Tech Kaizen

passion + usefulness = success .. change is the only constant in life

Search this Blog:

Burp Proxy: SSL inspection Tool

Burp Suite is a powerful web security testing tool that provides a comprehensive platform for identifying and exploiting vulnerabilities in web applications. It offers a range of features and tools to help security professionals and testers assess the security of web applications and APIs.

Burp Proxy can be used for SSL inspection. It operates as a web proxy server between the browser and target applications. It enables you to intercept, inspect, and modify traffic that passes in both directions. You can use this to test HTTPS traffic. It can be used to perform various attacks, including Man-in-the-Middle (MITM) attacks. Burp Proxy is an essential component of Burp Suite's user-driven workflow. You can use it to send requests to Burp's other tools..


Key Features of Burp Suite:


    1. Proxy: Intercepts and modifies HTTP/HTTPS traffic, allowing for manual inspection and testing.

    2. Scanner: Automatically scans web applications for vulnerabilities, such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF).

    3. Repeater: Allows for manual manipulation and replay of HTTP requests.

    4. Sequencer: Helps identify predictable patterns in web application requests.

    5. Intruder: Enables automated brute force attacks and custom payload testing.

    6. Spider: Maps web applications to discover hidden content and potential vulnerabilities.

    7. Debugger: Provides a detailed view of HTTP requests and responses, including headers, cookies, and payloads.

    8. Extensibility: Supports custom extensions and plugins to add new features and functionality.

Use Cases of Burp Suite:

    1. Web application penetration testing

    2. Vulnerability assessment

    3. Security auditing

    4. API testing

    5. Bug hunting

    6. Web application development and testing


Other Web Application Security Tools:

    1. OWASP ZAP (Zed Attack Proxy): A web application security scanner that can also be used to inspect SSL/TLS traffic. It can be used to identify SSL/TLS vulnerabilities and other security issues in web applications.

    2. Metasploit: A powerful penetration testing framework that can be used for web application security testing, along with other types of attacks.

    3. Nmap: A network scanner that can also be used for web application security testing.

    4. W3af (Web Application Attack Framework): A modular web application security testing framework that can be used for various types of attacks.

    5. Arachni: A Ruby-based web application security scanner that offers features like vulnerability scanning, fuzzing, and reporting.

Specialized SSL/TLS Inspection Tools:

    1. SSLyze: A Python-based tool that can be used to analyze SSL/TLS certificates, cipher suites, and other details of SSL/TLS connections. It can also be used to identify SSL/TLS vulnerabilities.

    2. TestSSLSh: A command-line tool that can be used to test SSL/TLS servers for vulnerabilities. It can also be used to analyze SSL/TLS certificates and cipher suites.

    3. SSL Labs: A web-based service that can be used to test SSL/TLS servers for vulnerabilities. It provides detailed reports on the security of SSL/TLS configurations.


ref:

Burp Suite @ https://portswigger.net/burp

Burp Proxy @ https://portswigger.net/burp/documentation/desktop/tools/proxy 

Burp Suite download @ https://portswigger.net/burp/documentation/desktop/getting-started/download-and-install

OWASP ZAP Proxy @ https://www.zaproxy.org/ 

ZAP Proxy download @ https://www.zaproxy.org/download/

ZAP Proxy github @ https://github.com/zaproxy/zaproxy

Security Testing Tools @ https://qawerk.com/blog/top-10-open-source-software-security-testing-tools/

Labels: CYBERSECURITY, SOFTWARE SECURITY

StrongSwan: open-source VPN (Virtual Private Network) software

StrongSwan is a free and open-source VPN (Virtual Private Network) software that provides secure and reliable network connections. It supports various VPN protocols, including IPsec, IKEv1, IKEv2, and L2TP/IPsec. StrongSwan is known for its flexibility, security, and performance, making it a popular choice for both personal and enterprise use.

IPSec (Internet Protocol Security) is a suite of protocols designed to provide secure communication over IP networks. IPSec (Internet Protocol Security) tunnels are secure virtual connections established between two network endpoints over a public network, such as the internet. These tunnels provide a secure and private channel for data transmission, protecting sensitive information from unauthorized access.

