Showing posts with label #enigma. Show all posts
Showing posts with label #enigma. Show all posts

Power BI Full Course (8+ Hours) Tutorial





Cybersecurity has become a top priority for businesses of all sizes, and data analytics plays a critical role in keeping sensitive information secure. Microsoft’s Power BI platform has emerged as a leading business analytics tool for its ability to process vast amounts of data and provide visualizations that make it easy to interpret the results. In this Power BI full course tutorial, we’ll explore the platform’s capabilities, walk you through the foundational concepts of building queries and prepping data for analysis, and highlight the most useful features that can take your data analysis to the next level.

Who is this course for?

This course is designed for business analysts, data analysts, and anyone in between who wants to become proficient in data processing and visualization. If you work with data and want to learn how to organize and analyze it more efficiently, this course is for you.

What is Power BI?

Power BI is a business analytics tool from Microsoft that allows users to connect to multiple data sources, including Excel spreadsheets, cloud-based services like Salesforce, and databases. Once connected, Power BI can organize, analyze, and visualize the data using live dashboards and interactive reports.

Building Queries and Prepping Data for Analysis

Before we can start analyzing data, we need to build queries and prep the data for analysis. In Power BI, queries are built using the Query Editor. The Query Editor provides a powerful set of tools for cleaning, transforming, and reshaping data.

One of the most useful features of the Query Editor is the ability to merge multiple queries into a single table. This feature is particularly useful when working with data from multiple sources that need to be combined into a single table.

Power Pivot and Building Relationships Across Multiple Databases

Once we’ve built our queries and prepped our data for analysis, it’s time to start analyzing the data. Power Pivot is a powerful tool in Power BI that allows users to create relationships between tables in multiple databases. With Power Pivot, we can create complex data models that allow us to slice and dice our data in a variety of ways.

Useful Functions to Take Data to the Next Level

Power BI provides a vast array of functions that can be used to transform and analyze data. Some of the most useful functions include date/time functions, text functions, and aggregation functions. For example, the DATE function can be used to extract the year, month, or day from a date field, while the SUM function can be used to add up values in a column.

Live Dashboards and Interactive Reports

Power BI’s live dashboards and interactive reports provide a powerful way to visualize data. With live dashboards, users can create custom visualizations that provide real-time insights into their data. Interactive reports, on the other hand, allow users to drill down into their data and explore it in more detail.

Conclusion

Microsoft’s Power BI platform is a powerful tool for business analytics that allows users to organize, analyze, and visualize data using live dashboards and interactive reports. In this course, we’ve explored the foundational concepts of building queries and prepping data for analysis, shown how to build relationships across multiple databases using Power Pivot, highlighted useful functions to help take data to the next level, and demonstrated the power of live dashboards and interactive reports. By the end of this course, you’ll have the knowledge and skills needed to become proficient in data processing and visualization, helping you to keep sensitive information secure and make better-informed business decisions.

#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

Qué es Prompt Engineering





En la era actual de la tecnología, es importante tener un conocimiento sólido de las técnicas de ingeniería de chatbot. Una de las técnicas más populares utilizadas en este campo es Prompt Engineering. En este artículo, hablaremos sobre qué es Prompt Engineering y cómo utilizar esta técnica en ChatGPT. También discutiremos cómo la implementación de esta técnica puede ayudar a mejorar la seguridad cibernética y cómo puede ayudar a generar ingresos a través de la optimización de anuncios.

¿Qué es Prompt Engineering?

Prompt Engineering es una técnica de aprendizaje automático utilizada para generar respuestas coherentes y precisas en chatbots. Es un proceso en el que se entrena a un modelo de lenguaje para generar respuestas más precisas basadas en el texto de entrada. La técnica implica la creación de múltiples cadenas de entrada que pueden ser vistas por el modelo de lenguaje. El modelo de lenguaje luego genera múltiples respuestas posibles que son evaluadas y seleccionadas para ser utilizadas en la conversación.

Cómo utilizar Prompt Engineering en ChatGPT

La implementación de Prompt Engineering en ChatGPT es fácil y sencilla. Primero, es necesario identificar las respuestas más frecuentes que el chatbot proporciona. Estas respuestas frecuentes se utilizan como entradas para el modelo de lenguaje. Luego se crea un modelo de lenguaje que se entrena con estas entradas para generar respuestas más precisas y coherentes.

