Pages

Showing posts with label difference. Show all posts
Showing posts with label difference. Show all posts

Saturday, July 22, 2017

Difference Between Medical Billing Software and EMR

Difference Between Medical Billing Software and EMR


Medical billing and EMR software systems are often designed to have overlapping features that improve the functionality and usability of the systems in order to make them a �one-stop-solution� for a practice�s medical IT needs. As a result, medical billing software and EMRs end up being interchangeably used discounting the primary objectives of each of the systems.

Medical Billing Software vs. EMR

Many EMR companies are going the whole way to provide doctors with a single, comprehensive solution that will help them achieve Meaningful Use by incorporating crucial features like clinical notes, patient information and history, medication/prescription/drug allergies, diagnosis/treatments/procedures, patient scheduling, appointment reminders, e-prescribing, electronically available results, scans and reports, patient education resources, clinical decision support as well as full-fledged medical billing programs.

Specialized medical billing software on the other hand, is particularly programmed to maintain and keep detailed records of tests, procedures, examinations, diagnoses and treatments conducted on patients. It combines this medical information with the patient�s policy details to formulate a complete medical record that is used to generate bills. 

The software electronically submits these bills to the patient as well as the health insurance company for payment. Before a bill can be submitted to the policy provider, it has to be coded based on Current Procedural Terminology (CPT) and International Classification of Diseases (ICD-9/ICD-10) protocols. Medical billing software systems are programmed to automatically assign these codes based on the patient�s medical record. After reviewing the bill, the insurance company sends the appropriate payment (or notice of denial) notifying the patient and practitioner via an Explanation of Benefits (EOB) letter which is added to the patient�s medical billing record by the software. In case of a dispute, rectification of bills with errors or missing information and follow up on claims, the software will update the patient�s medical record and billing details with the revised information. 

Medical billing and coding software is thus equipped to seamlessly and accurately handle all complex processes and correspondence involved in medical billing.

A typical base package of medical billing software would contain features that are restricted to medical billing and accounting functions like patient recordkeeping, claims processing, electronic claims submission, receivables management, patient billing and accounting integration. However, many software providers extend their scope to include features like practice management, scheduling and other administrative and clinical functions that are generally a part of EMR software systems.

Therefore, the difference between medical billing software and an EMR is that of core functionality. While medical billing software focuses on a practice�s medical billing procedures and billing-related administrative and financial processes, features of an EMR are primarily concentrated on clinical functions, records and outcomes

Medical billing software may serve clinical EMR functions in addition to electronic billing and coding for greater versatility. The same is true for EMR systems that incorporate specialized medical billing and coding program features to supplement their clinical applications.

References:
1. http://www.wisegeek.com/topics/medical-billing-software.htm
2. http://www.wisegeek.com/what-is-medical-billing.htm
3. http://www.medical-billing.com/blog/medicalbilling/pid-303/list-of-best-medical-billing-software/
4. http://pn.psychiatryonline.org/content/43/8/6.3.full
5. http://technology4doctors.blogspot.com/2011/02/emrs-providing-indian-doctors-with-edge.html

Read more »

Sunday, July 16, 2017

DIFFERENCE B W LED LCD

DIFFERENCE B W LED LCD


Accuracy of the color patterns: Due to the better techniques used in the LED TVs, these TVs are very accurate in their color display and that is why these are capable of presenting natural color pattern to the viewers. In this LED technology, a series of diodes is connected with each other at the edges of the LED screen and that series works more effectively to filter the natural colors of the displaying objects. When power makes these series illuminated, the effect is simply outstanding. The technological excellence of the LCD TVs is not at par with that of the LED TVs.

Levels of Contrast and black areas of the picture: Contrast between is very important difference between LCD and LED TVs. The contrast ratio of LED TVs is much better than that of the LCD TVs. The LED technology can create better dark areas on the screen due to which it can produce better images on the screen. On the other hand, the LCD screen cannot produce these black areas and that is why LCD TVs are not capable of producing very high quality contrast.

Viewing angles is a major difference between LCD and LED: The houses of the common people are becoming smaller and smaller in size these days and that is why people seldom get huge areas in their drawing rooms and living rooms. Due to this, the viewing angle becomes a major issue. It is seen that the viewing angle of LCD TVs is not flexible and the viewers are required to see the LCD TVs from an angle of 30 degrees. Any change in this viewing angle can diminish the quality of the picture to a greater extent. However, the situation is totally different with the LED TVs. The viewers are free to view their favorite programs on LED TVs as there is no such angular limitation with these high quality TVs.