Key features of StrongSwan: 

Multiple VPN protocols: Supports a wide range of VPN protocols to meet different security and performance requirements.

Strong security: Implements robust encryption algorithms and authentication mechanisms to protect data in transit.

Open-source: Available under an open-source license, allowing for customization and community contributions.


Common use cases for StrongSwan:
 

Remote access: Enables secure remote access to corporate networks from anywhere in the world.

VPN client:
Can be used as a VPN client to connect to VPN servers.

Labels: CYBERSECURITY, SOFTWARE SECURITY, SYSTEM and NETWORK ADMINISTRATION

Awesome AI: AI Tools

Awesome AI typically refers to curated lists of resources related to artificial intelligence. These lists can cover a wide range of topics, including:  

  • Tools: Software and platforms for building AI applications.
  • Courses: Educational materials to learn about AI.  
  • Books: In-depth knowledge and understanding of AI concepts.
  • Lectures: Video-based learning resources on AI.  
  • Papers: Research papers on cutting-edge AI developments.  

Popular Awesome AI Repositories: There are several popular Awesome AI repositories on GitHub:

    1. owainlewis/awesome-artificial-intelligence: A comprehensive list of AI resources.

    2. re50urces/Awesome-AI: Focused on AI tools and applications.   


Search AI products @ https://www.aiawesome.com/

Labels: AI (Artificial Intelligence)

Hugging Face: The AI Community Hub

Hugging Face is a leading platform that has become the go-to destination for machine learning practitioners, researchers, and enthusiasts. It provides a comprehensive ecosystem for building, training, and deploying state-of-the-art AI models.

Key Features and Offerings: 

    1. Model Hub: A vast repository of pre-trained models covering various tasks like text generation, image classification, speech recognition, and more.

    2. Datasets: A curated collection of high-quality datasets for training and evaluating models.

    3. Transformers Library: An open-source library for building and training state-of-the-art natural language processing models.

    4. Community: A thriving community of AI experts sharing knowledge, collaborating on projects, and contributing to open-source development.

    5. Inference API: A simple way to deploy models and serve predictions without managing infrastructure. 

 Practical Use Cases:

    1. Rapid Prototyping: Quickly experiment with different models and datasets to find the best solution for a problem.
 

    2. Model Deployment: Deploy models to production with minimal effort using the Inference API.
 

    3. Education and Learning: Access tutorials, courses, and resources to learn about machine learning. 

    4. Research: Collaborate with other researchers and contribute to the development of new models and techniques.


Hugging Face vs Kaggle:


    Hugging Face specializes in natural language processing (NLP) and provides a platform for sharing pre-trained models, datasets, and libraries. It has extensive collection of pre-trained NLP models.

    Kaggle is primarily a platform for data science competitions, datasets, and community-driven projects. It has diverse range of datasets and competitions.

resources:

    1. Hugging Face Projects: https://huggingface.co/huggingface-projects 

    2. Hugging Face GitHub Repository: https://github.com/huggingface/awesome-huggingface

    3. Hugging Face Forums: https://discuss.huggingface.co/c/course/course-event/25

    4. Kaggle: https://www.kaggle.com/

Labels: AI (Artificial Intelligence), AI/ML

Popular AI Libraries

The world of AI is vast and constantly evolving, with numerous libraries catering to different needs and expertise levels. Here are some of the most renowned ones:
 

Core Libraries for Data Manipulation and Numerical Computing:

    1. NumPy: The cornerstone for numerical operations, providing efficient array and matrix operations.

    2. Pandas: Offers data structures and tools for data manipulation and analysis, making it essential for data preprocessing.
 

Machine Learning Libraries:

    1. Scikit-learn: A versatile library for classic machine learning algorithms, covering classification, regression, clustering, and more.

    2. XGBoost: Known for its speed and accuracy, especially in gradient boosting algorithms.
 

Deep Learning Frameworks:

    1. TensorFlow: A flexible and scalable platform developed by Google, suitable for a wide range of deep learning applications.

