px 3px; width: 100%;"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; font-weight: 700; height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;name&lt;/th&gt;
&lt;th style="background: rgb(177, 182, 175); border-radius: 0px; font-weight: 700; height: 0px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;MIN(cost)&lt;/th&gt;



&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;3 boxes of chocolates&lt;/td&gt;
&lt;td style="background: rgb(241, 241, 241); height: 50px; text-align: center; transition: all 0.3s ease 0s; width: auto;"&gt;30.4899997711182&lt;/td&gt;



&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div&gt;Source:&amp;nbsp;&lt;/div&gt;&lt;div&gt;https://youtu.be/rDqtBKEY9Ok&lt;/div&gt;&lt;div&gt;https://youtu.be/6BfofgkrI3Y&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>https://cyberboahn.blogspot.com/2020/10/sql-basics-subquery.html</link><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-924951198664525214.post-2872937187576614906</guid><pubDate>Mon, 19 Oct 2020 16:25:00 +0000</pubDate><atom:updated>2020-11-05T15:01:43.520-08:00</atom:updated><title>SQL basics -GROUP BY  from THENEWBOSTON</title><description>&lt;p&gt;&lt;span style="font-size: medium;"&gt;Instruction: Give me the seller ID and number of items from each seller who listed 3 or more items arranged from highest to lowest.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;SELECT seller_id, count(*) AS item_count&amp;nbsp;&lt;/p&gt;&lt;p&gt;FROM items&amp;nbsp;&lt;/p&gt;&lt;p&gt;GROUP BY seller_id&amp;nbsp;&lt;/p&gt;&lt;p&gt;HAVING COUNT(*)&amp;gt;=3&lt;/p&gt;&lt;p&gt;ORDER BY item_count DESC&lt;/p&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhdDoJjpE9kqyOMHA77eLKR83TIRb_QO-RNJDcqVp2AaCiuH02Z_2xvb6bABDZxwn7ztFcj3LSInhfxjskwWLQB8YoX6J_FfCEcFL6yQ2Cq1K4VIbHyxj2w5KvctvMMWlvjMKTrRjjFkM/s2160/Screenshot_20201019-124907.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1080" data-original-width="2160" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhdDoJjpE9kqyOMHA77eLKR83TIRb_QO-RNJDcqVp2AaCiuH02Z_2xvb6bABDZxwn7ztFcj3LSInhfxjskwWLQB8YoX6J_FfCEcFL6yQ2Cq1K4VIbHyxj2w5KvctvMMWlvjMKTrRjjFkM/s320/Screenshot_20201019-124907.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;source:&amp;nbsp;&lt;a href="https://youtu.be/GjjU6gdfXzc" target="_blank"&gt;https://youtu.be/GjjU6gdfXzc&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</description><link>https://cyberboahn.blogspot.com/2020/10/sql-basics.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhdDoJjpE9kqyOMHA77eLKR83TIRb_QO-RNJDcqVp2AaCiuH02Z_2xvb6bABDZxwn7ztFcj3LSInhfxjskwWLQB8YoX6J_FfCEcFL6yQ2Cq1K4VIbHyxj2w5KvctvMMWlvjMKTrRjjFkM/s72-c/Screenshot_20201019-124907.png" width="72"/><thr:total>0</thr:total><author>laura@hkcent.org (Laura Collins)</author></item></channel></rss>