China and the U.S. have signed the Berne Convention and the Agreement on Trade Related Aspects of Intellectual Property Rights (TRIPS Agreement). These two agreements set minimum standards for copyright regulation. Under these agreements, creators are granted “automatic” rights to any work they produce. Consequently, the creators receive copyright […]
Security does not happen by accident. Sure, a crashed router will keep hackers (and everyone else) out of your network, but in most cases if you want security along with functionality, you have to make a conscious effort to make things secure. Most estimates will tell you it’s 20 […]
Important steps before opening Photoshop/Text Editor – a design approach
a) Know your end users
b) Form the concept in your head
Wireframing / Userflow
2. UI mistakes in websites and how to avoid them
1. Important steps before opening Photoshop/Text Editor – a design approach
a) Know your end users
Before every activity that […]
We have previously traced all types of estimates, and we introduced Planning Poker. Today, we finish that and do a summary of the entire series. As I have said, estimates are really important, almost as important as the management of human resources in Agile, and Planning Poker is so […]
Java Native Interface (JNI)
JNI is a native programming interface supported by Java and is part of the Java SDK. With JNI, we can write code in other languages like C/C++ and use it in Java. We can also call C/C++ functions using Java code and vice versa – call […]
As software geeks, you might sometimes feel that hardware seems esoteric. For most people, electronics is always a bit of a mystery. They use it every day, but never really get the hang of how it actually works. This black box creates awe and that leads to the primordial […]
In previous articles on planning and estimating projects, we explored the basic principle of estimates. Estimating cannot really determine precisely what we will provide to the client or what the exact date will be. To do this accurately, and to provide the client with the correct information about the […]
1. Prototyping – what is it?
2. The design process.
3. Showing the project to client before developers will write any line of code.
4. Changes in project? Sooner equals better.
5. Examples of tools for prototyping.
1. Prototyping – what is it?
First of all I will describe what exactly prototyping is. It is […]
In a previous article, we introduced the concept of exceptions. As I mentioned, this is the most important thing when writing high-quality software. Today we will develop this concept and also take care of the login. I hope that this section will be as interesting as the other.
The most […]
In previous articles on the diagnosis of computer networks we generally learned a lot of tools available and understood how they work. Today we will be doing something much simpler, namely, we will talk about two diagnostic programs that are available almost everywhere. Today is not going to torture […]
As you know, I delight in writing articles on the Agile environment. Why is that? Because I like to advise people about the methodology of software development. Agile is really a very flexible approach to all processes of software development. But even that is not really very flexible, it […]
When analyzing malware we can gather a lot of information just by identifying the IP addresses and domains the malware software uses. Most malware software programs use DNS addresses to find the resources online. The domain resolution system is a system where we provide a hostname which is […]
Previously, we took the principles of DHCP and DNS servers. We already know how to operate, inter alia. We also have data on how computers communicate over a network. Today we can finally move on and take care of other things. In total, we probably will return to the […]
For part 1 of this series, please click here.
Troubleshooting a computer network is really a very vast topic. In the first part of the series you learned how to create a network on the computer and what is needed to navigate the Web. You met the principle of action […]
Facebook is like a big house that’s turned into a menagerie. While it generously welcomes us all, some of its rooms shelter elephants conveniently hidden in plain view. Ladies and gentlemen, behold one of the most controversial social media pachyderms out there: Porn.
Is that an outraged “no!” that I […]
To some extent, the answer to the question in the title is yes. However there are many variables to consider. Just in the United States, there are many laws on the books (especially post-9/11) that have enabled “Big Brother” to potentially violate several of the rights granted to Americans […]
Some people think onion routing or the Tor network is for criminals and people with something to hide. Well, they are half right. The Tor network was designed to give a masked, “semi-safe”, passage to those who needed to get information out. According to its website, “Tor was originally […]
Sometimes, at the beginning of my adventure to the Internet, I was wondering how it is that I have a local area network and Internet access. See for yourself, turn on your computer and after some time we will see the screen of our desktop operating system. Then the […]
Whenever we’re doing a penetration test, it’s good to figure out the topology of the network we’re testing. We can’t figure out the whole topology, because we don’t have access to their internal network, but even if we manage to figure out part of the topology it’s pretty […]
Q: A Collection of Metasploit Modules Not Accepted to Main Trunk for Various Policy or Quality Reasons
I guess we all know what Metasploit is, so we don’t really need to present to the reader the basics of Metasploit. But it’s still useful if we present the type of modules the Metasploit has. Metasploit has the following types of modules:
Auxiliary Modules: perform scanning and sniffing and […]