Power consumption also makes a big difference between LCD and LED TVs: Because of the fact that the LED TVs are made with better technical specifications, these TVs consume lesser power while switched on. This attractive feature can help people in a great way to put the electric bill lower quite considerably. It is a big advantage that is provided by the LED TVs over the LCD TVs.

Size also matters as a difference between LCD and LED TVs: People everywhere also consider the size of the TVs greatly. The LED TVs are available with more options as far as the sizes are concerned. These high quality TVs are available from screen size from 17 inches to 70 inches whereas the LCD TVs range between 15 inches and 65 inches. The bigger size of the screen can certainly make a difference for the best entertainment for the viewers. These differences between the LCD and LED TVs certainly make a deeper impact upon the mind of the people who are fascinated by these technical specifications of the top class TVs
Read more »

Saturday, July 15, 2017

Difference Between Interface And Abstract Class In JAVA

Difference Between Interface And Abstract Class In JAVA



Read more »

Wednesday, July 12, 2017

Difference Between Intel Core i3 i5 and i7

Difference Between Intel Core i3 i5 and i7


Intel is a great processor manufacturing company but they have a way of confusing the buyers with fancy names like Core i3, Core i5 and Core i7. I am sure you would have heard these terms at least once in a while and wondered what they mean. Today we will discuss the basic differences between Core i3,i5 and i7 processors which i think would help you a lot in choosing your next PC.


History

In the early days, CPU power was completely taken as the clock speed at which it runs. The clock speed of a CPU gives us a nice understanding on how fast a CPU works but not actually how powerful it was. For example a CPU with a 3.0 GHz runs faster than a CPU with 2.5 GHz but the later one may be able to do more work per cycle enabling it to outperform the first one. Intel introduced naming the CPU�s differently (AMD was the first to do though but it didn�t work well for them)  using �Core� naming to move out of the clock speed race.

Difference between Intel Core i3, i5 and i7 in a Nutshell

To conclude in a statement, Core i7s are better than Core i5s, and Core i5s are better than Core i3s. The main reason here being performance. In general, Core i3 chips are found in budget PCs and low-end laptops. For a normal user who does browsing and watching videos, Core i3 works just fine. Core i3s have a low Cache size.
The mainstream or mid-range systems usually  have i5. Systems with Core i5 are good for a moderate user and light gamer.
The Core i7 CPUs are reserved for � and found usually in � high-end, expensive laptops and PCs. These are used by users who wish to do video editing, Lot of Gaming and other CPU intensive stuff.

Number of cores: Core i3, i5 and i7

Intel is again into the confusing the users work here. Typically all the Core i3s are dual core with Hyper-Threading capabilities found in many of them.
The desktop range Core i5s  are quad-core while the one�s used in Laptops ( Mobile versions) are dual-core. All Core i5s have Hyper-Threading and Turbo boost features enabled.
The Core i7s have a lot of variations in them the laptop CPUs are dual-core while the Extreme edition desktop CPU�s have upto 12 cores. Normal desktop Core i7s have 4 to 6 cores with Hyper-Threading, Turbo boosting and Overclocking abilities.
Core i7s are the best Intel has to offer for general consumers while Core i3s being the most affordable in the series ( forget Pentium).
Read more »