Una vez que el modelo de lenguaje ha sido entrenado, se puede implementar en ChatGPT. La implementación del modelo de lenguaje en ChatGPT puede ayudar a mejorar la calidad de las respuestas proporcionadas por el chatbot. También puede ayudar a mejorar la experiencia del usuario y a aumentar la satisfacción del cliente.

Mejora de la seguridad cibernética

La implementación de Prompt Engineering en ChatGPT puede ayudar a mejorar la seguridad cibernética. Al mejorar la calidad de las respuestas proporcionadas por el chatbot, se puede reducir la cantidad de información confidencial que se comparte a través de la conversación. Esto puede reducir el riesgo de que la información sea utilizada maliciosamente.

Generación de ingresos a través de la optimización de anuncios

La implementación de Prompt Engineering en ChatGPT también puede ayudar a generar ingresos a través de la optimización de anuncios. Al mejorar la calidad de las respuestas proporcionadas por el chatbot, se puede aumentar la tasa de clics en los anuncios presentados en el chatbot. Esto puede aumentar la cantidad de ingresos generados a través de anuncios.

Llamado a la acción de marketing digital

En conclusión, la implementación de Prompt Engineering en ChatGPT puede ayudar a mejorar la calidad de las respuestas proporcionadas por el chatbot, lo que puede mejorar la seguridad cibernética y generar ingresos a través de la optimización de anuncios. Además, invito a todos los lectores a comentar sobre sus experiencias en la implementación de Prompt Engineering y a compartir cualquier otro conocimiento relacionado con la seguridad cibernética y la optimización de anuncios.

#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

Threat Hunting Fundamentals: Why Network Data Should Be At Core of Your Process





Threat hunting is a critical practice that helps organizations proactively detect and respond to cyber threats. With the increasing sophistication of cyber attacks, threat hunting has become a necessity for every organization, regardless of its size or industry. In this article, we will explore the fundamentals of threat hunting and why network data should be at the core of your process.

What Is Threat Hunting?

Threat hunting is a proactive and iterative approach to detecting and responding to cyber threats. It involves searching for indicators of compromise (IOCs) that have not been detected by traditional security measures such as firewalls, intrusion detection systems, and antivirus software. Threat hunting is not a one-time event but rather an ongoing process that involves continuous monitoring and analysis of the organization's network and endpoints.

Threat hunting involves multiple techniques and tools, including data analysis, behavioral analysis, and anomaly detection. However, the most critical aspect of threat hunting is the ability to identify and investigate suspicious activity in the network. Threat hunters must be able to distinguish normal activity from abnormal activity and identify the root cause of any suspicious behavior.

Why Is Network Data Important in Threat Hunting?

Network data is a critical source of information for threat hunting. It provides visibility into the organization's network activity and allows threat hunters to identify suspicious behavior that may be indicative of a cyber attack. Network data includes logs from firewalls, routers, switches, and other network devices, as well as packet captures and network flow data.

Network data provides several benefits for threat hunting. First, it provides a comprehensive view of the organization's network activity, allowing threat hunters to identify abnormal behavior that may be indicative of a cyber attack. Second, it provides a rich source of information for forensic analysis, allowing threat hunters to reconstruct the attack and identify the attackers' tactics, techniques, and procedures (TTPs). Finally, network data provides a baseline of normal behavior, allowing threat hunters to identify deviations from this baseline and investigate any suspicious activity.

How To Use Network Data in Threat Hunting?

To effectively use network data in threat hunting, organizations must implement a robust network monitoring and analysis solution. This solution should provide real-time visibility into the network activity and allow threat hunters to quickly identify and investigate suspicious behavior.

There are several key steps that organizations can take to leverage network data in their threat hunting process:

Develop a threat hunting strategy: Organizations must develop a comprehensive threat hunting strategy that outlines the processes, techniques, and tools used in the threat hunting process.

Collect network data: Organizations must collect network data from all relevant sources, including firewalls, routers, switches, and endpoints.

Analyze network data: Threat hunters must analyze network data to identify suspicious activity and investigate any anomalies.

Correlate network data: Threat hunters must correlate network data with other sources of information, such as threat intelligence feeds and endpoint logs, to identify potential threats.

Respond to threats: If a threat is identified, organizations must respond quickly to mitigate the risk and prevent further damage.

Conclusion

Threat hunting is a critical practice for every organization that wants to proactively detect and respond to cyber threats. Network data is a critical source of information for threat hunting, providing visibility into the organization's network activity and allowing threat hunters to identify suspicious behavior that may be indicative of a cyber attack.