    2. PyTorch: Known for its dynamic computational graph, making it popular for research and rapid prototyping.

    3. Keras: A high-level API that simplifies building and training neural networks, often used on top of TensorFlow or PyTorch.
 

Natural Language Processing (NLP) Libraries:

    1. NLTK (Natural Language Toolkit): Offers a suite of tools for NLP tasks like tokenization, stemming, and sentiment analysis.

    2. spaCy: Known for its efficiency and accuracy, providing industrial-strength NLP capabilities.

    3. Transformers: A state-of-the-art library for NLP tasks, based on the transformer architecture.


Choosing the right library:
The best library for your project depends on several factors:

    1. Task: What kind of AI problem are you solving?

    2. Data: What type and size of data are you working with?

    3. Performance: What level of performance is required?

    4. Ease of use: How familiar are you with programming and AI concepts?

    5. Community support: Is there a strong community around the library?

Labels: AI (Artificial Intelligence)

Langchain fakeLLM

Langchain is a powerful Python framework designed to simplify the development of applications powered by large language models (LLMs). It provides a structured approach to building complex LLM-based applications by offering a variety of tools and components.


Langchain also serves as an effective abstraction layer for making api calls to all supported large language models (LLMs).

Langchain provides a 
fake LLM for testing purposes. This is invaluable for developing and debugging your LLM applications without incurring actual API costs or dealing with potential rate limits.


LangChang FakeLLM module @

  • https://langchain-contrib.readthedocs.io/en/latest/llms/fake.html
  • https://api.python.langchain.com/en/latest/llms/langchain_community.llms.fake.FakeListLLM.html 


Python LangChain github @ 

  • https://github.com/langchain-ai/langchain
  • https://github.com/langchain-ai/langchain/blob/master/libs/langchain/langchain/llms/fake.py 


Key Features of Langchain's Fake LLM:

  • Customizable Responses: You can define specific responses for particular prompts, allowing you to simulate various LLM behaviors.

  • Sequential Responses: Create a list of pre-defined responses that will be returned sequentially for each prompt.

  • Error Simulation: Simulate LLM errors to test your application's robustness.

  • Delay Simulation: Introduce artificial delays to mimic real-world LLM latency.

  • Streaming Support: Simulate streaming responses for a more realistic experience.


UseCases:

  • Testing LLM Integrations: Verify that your code works as expected with different LLM providers.

  • Debugging Prompt Engineering: Experiment with different prompts without incurring real costs.

  • Developing LLM Chains: Test complex LLM chains without relying on external services.

  • Offline Development: Work on your application offline without an internet connection.


Labels: AI (Artificial Intelligence)

Guardrails in LLMs

Guardrails in Large Language Models (LLMs) are mechanisms designed to ensure the model behaves within acceptable boundaries, avoiding harmful outputs and maintaining alignment with ethical guidelines. These guardrails can be implemented at multiple stages of the model's lifecycle, from training and fine-tuning to inference and deployment. Guardrails are mechanisms designed to ensure Large Language Models (LLMs) operate within predetermined boundaries, preventing potential misuse or harm. 

These guardrails are essential for:

  • Safety: Preventing LLMs from generating harmful or toxic content.
  • Security: Protecting against adversarial attacks or data breaches.
  • Compliance: Ensuring LLMs adhere to regulations and ethical standards.

Types of Guardrails:
  • Input Validation: Verifying user input to prevent malicious data.
  • Output Filtering: Removing harmful or sensitive content from generated output.
  • Contextual Understanding: Ensuring LLMs comprehend the context and nuances of user requests.
  • Transparency: Providing clear explanations for LLM-generated content and decisions.
  • Accountability: Establishing clear lines of accountability for LLM development and deployment.