Friday, July 7, 2017

Difference Between RS232 and UART

Difference Between RS232 and UART


UART (or USART) - Universal (Serial) Asynchronous Receiver/Transmitter
This is, essentially, a serial communications interface. The "universal" part means that it can be configured to support many different specific serial protocols. The term is generic, and does not represent a specific standard. At minimum it means that it has a TX and an RX line, which sends a serial data stream and receives a serial data stream.
RS-232 - A standard defining the signals between two devices, defining the signal names, their purpose, voltage levels, connectors and pinouts.
This is a specific interface standard that allows for equipment interoperability. While two pieces of hardware may have UARTs, you dont know that theyll connect without damage, or communicate properly unless you know they have the same pinout and voltage standards, or include a converter or specially wired cable specific to the interconnection of these two specificl devices. To avoid the need for special converters or cables, the manufacturers may choose to follow the RS-232 standard. You know, then, that a standard RS-232 cable will connect the two.
However, neither the UART, nor the RS-232 standard define what is sent on the TX and RX lines. Generally, when people use RS-232, they use a simple 8 bit NRZ encoding with one start bit and one stop bit. Most equipment today manufactured uses this encoding, but theres no requirement to do so. You can find older equipment that includes parity bits, or uses 7 or 9 bits. The UART can be configured to support these various protocols on its TX and RX lines.
UARTs do not typically interface directly with RS-232. You will need to convert the output of the UART to the +/-12V standard that RS-232 requires. A complete RS-232 interface will typically involve both a UART and an RS-232 level converter. Further, the RS-232 standard includes the definition of several other signalling pins besides TX and RX, which you may need to use depending on the equipment you need to connect to. These will also need to be level converted, and your UART may, or may not, support these signals. If it does not you will have to control them with your software/firmware directly.
So while a UART may help you implement an RS-232 interface, it is not an RS-232 interface itself.

UART is responsible for sending and receiving a sequence of bits. At the output of a UART these bits are usually represented by logic level voltages. These bits can become RS-232, RS-422, RS-485, or perhaps some proprietary spec.
RS-232 specifies voltage levels. Notice that some of these voltage levels are negative, and they can also reach �15V. Larger voltage swing makes RS-232 more resistant to interference (albeit only to some extent).
A microcontroller UART can not generate such voltages levels by itself. This is done with help of an additional component: RS-232 line driver. A classic example of an RS-232 line driver is MAX232. If you go through the datasheet, youll notice that this IC has a charge pump, which generates �10V from +5V.
Read more »

Thursday, July 6, 2017

Difference between Shut down Hibernate and Suspend options

Difference between Shut down Hibernate and Suspend options


The �Hibernate� option is a tool capable of saving our current session and then powering down, unlike the �Shut down� option, which closes all open applications and then powers the system off. Here, we compare the Shut down, Hibernate and Suspend options and then try to figure out which one to use for a particular session. 




Parameter Shut down Hibernate Suspend
Powers down the system Yes Yes No
Closes all open applications Yes No No
Consumes power No No Yes
Relative time to power down*
Highest
Moderate

Least
Time to wake up*
Highest

Moderate

Least
Thus, particularly useful when Hardware is to repaired or replaced The system is not in use for a long period of time, say, more than 2 hours The system is not in use for a short period of time, say, upto 2 hours and the system has enough battery power to stay alive




*Actual time depends on the environment like the processor, RAM, Operating System under consideration, viruses, etc.

It should be that, the �Hibernate� option saves the current session to Hard disk, on one of the partitions on which the Operating System(Microsoft Windows or Canonical Ubuntu, etc) resides. So, when you hibernate, the Operating System locks the partition and makes is unopenable from the other operating systems, in a multi-boot computer, until the partition is either mounted as a read-only partition, or the OS that hibernated is resumed and shut down.


For example, if you have a computer that has Microsoft Windows 7 and Ubuntu 12.10 dual booted and you hibernate from Windows, you may not be able to open the �C� drive until you open Windows and use �Shut down�. This means if your Windows accidentally crashes, recovering data from the �C� drive would become a bit complicated, unless you apply some kind of work around like copying files after mounting the partition as read-only.
Read more »

Wednesday, June 28, 2017

Difference between echo and print in PHP

Difference between echo and print in PHP



PHP echo and print both are PHP Statement.

Both are used to display the output in PHP.
Difference Between Echo And Print In PHP
echo
  • echo is a statement i.e used to display the output. it can be used with parentheses echo( ) or without parentheses echo.
  • echo is faster then print
  • Using echo can pass multiple string seperated as ( , )
  • echo doesn�t return any value
Eg i
 <?php
$name="Ravi";
echo $name;
//or
echo ($name);
?>

 Output: Ravi

In the above example
Create and initialize variable($name) hold a string value=�Ravi�. we want to print the name for this ($name) variable declare inside the echo with or without parentheses .
it will display the same output.
Eg ii (pass multiple argument)
 <?php
$name = "Ravi ";
$profile = "PHP Developer";
$age = 25;
echo $name , $profile , $age, " years old";
?>