To effectively leverage network data in the threat hunting process, organizations must develop a comprehensive threat hunting strategy, collect network data from all relevant sources, analyze and correlate network data to identify potential threats, and respond quickly to mitigate the risk.

In conclusion, network data should be at the core of your threat hunting process. By using network data effectively, organizations can improve their threat detection capabilities and proactively defend against cyber threats.

#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

Curso de GIT y GITHUB desde CERO para PRINCIPIANTES




#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

Maximising ChatGPT Output with one Script




#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

AUMENTA TUS HABILIDADES x10 con ChatGPT + Google Sheets [ La mejor alternativa a Excel ]




#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

300.000$ por un trabajo que puedes APRENDER GRATIS ▶ Curso OPEN SOURCE




#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

Cyber Security Analyst Q&A (VERY REALISTIC)




#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

Instalar openai-cli-client chatbot en Termux




#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

eJPT Preparation Course | Penetration Testing





Welcome to our comprehensive guide on the eJPT Preparation Course, which is designed to help you master the concepts and techniques of Penetration Testing. If you're someone who's looking to pursue a career in Cybersecurity, then this course is definitely something that you should consider.

His team of experts has carefully curated this course to ensure that you get the best possible learning experience. We understand that Penetration Testing is a complex subject, which is why our course is structured in a way that makes it easy for you to understand and apply the concepts.

In this course, you'll learn everything from the basics of Penetration Testing to advanced techniques like Web Application Penetration Testing and Network Penetration Testing. We've included a variety of real-world scenarios and hands-on exercises that will help you develop your skills and apply what you've learned in a practical manner.

The course is designed by the YouTube channel PhD Security, which is known for its high-quality content on Cybersecurity and Penetration Testing. Our team of experts has years of experience in the field and has designed this course to meet the needs of both beginners and advanced learners.

We've also included a range of resources and tools that you can use to further enhance your learning experience. From cheat sheets to practice exams, we've got everything you need to succeed in the field of Penetration Testing.

So if you're looking to take your Cybersecurity skills to the next level, then this course is definitely something that you should consider. Not only will it help you master the concepts and techniques of Penetration Testing, but it will also open up a range of career opportunities in the field.

In conclusion, we believe that the eJPT Preparation Course is an excellent resource for anyone who's looking to pursue a career in Cybersecurity. Our team of experts has designed this course to be comprehensive, practical, and engaging, so that you get the best possible learning experience. So what are you waiting for? Enroll in our course today and take the first step towards a successful career in Cybersecurity!

#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

How YouTubers Are Getting Hacked




#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

Start Hacking with the HEARTBLEED vulnerability: NahamCon CTF





HUGE THANKS to Snyk for sponsoring this video! Get started with Snyk FOR FREE ➡ https://j-h.io/snyk

00:00 NahamConCTF Baby's First Heartbleed  
02:03 Story Time!  
05:08 Getting Started  
07:58 Begin Exploiting  
09:38 Server Code  
12:19 Back to the Story

Help the channel grow with a Like, Comment, & Subscribe! 
❤️ Support ➡ https://j-h.io/patreon ↔ https://j-h.io/paypal ↔ https://j-h.io/buymeacoffee 
Check out the affiliates below for more free or discounted learning!
🖥️ Zero-Point Security ➡ Certified Red Team Operator https://j-h.io/crto
💻Zero-Point Security ➡ C2 Development with C# https://j-h.io/c2dev
🐜Zero2Automated ➡ Ultimate Malware Reverse Engineering https://j-h.io/zero2auto
⛳Point3 ESCALATE ➡ Top-Notch Capture the Flag Training https://j-h.io/escalate
👨🏻‍💻7aSecurity ➡ Hacking Courses & Pentesting https://j-h.io/7asecurity
📗Humble Bundle ➡ https://j-h.io/humblebundle
🐶Snyk ➡ https://j-h.io/snyk
🤹‍♀️SkillShare ➡ https://j-h.io/skillshare

🌎Follow me! ➡ https://j-h.io/discord ↔ https://j-h.io/twitter ↔ https://j-h.io/linkedin ↔ https://j-h.io/instagram ↔ https://j-h.io/tiktok

📧Contact me! (I may be very slow to respond or completely unable to)
🤝Sponsorship Inquiries ➡ https://j-h.io/sponsorship
🚩 CTF Hosting Requests ➡ https://j-h.io/ctf
🎤 Speaking Requests ➡ https://j-h.io/speaking
💥 Malware Submission ➡ https://j-h.io/malware
❓ Everything Else ➡ https://j-h.io/etc

Credits:
"Monkeys Spinning Monkeys" Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 4.0 License

#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

Package Dependency Confusion Vulnerability | Advance Bug Bounty Tutorials | Hindi🔥Part 1 #bugbounty





In this video we are going to learn how to find Package Dependency Confusion Vulnerability. This are found in NPM, PIP and other packages. I will teach you how to find Package.json vulnerability.This is part 1 of the video where we will see how to check whet👉her the package is available for takeover.