Guardrails in LLM Examples:
Here are some examples of guardrails in Large Language Models (LLMs):
  1. Content Filters:
    • Profanity filters to remove offensive language
    • Hate speech detection to prevent discriminatory content
  2. Contextual Understanding:
    • Detecting sarcasm or irony to prevent misinterpretation
    • Identifying sensitive topics (e.g., mental health, trauma) to provide supportive responses
  3. Knowledge Constraints:
    • Limiting medical advice to prevent misinformation
    • Restricting financial advice to prevent unauthorized transactions
  4. Output Filtering:
    • Removing personally identifiable information (PII) to protect user privacy
    • Hiding sensitive information (e.g., passwords, credit card numbers)
  5. Robustness Testing:
    • Adversarial testing to detect vulnerabilities
    • Red teaming to simulate attacks and improve defenses
  6. Human Oversight:
    • Human review of generated content for accuracy and appropriateness
    • User feedback mechanisms to report concerns or errors
  7. Transparency:
    • Providing explanations for generated content and decisions
    • Disclosing data sources and training methods
  8. Accountability:
    • Establishing clear lines of accountability for LLM development and deployment
    • Regular auditing and compliance checks
ref:

guardrails github @ https://github.com/guardrails-ai

Azure AI Content Safety Sample Repo @ https://github.com/Azure-Samples/AzureAIContentSafety

Meta Prompt-Guard @ https://github.com/meta-llama/PurpleLlama/tree/main/Prompt-Guard

Purple Llama @ https://github.com/meta-llama/PurpleLlama

huggingface/huggingface-llama-recipes: prompt_guard.ipynb @ https://github.com/huggingface/huggingface-llama-recipes/blob/main/prompt_guard.ipynb

Labels: AI (Artificial Intelligence)

SSL Bumping vs. SSL Splicing

SSL Bumping and SSL Splicing are techniques used by security devices, such as proxies or firewalls, to manage SSL/TLS traffic. While SSL Bumping refers to the broader concept of intercepting and possibly decrypting SSL traffic, SSL Splicing is a specific technique within the SSL Bumping methodology. SSL Bumping requires user acceptance and breaks end-to-end encryption, whereas SSL Splicing maintains encryption and does not require user intervention.

SSL Bumping: Full Interception and Decryption

In SSL Bumping, the proxy server generates a temporary SSL certificate for the target website. This technique involves full decryption and inspection of traffic, which provides deep security analysis but at the cost of performance and privacy. A company wants to inspect all web traffic for malware, data leaks, and policy compliance. They deploy a proxy server configured to perform SSL Bumping.

Primarily used for inspecting encrypted traffic, such as in corporate firewalls or parental control software.

Technique used:
  • Temporary SSL Certificate: Generated by the proxy server to intercept the connection.
  • Man-in-the-Middle (MitM): The proxy server acts as a MitM, intercepting and decrypting the traffic.
  • Encryption Key Exchange: The client and proxy server exchange encryption keys, enabling decryption.

SSL Splicing: Selective Interception Without Decryption

SSL Splicing does not generate a temporary certificate. This method is less intrusive, as it only inspects the initial handshake and does not decrypt the content, making it more efficient and privacy-friendly but with limited security enforcement. A company wants to optimize network performance by avoiding the decryption process for certain types of traffic, while still enforcing some level of security. 

Primarily used for content filtering, such as blocking specific websites or categories. 

Technique used:

  • SSL/TLS Session Key Extraction: Extracting session keys from the SSL/TLS handshake.
  • Data Stream Inspection: Inspecting the decrypted data stream in real-time.

Labels: CYBERSECURITY, SOFTWARE SECURITY

SSL Inspection vs SSL Bumping

SSL Inspection and SSL Bumping are techniques used by network security devices (like firewalls, proxies, and intrusion detection/prevention systems) to monitor and filter HTTPS traffic. Both are designed to break the encryption of SSL/TLS to inspect the content of encrypted communication, but they differ in how they accomplish this and the impact they have on the communication. The key difference between SSL inspection and SSL bumping lies in how they handle server certificates.

SSL Inspection: Does not Mimic

  • Focuses on decrypting and analyzing the content of the HTTPS traffic.
  • Doesn't replace the server's certificate with its own.
  • Relies on pre-installed trusted certificates on client devices for the initial secure connection.
  • Browsers don't raise any warnings because they see a valid certificate chain from a trusted CA.