 Output: Ravi PHP Developer25 years old

In the above example
$name , $profile and $age are three variable with value=(�ravi� , �php developer� and 25) respectively.
now we want to print all three variable values together. all variables names are define inside the echo statement separated by comm or dot(, or .)
it will show the output
Eg iii (check return type)
 <?php
$name = "Ravi ";
$ret = echo $name;
?>

 Output: Parse error: syntax error, unexpected T_ECHO

In the above example
In this program we check the return type of �echo�. declare a variable $name with value=�ravi�.
now we check the return type. when we run the program it show error,because echo has no return type.
print
  • print is also a statement i.e used to display the output. it can be used with parentheses print( ) or without parentheses print.
  • it is slower than echo
  • using print can doesn�t pass multiple argument
  • print always return 1
Eg i
 <?php
$name="Ravi";
print $name;
//or
print ($name);
?>

 Output: Ravi

In the above example
Declare a variable ($name) value=�ravi�. now we want to print the name. we simply define $name inside print statement with or without parentheses.
it will show the output: �ravi� .
Eg ii (pass multiple argument)
 <?php
$name = "Ravi ";
$profile = "PHP Developer";
$age = 25;
print $name , $profile , $age, " years old";
?>

 Output: Parse error: syntax error
In the above example
Declare three variable $name, $profile, $age and hold the value(�ravi�,�php developer�,25).
now check whether it will allow execute multiple argument. Pass three variable inside the print statement separated by comma. as we run this program it show some error.
it means multiple argument are not allow in print .
Eg iii (check return type)
 <?php
$name = "Ravi ";
$ret = print $name;
//To test it returns or not
echo $ret;
?>

 Output: Ravi 
In the above example
declare a variable $name hold value=�ravi�.now we check the return type of print .
So (print $name )is store in a variable($ret) .
it will show $name value with return type=1.
Read more »

Tuesday, June 27, 2017

Difference Between SDRAM and DDR RAM Memory

Difference Between SDRAM and DDR RAM Memory



Before you know what is the Difference Between SDRAM and DDR SDRAM. You Must know First What Exactly the Meaning of Each type.

SDRAM 128m DIMM


What is SDRAM?


Synchronous dynamic random access memory (SDRAM) is dynamic random access memory (DRAM) that is synchronized with the system bus. Classic DRAM has an asynchronous interface, which means that it responds as quickly as possible to changes in control inputs. SDRAM has a synchronous interface, meaning that it waits for a clock signal before responding to control inputs and is therefore synchronized with the computers system bus. The clock is used to drive an internal finite state machine that pipelines incoming instructions. This allows the chip to have a more complex pattern of operation than an asynchronous DRAM, enabling higher speeds.

DDR SDRAM


What is DDR SDRAM?


Double data rate synchronous dynamic random access memory (DDR SDRAM) is a class of memory integrated circuits used in computers. DDR SDRAM (sometimes referred to as DDR1 SDRAM) has been superseded by DDR2 SDRAM and DDR3 SDRAM, neither of which are either forward or backward compatible with DDR SDRAM, meaning that DDR2 or DDR3 memory modules will not work in DDR equipped motherboards, and vice versa.


What is their Differences?


Dynamic Random Access Memory is used to temporarily store information on computers. DRAM is made up of many cells and each cell is referred to as a bit. A cell contains a capacitor and a transistor. Since computer machine language is made up of 1s and 0s, it has the value of one when active and zero when inactive.

SDRAM or Synchronous Random Access Memory is the result of DRAM evolution. This type of memory synchronizes the input and output signals with the system board. Its speed ratings are in MHz. SDRAM was introduced in 1996 and is still used today. SDRAM transmits every clock count at a specific time.

DDR RAM (or Double Data Rate Random Access Memory) does the same but it does so twice every clock count. This makes DDR RAM twice as fast as SDRAM. Over the years, RAM has become very fast and efficient -- and it will be exciting to see whats coming next.

The 184-pin DDR RAM-type memory has replaced the 168-pin SDRAM and is suited for computer processors that are 1GHz or higher.

The 168-pin SDRAM memory chip is not included in newly produced PCs (since 2007) and was used with processors lower than a gigahertz.