Tools used in the video:
Nulcie-Template: https://github.com/projectdiscovery/n...
FFF: https://github.com/tomnomnom/fff
GHORG: https://github.com/gabrie30/ghorg
One Line Code:https://pastebin.com/raw/NpWrDVf0

🔴 ** BE MY FRIEND **
🌟Web: https://spinthehack.in 
🌟Instagram(Personal): https://instagram.com/thecyberzeel 
🌟Instagram(Spin The Hack): https://www.instagram.com/spinthehack 
🌟Twitter: https://www.twitter.com/thecyberzeel 

🔴 ** ABOUT THE CHANNEL **
At Spin The Hack I document my career and teach you what I learn in easiest explanation.
Spin The Hack is one of the leading Indian educational enterprise aimed at helping people learn and understand cybersecurity in better and simplest way.

At Spin The Hack, We serve the best possible Cybersecurity and Penetration Testing content through our website and YouTube Channel, help students grasp all the concept that matter and are related to field.


‼This channel focuses only on education and doesn't promote anything that is unethical. On this channel, I explore the field of Cybersecurity so that it helps the audience to learn and earn at the same time.

🌟Penetration Testing Videos in Hindi
🌟Bug Bounty Hunting Videos in Hindi
🌟Tips and Tricks related to Cybersecurity in Hindi
🌟Forensics Coverage and Tutorials in Hindi
🌟 Useful Cybersecurity News in Hindi
________________________________________
For Business Inquiry-: contact@spinthehack.in
________________________________________


🔴STOP: Before Starting This video, Keep in mind that this video is just for Educational purposes and nothing illegal is promoted here. We, along with YouTube, are not responsible for any kind of action taken by you using this video.🔴

#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

Crack/Hack any paid software with x64dbg





sorry guy's I've been busy but will be uploading a lot more. 
Discord============== https://discord.gg/yYqQJrQmrX Link Updated

#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

Minecraft's Deadliest [Illegal] Hacked Client





FLASHING LIGHTS AT 2:00 & 7:47 THERE ARE FLASHING AND SIGNIFICANT LIGHTS SO IF THIS COULD AFFECT YOU BE CAUTIOUS


The story of perhaps the worst hacked client, capable of wreaking havoc on it's victims... A tale of hard work, war, cozenage, and betrayal. This is Minecraft's Deadliest and Illegal Hacked Client, Phobos. Heavily inspired by "Disrupt". More Credit and information about the video further down. Do consider reading:
And obviously, don't download this hacked client. 


Do note:
-This video does not encourage hacking, DO NOT hack where hacking isn't allowed. It puts you at risk, and ruins the experience of others.  
- All base information was taken through primary sources, with witnesses of the event being questioned
-Several pieces of information were dramatized, and may not be 100% accurate
-All discord screenshots except one are abridged and not exact
-While most dates are accurate, a few are approximated
-Any racist imagery or text in this video is not endorsed by me, it is simply the result of several disgusting people who do as they please on 2b2t, my apologies for your potential disturbance. I tried to censor what I could see, but there is a chance I missed something, sorry. 
-Credit for music, and inspiration is down below. 


➤➤ Twitter: https://twitter.com/WifiesWasTaken


➤➤ Music Used (in order):
Northumbria - Sacred Ground
Evil Has Found a New Path - CO.AG
Cell Research - Gridded
Shanghai institute - Gridded
A deeper dream - Atrium Carceri & Cities Last Broadcast
Cilia - Gridded
Greenwich Lights - Gridded
Held Breeze - Mount Shrine


➤➤Credit:
-This video was heavily inspired by Disrupt's "Earth's Deadliest [Computer] Virus": https://www.youtube.com/user/ProperSt...
-Hacking Footage was taken from 3vt and Wao (but stop swearing)
- Couriway: https://www.youtube.com/channel/UCnes...
-Information corroborated with: https://www.youtube.com/channel/UCl9Y...
-FitMC for topic: https://www.youtube.com/user/SonOfShoop
-I listened to this song for around 5 collective hours on loop while editing so ty: https://www.youtube.com/watch?v=SXJGT...
-Shoutout to Troy the Horse for snapping right towards the backdoor when it opened. Ily buddy!