SSL Bumping: Mimics Server Certificate

  • Primarily used to gain access to the encrypted data for inspection within a proxy environment.
  • Replaces the server's certificate with a self-signed certificate issued by the proxy server itself.
  • This disrupts the standard trust chain as the client device doesn't have the proxy's certificate pre-installed as trusted.
  • Browsers typically display security warnings due to the untrusted certificate, alerting users to a potential security risk.


Choosing the Right Method:

    SSL Inspection: Preferred for security analysis when a deeper look at encrypted traffic is needed (e.g., malware scanning, data filtering). It offers a more secure approach with trusted certificates.

    SSL Bumping: Generally discouraged due to security risks and potential website breakage due to certificate pinning. It might be used in specific, controlled environments with user awareness and on a closed network.

Labels: SOFTWARE SECURITY

Open source tools to boost your productivity

Open source tools to boost your productivity:


1. Penpot: Design and prototyping(Alternative to Figma)

2. ⁠Cal.com: Scheduling infrastructure

3. ⁠Screenity: Screen recording

4. ⁠Jitsi: Video conferencing

5. ⁠Nextcloud: Cloud storage

6. ⁠Ghost: Publishing

7. ⁠TabbyML: Coding copilot

8. ⁠Chatwoot: Customer support

9. ⁠PhotoPrism: Photo management

10. ⁠Bitwarden: Password management

11. ⁠AppFlowy: Task management

12. ⁠Dub.co: Link management

13. FreeConferenceCall: online conferencing and collaboration tool

14. GitHub Copilot: GenAI tool

15. ChatGPT: GenAI tool


ref:

Open source tools to boost your productivity @ https://techcrunch.com/2024/08/11/a-not-quite-definitive-guide-to-open-source-alternative-software/

AI Productivity Tools @ https://www.digitalocean.com/resources/articles/ai-productivity-tools


Labels: LATEST TECHNOLOGY
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

The Verge - YOUTUBE

Loading...

Google - YOUTUBE

Loading...

Microsoft - YOUTUBE

Loading...

MIT OpenCourseWare - YOUTUBE

Loading...

FREE CODE CAMP - YOUTUBE

Loading...

NEET CODE - YOUTUBE

Loading...

GAURAV SEN INTERVIEWS - YOUTUBE

Loading...

Y Combinator Discussions

Loading...

SUCCESS IN TECH INTERVIEWS - YOUTUBE

Loading...

IGotAnOffer: Engineering YOUTUBE

Loading...

Tanay Pratap YOUTUBE

Loading...

Ashish Pratap Singh YOUTUBE

Loading...

Questpond YOUTUBE

Loading...

Kantan Coding YOUTUBE

Loading...

CYBER SECURITY - YOUTUBE

Loading...

CYBER SECURITY FUNDAMENTALS PROF MESSER - YOUTUBE

Loading...

DEEPLEARNING AI - YOUTUBE

Loading...

STANFORD UNIVERSITY - YOUTUBE

Loading...

NPTEL IISC BANGALORE - YOUTUBE

Loading...

NPTEL IIT MADRAS - YOUTUBE

Loading...

NPTEL HYDERABAD - YOUTUBE

Loading...

MIT News

Loading...

MIT News - Artificial intelligence

Loading...

The Berkeley Artificial Intelligence Research Blog

Loading...

Microsoft Research

Loading...

MachineLearningMastery.com

Loading...

Harward Business Review(HBR)

Loading...

Wharton Magazine

Loading...
My photo
Krishna Kishore Koney
View my complete profile
" It is not the strongest of the species that survives nor the most intelligent that survives, It is the one that is the most adaptable to change "