Theoretically 512 MHz Memory is 100% faster Than 256 MHz Memory is. In real life, the performance gain is much lower. If the change is worth it totally depends on the software you use. For your purpose, the only thing that will really run faster are Games. Not all games by the way, only those ones that use the higher Memory bandwidth.


More Tags: Angry Bird, Blogger, Fate , Plants Vs Zombie, Special Force, Point Blank, Ai Maps, Deep Freeze UnFreezer, Ninja Saga, Deep Freeze, Samsung SGH, Guitar Pro, USB XP Install, Yahoo 443 Problem, Turtle Odyssey, GTA San-Andreas, PlayStation, Tips Tweaks Tricks, HTML, Facebook, Animated JPG, Counter-Strike, USB Windows Format, Screensaver, USB Security.
Read more »

Friday, June 23, 2017

Difference between pslist and psscan

Difference between pslist and psscan





pslist:
"pslist" module utilizes the same algorithm as the tasklist command that would be executed on the live computer. And also, Windows Task Manager uses the same approach as well.
The above mentioned command "pslist" traverses the list of active process structures that the Windows kernel maintains.

The windows kernel uses the EPROCESS data structure to describe each running process. Contents of the EPROCESS structure allow the OS to determine where in memory the code and process address space is located and specifies the threads associated with the process. This structure also contains pointers to the structure that allows Windows( and memory analysis tools) to map from virtual memory to physical memory. In addition, the EPROCESS data structure contains pointers, which make up a doubly-linked circular list of active processes.  A forward pointer from one process EPROCESS structure points to the next process EPROCESS structure; a backward pointer specifies the address of the previous process EPROCESS structure. And, this doubly linked list of EPROCESS structure is pointed by PsActiveProcessHead

Fig. 1
The linked list as shown in fig.1 is used by tools such as Windows Task Manager,tasklist and Volatilitys pslist to display the running processes to the system.
However, malicious process can remove EPROCESS block from this list,while continuing to run. This list is not used by the kernel scheduler to actually change context and execute the process.Therefore, one method used by rootkits to hide processes is simply to unlink the process from the active process list. Once unlinked , rootkit nicely hides the process from most standard process enumeration tools.
Unlinked process continues to run normally even after the modification to the list, because scheduling in the Windows kernel is based on threads, not processes.Manipulating kernel structures in memory to hide the process is called as Direct Kernel Object Manipulation (DKOM). Hence, psscan came into existence. 
Usage:
python vol.py -f ~/Downloads/unknown.img pslist
Fig. 2
psscan:
The psscan module doesnt trust the linked list of the processes, and, instead, searches memory by heuristically looking for EPROCESS structure that represent processes.Hence, it lists all processes that are even hidden by rootkit and not shown by pslist command of volatility or tasklist command of windows. Any discrepancy between process list shown by pslist and psscan suggests that rootkit is installed.
psscan2 is optimized version of psscan and finds hidden process by scanning memory using a signature for the process data structure. But even signature scans can be evaded by crafty attackers. Signatures typically rely on "magic" values found in the process data structure. For example, in Windows XP, process data structure always begin with "x03x00x1bx00", which makes it pretty easy to find them in memory images.
But what if attaker just overwrites those four bytes with zeroes? Windows will keep running the process. Hence, the process using this technique evades the psscan2 too and giving birth to psscan3 command.
psscan3 scans is based on signature that are hard for an attacker to mess with.
Usage:
python vol.py -f ~/Downloads/unknown.img psscan


Ref: http://moyix.blogspot.in/2010/07/plugin-post-robust-process-scanner.html
Read more »

Saturday, June 17, 2017

Difference between and Variables in PHP

Difference between and Variables in PHP




$$var uses the value of the variable whose name is the value of $var.


It means $$var is known as refrence variable where as $var is normal variable.
It allows you to have a �variable�s variable� � the program can create the variable name the same way it can create any other string. .
Eg i
 <?php
$name="Rajeev";
$$name="Sanjeev";
echo $name."<br/>";
echo $$name."<br/>";
echo $Rajeev;

?>
 Output : Rajeev
Sanjeev
Sanjeev

In the above example
$name is just a variable with string value=�Rajeev�.
$$name is reference variable . $$name uses the value of the variable whose name is the value of $name.
echo $name print the value: rajeev
echo $$name print the value:Sanjeev value of this($name) variable is act as reference of second variable($$name).
echo $rajeev print the value :Sanjeev Here $rajeev is also act as reference variable.
Eg ii
 <?php
$x = "100";
$$x = 200;
echo $x."<br/>";
echo $$x."<br/>";
echo "$100";

