Passionate about security & learning?
We are hiring an Information Technology Instructor for our online courses
Under general supervision, plans and implements curriculum and educational programs for students within the online training program, as well as occasionally serving as a backup ILT instructor.
Supports students in online courses with webinars, direct answers to […]
Finding a proven pattern to find defects early in your cycle saves not just money but also the time required to patch those defects. Threat modeling is a tested and proven method to meet this objective. This procedure evaluates the vulnerabilities that can potentially exist in a target under […]
This article follows my earlier one: “Secure Software Development Life Cycle” (from now on referenced as S-SDLC), being one Implementation of the S-SDLC program. I have covered the basics of S-SDLC in my previous article – and I recommend readers to go through it if you have not already […]
In recent decades, cyberspace has grown to impact nearly every aspect of human existence. It is increasingly relied upon by citizens and policy-makers, as well as the military and federal agencies. Despite these facts, the importance of securing cyberspace is often overlooked. It is widely accepted that hackers, criminals, […]
Email is still, to this day, the most used method of online communication. Even though many people predicted email would eventually get replaced by instant messaging or video chat software, the fact remains that email is simple to use, works everywhere thanks to the standardization of the SMTP protocol, […]
I have written a lot about building flexible Agile teams and their usual shortcomings. However, there is a river of information behind it and improving our knowledge of building patch-functional teams is worthwhile. This type of team has all the skills that are needed, so that we can provide […]
Over the past ten years, there has been a steady increase in the number of generic top-level domain names (gTLD). As a result, people can currently register various gTLDs such as .asia, .pro, .tel, or even .xxx. In the near future, even more gTLDs will be available for registration. […]
There has been a lot of talk about how to connect your laptop though the Android network and use the bandwidth that you’re already paying for. Usually, this requires setting up an access point on an Android device and connecting to it with the laptop. On some devices you […]
When it was created, the Internet was launched as a classified military experiment, but nowadays it is a widely used tool that has a multitude of purposes. Recent cyber attacks on Saudi Arabia’s state oil company Saudi Aramco, the Qatari gas firm RasGas, and denial-of-service attacks on some major […]
If you make web sites, online apps, or even just your own personal blog, chances are that you’ve heard the phrase “Don’t trust user input!” This is one of the key security concepts about the Internet, and the failure of web developers to adhere to this principle is the […]
This Article explains the concept of transferring personal data from EU to third countries, what those third countries mean, the principles for making such transfers legitimate and the derogations from these principles, and last but not least, the transfer mechanisms of personal data to third countries.
I. Transfer of personal […]
No information security guide is complete without a chapter about securing physical access to information resources. After all, physical access gives even the moderately skilled attacker access to the network, unencrypted workstations and servers, and hardcopy information just waiting for someone to come by and pick it up. Have […]
China and the U.S. have signed the Berne Convention and the Agreement on Trade Related Aspects of Intellectual Property Rights (TRIPS Agreement). These two agreements set minimum standards for copyright regulation. Under these agreements, creators are granted “automatic” rights to any work they produce. Consequently, the creators receive copyright […]
Security does not happen by accident. Sure, a crashed router will keep hackers (and everyone else) out of your network, but in most cases if you want security along with functionality, you have to make a conscious effort to make things secure. Most estimates will tell you it’s 20 […]
Important steps before opening Photoshop/Text Editor – a design approach
a) Know your end users
b) Form the concept in your head
Wireframing / Userflow
2. UI mistakes in websites and how to avoid them
1. Important steps before opening Photoshop/Text Editor – a design approach
a) Know your end users
Before every activity that […]
We have previously traced all types of estimates, and we introduced Planning Poker. Today, we finish that and do a summary of the entire series. As I have said, estimates are really important, almost as important as the management of human resources in Agile, and Planning Poker is so […]
Java Native Interface (JNI)
JNI is a native programming interface supported by Java and is part of the Java SDK. With JNI, we can write code in other languages like C/C++ and use it in Java. We can also call C/C++ functions using Java code and vice versa – call […]
As software geeks, you might sometimes feel that hardware seems esoteric. For most people, electronics is always a bit of a mystery. They use it every day, but never really get the hang of how it actually works. This black box creates awe and that leads to the primordial […]
In previous articles on planning and estimating projects, we explored the basic principle of estimates. Estimating cannot really determine precisely what we will provide to the client or what the exact date will be. To do this accurately, and to provide the client with the correct information about the […]
1. Prototyping – what is it?
2. The design process.
3. Showing the project to client before developers will write any line of code.
4. Changes in project? Sooner equals better.
5. Examples of tools for prototyping.
1. Prototyping – what is it?
First of all I will describe what exactly prototyping is. It is […]