If you can solve the two ciphers in the video, shout out to you :^) 


0:00 The Most Dangerous Hacked Client
2:44 The Hacked Client War
6:24 The Rise
10:48 Cozenage
13:10 Phobos
17:00 Fallout

#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

How to go deep to find vulnerabilities? LIVE BUG BOUNTY HUNTING[HINDI]🔥 #cybersecurity





Today in this video we are going to learn how to find more vulnerabilities and go deep in bug bounty hunting. During this video I will perform live testing on real target from hackerone. Make sure you watch the video till the end to know more about it.

Link for subdomain finder: https://subdomainfinder.c99.nl/


🔴 ** BE MY FRIEND **
🌟Web: https://spinthehack.in 
🌟Instagram(Personal): https://instagram.com/thecyberzeel 
🌟Instagram(Spin The Hack): https://www.instagram.com/spinthehack 
🌟Twitter: https://www.twitter.com/thecyberzeel 

🔴 ** ABOUT THE CHANNEL **
At Spin The Hack I document my career and teach you what I learn in easiest explanation.
Spin The Hack is one of the leading Indian educational enterprise aimed at helping people learn and understand cybersecurity in better and simplest way.

At Spin The Hack, We serve the best possible Cybersecurity and Penetration Testing content through our website and YouTube Channel, help students grasp all the concept that matter and are related to field.


‼This channel focuses only on education and doesn't promote anything that is unethical. On this channel, I explore the field of Cybersecurity so that it helps the audience to learn and earn at the same time.

🌟Penetration Testing Videos in Hindi
🌟Bug Bounty Hunting Videos in Hindi
🌟Tips and Tricks related to Cybersecurity in Hindi
🌟Forensics Coverage and Tutorials in Hindi
🌟 Useful Cybersecurity News in Hindi
________________________________________
For Business Inquiry-: contact@spinthehack.in
________________________________________


🔴STOP: Before Starting This video, Keep in mind that this video is just for Educational purposes and nothing illegal is promoted here. We, along with YouTube, are not responsible for any kind of action taken by you using this video.🔴

#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

'Twas the Hack Before Christmas🎙Darknet Diaries Ep. 55: NoirNet





When a private pen tester crosses paths with an eccentric colleague just before the holidays, he won't rest until he gains access to the network.

Visit https://darknetdiaries.com/episode/55/ for a list of sources, full transcripts, and to listen to all episodes.

#strange,#enigma,#mystery,#odd,#unexplained,#real,#weird,#ghost,#real,#terror,#horror,#sighting,#stories,#occult,#scary,#parapsychology,#discovery,#hunt,#extraño,#paranormal

LA VERDAD SOBRE EL HACKEO A SAVITAR





Bueno gente, cabe recalcar que yo recopile este fragmento de video del directo de s4vitaar, el cual se realizó en su canal de twitch, todo el crédito a él. 

Enlace a nuestra ACADEMIA: https://hack4u.io
Mi CURSO de INTRODUCCIÓN a LINUX: https://www.youtube.com/redirect?even...
Mi CURSO de PERSONALIZACIÓN de LINUX: https://www.youtube.com/redirect?even...

Cuenta de Twitch: https://twitch.tv/s4vitaar (EN DIRECTO TODOS LOS DÍAS)
Cuenta de Twitter: https://twitter.com/s4vitar
Servidor Discord Hack4u: https://discord.gg/hack4u

Canal principal de Youtube: https://youtube.com/s4vitar
Canal Secundario de Youtube: https://www.youtube.com/channel/UCgzs...

Como Crear un Exchange de Criptomonedas en tu Web





El mejor Exchange para comprar criptomonedas
https://gobciti.com
https://coinbrain.com/dev-tools/trade

Basics of Osquery For CyberSecurity | TryHackMe Osquery: The Basics





In this video walk-through, we covered the basics and introduction of Osquery For CyberSecurity. We went over querying Windows, MacOs and Linux SQL tables.
**
Osquery documentation
https://osquery.io/schema
********