?>
 Output : 100
200
200

In the above example
You first assign the value of a variable, ($x) as the name of another variable.
When you set $x to a value, it will replace that variable name with the value of the variable you provide.
variable $x hold value = 100.
$$x(reference variable) hold value = 200. now we want to print the value.
echo $x gives output:100
echo $$x gives output:200.
echo $100 gives value.200. because it also act as a reference variable for value = 200.
Eg iii
 <?php
$name="Rajeev";
${$name}="Sanjeev";
echo $name."<br/>";
echo ${$name}."<br/>";
echo "$Rajeev"."<br/>";
?>
 Output: Rajeev
Sanjeev
Sanjeev



Eg iv
 <?php
$name="Ravi";
${$name}="Ranjan";
${${$name}}="Rexx";
echo $name;
echo ${$name};
echo ${${$name}};
?>
 Output : Ravi
Ranjan
Rexx

In the above example
variable $name hold value =�ravi�
variable ${ $name } hold value =�Ranjan� // it also declare like ${Ravi}.
variable ${$ {$name} } hold value =�Rexx� // it act as �variable�s of variable of variable� reference.
echo $name show output:ravi
echo ${ $name } show output:Ranjan.
echo ${ $ {$name} } show output :Rexx
Read more »

Wednesday, June 14, 2017

Difference between adduser and useradd in Ubuntu server

Difference between adduser and useradd in Ubuntu server


Difference between adduser and useradd in Ubuntu-server



Both the command are used to add user in the system. But there is a big difference.
Nowadays debian has changed or replaced the useradd command with adduser.


The difference between both command is as following with the image so that will make clear sense to you people.

To check the difference between both the command do the following.

1. useradd

Open the terminal and type

$ sudo useradd user2

The above command will add the user


 $ sudo passwd user2

The above command will give the password to the user2.



Now lets try loging in.

login: user2
password:123

As you can there is no home directory is defined.And not able to create its own directory with "useradd"  command.

 You can also check the directory and the command assigned to it



==========================================================================
2. adduser

Open the terminal and type :-

$ sudo adduser user3

The adduser command takes all the information and create your personal home directory for saving your data and gives uid and gid with that.



You can see the home directory assigned to user3 by this command.

$ cat /etc/passwd | grep user3




From this tutorial you can might have understand the difference between both the command and how you can add the other or extra user  in the system.


















Read more »

Sunday, June 11, 2017

Difference Between Interface and Abstract Class

Difference Between Interface and Abstract Class


Interfaces
--contain only abstract methods
--interface cant be inherited from a class
--using interfaces we can achieve multiple inheritance
--doesnt allow accessibility modifiers (Public/Private/Internal)
--cant contain fields, constructors
--is must implementable & its scope is upto any level of its inheritence chain.

Abstract Class
--contain both abstract methods as well as concrete methods
--can extend another class and implement multiple interfaces
--we cant achieve multiple inheritance
--allows accessibility modifiers
--can contain fields, constructors
--class Abstract class is must inheritable & its scope is upto derived class
Read more »

Tuesday, June 6, 2017

Difference Between ASP NET User Controls and Custom Controls

Difference Between ASP NET User Controls and Custom Controls


Read more »

Wednesday, May 31, 2017

Difference among dlllist ldrmodules and malfind

Difference among dlllist ldrmodules and malfind


dlllist module

dlllist module list the mapped DLLs for each process. If no "-p" or "-o" parameter is given, the modules will list mapped DLLs for all processes. "dlllist" module show us the executable and any other DLLs loaded by the process.

Problems with dlllist module 

The problem with dlllist module is that most Windows executable maps lots of DLLs, so figuring out which ones are normal and which ones are malicious could be difficult and time-consuming.A bigger problem, however, is that more recently new ways,which are discussed below, of injecting DLLs into other processes have been developed that dont show when you run "dlllist" module.