View krishna kishore koney's profile on LinkedIn

Monthly Blog Archives

  • ►  2025 (2)
    • ►  May (1)
    • ►  April (1)
  • ▼  2024 (18)
    • ►  December (1)
    • ►  October (2)
    • ►  September (5)
    • ▼  August (10)
      • Burp Proxy: SSL inspection Tool
      • StrongSwan: open-source VPN (Virtual Private Netwo...
      • Awesome AI: AI Tools
      • Hugging Face: The AI Community Hub
      • Popular AI Libraries
      • Langchain fakeLLM
      • Guardrails in LLMs
      • SSL Bumping vs. SSL Splicing
      • SSL Inspection vs SSL Bumping
      • Open source tools to boost your productivity
  • ►  2022 (2)
    • ►  December (2)
  • ►  2021 (2)
    • ►  April (2)
  • ►  2020 (17)
    • ►  November (1)
    • ►  September (7)
    • ►  August (1)
    • ►  June (8)
  • ►  2019 (18)
    • ►  December (1)
    • ►  November (2)
    • ►  September (3)
    • ►  May (8)
    • ►  February (1)
    • ►  January (3)
  • ►  2018 (3)
    • ►  November (1)
    • ►  October (1)
    • ►  January (1)
  • ►  2017 (2)
    • ►  November (1)
    • ►  March (1)
  • ►  2016 (5)
    • ►  December (1)
    • ►  April (3)
    • ►  February (1)
  • ►  2015 (15)
    • ►  December (1)
    • ►  October (1)
    • ►  August (2)
    • ►  July (4)
    • ►  June (2)
    • ►  May (3)
    • ►  January (2)
  • ►  2014 (13)
    • ►  December (1)
    • ►  November (2)
    • ►  October (4)
    • ►  August (5)
    • ►  January (1)
  • ►  2013 (5)
    • ►  September (2)
    • ►  May (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2012 (19)
    • ►  November (1)
    • ►  October (2)
    • ►  September (1)
    • ►  July (1)
    • ►  June (6)
    • ►  May (1)
    • ►  April (2)
    • ►  February (3)
    • ►  January (2)
  • ►  2011 (20)
    • ►  December (5)
    • ►  August (2)
    • ►  June (6)
    • ►  May (4)
    • ►  April (2)
    • ►  January (1)
  • ►  2010 (41)
    • ►  December (2)
    • ►  November (1)
    • ►  September (5)
    • ►  August (2)
    • ►  July (1)
    • ►  June (1)
    • ►  May (8)
    • ►  April (2)
    • ►  March (3)
    • ►  February (5)
    • ►  January (11)
  • ►  2009 (113)
    • ►  December (2)
    • ►  November (5)
    • ►  October (11)
    • ►  September (1)
    • ►  August (14)
    • ►  July (5)
    • ►  June (10)
    • ►  May (4)
    • ►  April (7)
    • ►  March (11)
    • ►  February (15)
    • ►  January (28)
  • ►  2008 (61)
    • ►  December (7)
    • ►  September (6)
    • ►  August (1)
    • ►  July (17)
    • ►  June (6)
    • ►  May (24)
  • ►  2006 (7)
    • ►  October (7)

Blog Archives Categories

  • .NET DEVELOPMENT (38)
  • 5G (5)
  • AI (Artificial Intelligence) (9)
  • AI/ML (4)
  • ANDROID DEVELOPMENT (7)
  • BIG DATA ANALYTICS (6)
  • C PROGRAMMING (7)
  • C++ PROGRAMMING (24)
  • CAREER MANAGEMENT (6)
  • CHROME DEVELOPMENT (2)
  • CLOUD COMPUTING (45)
  • CODE REVIEWS (3)
  • CYBERSECURITY (12)
  • DATA SCIENCE (4)
  • DATABASE (14)
  • DESIGN PATTERNS (9)
  • DEVICE DRIVERS (5)
  • DOMAIN KNOWLEDGE (14)
  • EDGE COMPUTING (4)
  • EMBEDDED SYSTEMS (9)
  • ENTERPRISE ARCHITECTURE (10)
  • IMAGE PROCESSING (3)
  • INTERNET OF THINGS (2)
  • J2EE PROGRAMMING (10)
  • KERNEL DEVELOPMENT (6)
  • KUBERNETES (19)
  • LATEST TECHNOLOGY (18)
  • LINUX (9)
  • MAC OPERATING SYSTEM (2)
  • MOBILE APPLICATION DEVELOPMENT (14)
  • PORTING (4)
  • PYTHON PROGRAMMING (6)
  • RESEARCH AND DEVELOPMENT (1)
  • SCRIPTING LANGUAGES (8)
  • SERVICE ORIENTED ARCHITECTURE (SOA) (10)
  • SOFTWARE DESIGN (13)
  • SOFTWARE QUALITY (5)
  • SOFTWARE SECURITY (23)
  • SYSTEM and NETWORK ADMINISTRATION (3)
  • SYSTEM PROGRAMMING (4)
  • TECHNICAL MISCELLANEOUS (31)
  • TECHNOLOGY INTEGRATION (5)
  • TEST AUTOMATION (5)
  • UNIX OPERATING SYSTEM (4)
  • VC++ PROGRAMMING (44)
  • VIRTUALIZATION (8)
  • WEB PROGRAMMING (8)
  • WINDOWS OPERATING SYSTEM (13)
  • WIRELESS DEVELOPMENT (5)
  • XML (3)