Limitations of dlllist module

"dlllist" module will no longer see the DLLs which are unlinked from the LDR lists. The PEB points to many interesting data structures,such as three separate doubly-linked lists(LDR lists) of the DLLs that the process has loaded(provided it did so via the standard LoadLibrary call). But, as with the active processes linked list, a process is free to unlink a DLL from any or all of these DLL linked lists. The DLL,however will still reside in the virtual address space of the process, and there may be import address table pointers that will allow the functions in the DLL to be called by the process.

Detecting Unlinked DLLs With ldrmodules

"ldrmodules" compares the PEB list with data in the VAD. "ldrmodules" checks each allocated memory range in a process,using VAD, to see if it contains a mapped file and detects DLLs that are loaded in a process, even if theres no entry for the DLL in the processs PEB.
When a process allocates memory with VirtualAlloc, the memory manager creates an entry in the VAD tree. Along with information such as the starting and ending addresses of the allocated memory block, the VAD contains some nested structures that, if present, can identify which file is mapped into the memory region.)


ldrmodules module

You can use the "ldrmodules" plug-in for volatility to inspect discrepancies between the PEB lists and the VAD. The plug-in shows the base addresses and full paths to all mapped executables in a process. It displays a column for each of the three PEB lists, which contain "True" or "False" based on whether a DLL with the same base address exists in the list.

Limitations of ldrmodules 

There are two main arguments about the method that ldr_modules uses for detection.
  • First, a rootkit can use DKOM and overwrite members of the VAD after unlinking a DLL from the lists in the PEB. Then it will appear as if there is no memory-mapped file.
  • The second argument is  about the method used by ldr_modules is that it is possible to load DLLs into a process without using LoadLIbrary("Reflective DLL Injection"), which does not create a mapped file in the VAD or any entries in the PEB.

malfind module

Limitations of "ldrmodules" module can be overcome by "malfind" plug-in.  It identifies suspicious memory ranges based on both the contents of memory and VAD characterstics, and optionally, a configurable list of signatures that is provided in YARA format.
  • "malfind" dumps the memory ranges marked as executable and that had pool tag of "VadS" because all injected DLLs shows this property and hence it detects a majority of shellcode and DLLs injected into a process by a malicious process.
  • "malfind" views hex dumps or disassemblies of suspicious area of memory for a quick preview of its contents.
Read more »

Wednesday, May 24, 2017

Difference between integer based and string based SQL injection

Difference between integer based and string based SQL injection


Hi friends  this one i had posted a question on hackforums about difference between string based and integer based SQL injection it can be explained as follows
integer
SELECT * FROM pages WHERE page_id=10 [inject] order by title limit 1,
so the injection would be
?id=10 union select 1,2,3--
finallly you get
SELECT * FROM pages WHERE page_id=10 union select 1,2,3-- order by title limit 1,1

string

SELECT FROM pages WHERE page_id="10" [injectorder by title limit 1,
so the injection would be
?id=10 union select 1,2,3--+
final:
select * from pages where page_id="10" union select 1,2,3--+ order by title limit 1,1


so in integer based SQL injection you dont have to put a and in string based SQL injection you have to put a and a + sign at the end
the original post here
enjoy
Read more »

Tuesday, May 16, 2017

Difference between Build Rebuild Compile

Difference between Build Rebuild Compile


Recently after deploying our application, our modifications were not showing up then we rebuilt the solution and it worked, till that time i did not break my head understanding what Build & Rebuild was. Here is what i found out.

Build means compile and link only the source files that have changed since the last build, while Rebuild means compile and link all source files regardless of whether they changed or not. Build is the normal thing to do and is faster. Sometimes the versions of project target components can get out of sync and rebuild is necessary to make the build successful. In practice, you never need to Clean.

Build or Rebuild Solution builds or rebuilds all projects in the your solution, while Build or Rebuild builds or rebuilds the StartUp project, "hello" in the screen shot above. To set the StartUp project, right click on the desired project name in the Solution Explorer tab and select Set as StartUp project. The project name now appears in bold. Since the homework solutions typically have only one project, Build or Rebuild Solution is effectively the same as Build or Rebuild .

Compile just compiles the source file currently being edited. Useful to quickly check for errors when the rest of your source files are in an incomplete state that would prevent a successful build of the entire project. Ctrl-F7 is the shortcut key for Compile.
Read more »

Friday, May 12, 2017

Difference between Dynamic Binding Static Binding in Java

Difference between Dynamic Binding Static Binding in Java


Dynamic Binding vs Static Binding in Java


Dynamic Binding or Late Binding

Dynamic Binding refers to the case where compiler is not able to resolve the call and the binding is done at runtime only. Lets try to understand this. Suppose we have a class named SuperClass and another class named SubClass extends it. Now a SuperClass reference can be assigned to an object of the type SubClass as well. If we have a method (say someMethod()) in the SuperClass which we override in the SubClass then a call of that method on a SuperClass reference can only be resolved at runtime as the compiler cant be sure of what type of object this reference would be pointing to at runtime.

...
SuperClass superClass1 = new SuperClass();
SuperClass superClass2 = new SubClass();
...
superClass1.someMethod(); // SuperClass version is called
superClass2.someMethod(); // SubClass version is called
....

Here, we see that even though both the object references superClass1 and superClass2 are of type SuperClass only, but at run time they refer to the objects of types SuperClass and SubClass respectively. 

Hence, at compile time the compiler cant be sure if the call to the method someMethod() on these references actually refer to which version of the method - the super class version or the sub class version.Thus, we see that dynamic binding in Java simply binds the method calls (inherited methods only as they can be overriden in a sub class and hence compiler may not be sure of which version of
the method to call) based on the actual object type and not on the declared type of the object
reference.

Static Binding or Early Binding

If the compiler can resolve the binding at the compile time only then such a binding is called Static Binding or Early Binding. All the instance method calls are always resolved at runtime,but all thestatic method calls are resolved at compile time itself and hence we have static binding for static method calls. Because static methods are class methods and hence they can be accessed using the class name itself (in fact they are encourgaed to be used using their corresponding class names only and not by using the object references) and therefore access to them is required to be resolved during compile time only using the compile time type information. Thats the reason why static methods can not actually be overriden. 

For example:-class SuperClass{
...
public String someVariable = "Some Variable in SuperClass";
...
}
class SubClass extends SuperClass{
...
public String someVariable = "Some Variable in SubClass";
...
}
...
...
SuperClass superClass1 = new SuperClass();
SuperClass superClass2 = new SubClass();
System.out.println(superClass1.someVariable);
System.out.println(superClass2.someVariable);
...

Output:-
Some Variable in SuperClass
Some Variable in SuperClass

We can observe that in both the cases, the member variable is resolved based on the declared type of the object reference only, which the compiler is capable of finding as early as at the compile time only and hence a static binding in this case. Another example of static binding is that of private methods as they are never inherited and the compile can resolve calls to any private method at compile time only.
Read more »

Sunday, May 7, 2017

Difference Between QA and QC

Difference Between QA and QC



Many people and organizations are confused about the difference between quality assurance (QA), quality control (QC), and testing. They are closely related, but they are different concepts. Since all three are necessary to effectively manage the risks of developing and maintaining software, it is important for software managers to understand the differences.




They are defined below:

  • Quality Assurance: A set of activities designed to ensure that the development and/or maintenance process is adequate to ensure a system will meet its objectives. The planned and systematic activities implemented in a quality system so that quality requirements for a product or service will be fulfilled.

  • Quality Control: A set of activities designed to evaluate a developed work product. The observation techniques and activities used to fulfill requirements for quality.

  • Testing: The process of executing a system with the intent of finding defects. (Note that the "process of executing a system" includes test planning prior to the execution of the test cases.)



QA activities ensure that the process is defined and appropriate. Methodology and standards development are examples of QA activities. A QA review would focus on the process elements of a project - e.g., are requirements being defined at the proper level of detail. In contrast, QC activities focus on finding defects in specific deliverables - e.g., are the defined requirements the right requirements. Testing is one example of a QC activity, but there are others such as inspections. Both QA and QC activities are generally required for successful software development.


Controversy can arise around who should be responsible for QA and QC activities -- i.e., whether a group external to the project management structure should have responsibility for either QA or QC. The correct answer will vary depending on the situation, but general experience suggests that:

  • While line management should have the primary responsibility for implementing the appropriate QA, QC and testing activities on a project, an external QA function can provide valuable expertise and perspective.

  • The amount of external QA/QC should be a function of the project risk and the process maturity of an organization. As organizations mature, management and staff will implement the proper QA and QC approaches as a matter of habit. When this happens only minimal external guidance and review are needed.
Read more »