Popular Posts

  • Observer Pattern - Push vs Pull Model
  • Porting Linux Applications to VxWorks RTOS
  • Windows FileSystem Mini Filter Driver Development
  • SSCLI(Shared Source Common Language Infrastructure)

My Other Blogs

  • Career Management: Invest in Yourself
  • Color your Career
  • Attitude is everything(in Telugu language)
WINNING vs LOSING

Hanging on, persevering, WINNING
Letting go, giving up easily, LOSING

Accepting responsibility for your actions, WINNING
Always having an excuse for your actions, LOSING

Taking the initiative, WINNING
Waiting to be told what to do, LOSING

Knowing what you want and setting goals to achieve it, WINNING
Wishing for things, but taking no action, LOSING

Seeing the big picture, and setting your goals accordingly, WINNING
Seeing only where you are today, LOSING

Being determined, unwilling to give up WINNING
Gives up easily, LOSING

Having focus, staying on track, WINNING
Allowing minor distractions to side track them, LOSING

Having a positive attitude, WINNING
having a "poor me" attitude, LOSING

Adopt a WINNING attitude!

Total Pageviews

who am i

My photo
Krishna Kishore Koney

Blogging is about ideas, self-discovery, and growth. This is a small effort to grow outside my comfort zone.

Most important , A Special Thanks to my parents(Sri Ramachandra Rao & Srimathi Nagamani), my wife(Roja), my lovely daughter (Hansini) and son (Harshil) for their inspiration and continuous support in developing this Blog.

... "Things will never be the same again. An old dream is dead and a new one is being born, as a flower that pushes through the solid earth. A new vision is coming into being and a greater consciousness is being unfolded" ... from Jiddu Krishnamurti's Teachings.

Now on disclaimer :
1. Please note that my blog posts reflect my perception of the subject matter and do not reflect the perception of my Employer.

2. Most of the times the content of the blog post is aggregated from Internet articles and other blogs which inspired me. Due respect is given by mentioning the referenced URLs below each post.

Have a great time

My LinkedIn Profile
View my complete profile

Failure is not falling down, it is not getting up again. Success is the ability to go from failure to failure without losing your enthusiasm.

Where there's a Will, there's a Way. Keep on doing what fear you, that is the quickest and surest way to to conquer it.

Vision is the art of seeing what is invisible to others. For success, attitude is equally as important as ability.

Favourite RSS Syndications ...

Google Developers Blog

Loading...

Blogs@Google

Loading...

Berklee Blogs » Technology

Loading...

Martin Fowler's Bliki

Loading...

TED Blog

Loading...

TEDTalks (video)

Loading...

Psychology Today Blogs

Loading...

Aryaka Insights

Loading...

The Pragmatic Engineer

Loading...

Stanford Online

Loading...

MIT Corporate Relations

Loading...

AI at Wharton

Loading...

OpenAI

Loading...

AI Workshop

Loading...

Hugging Face - Blog

Loading...

BYTE BYTE GO - YOUTBUE

Loading...

Google Cloud Tech

Loading...

3Blue1Brown

Loading...

Bloomberg Originals

Loading...

Dwarkesh Patel Youtube Channel

Loading...

Reid Hoffman

Loading...

Aswath Damodaran

Loading...