When it was created, the Internet was launched as a classified military experiment, but nowadays it is a widely used tool that has a multitude of purposes. Recent cyber attacks on Saudi Arabia’s state oil company Saudi Aramco, the Qatari gas firm RasGas, and denial-of-service attacks on some major […]
If you make web sites, online apps, or even just your own personal blog, chances are that you’ve heard the phrase “Don’t trust user input!” This is one of the key security concepts about the Internet, and the failure of web developers to adhere to this principle is the […]
This Article explains the concept of transferring personal data from EU to third countries, what those third countries mean, the principles for making such transfers legitimate and the derogations from these principles, and last but not least, the transfer mechanisms of personal data to third countries.
I. Transfer of personal […]
No information security guide is complete without a chapter about securing physical access to information resources. After all, physical access gives even the moderately skilled attacker access to the network, unencrypted workstations and servers, and hardcopy information just waiting for someone to come by and pick it up. Have […]
China and the U.S. have signed the Berne Convention and the Agreement on Trade Related Aspects of Intellectual Property Rights (TRIPS Agreement). These two agreements set minimum standards for copyright regulation. Under these agreements, creators are granted “automatic” rights to any work they produce. Consequently, the creators receive copyright […]
Security does not happen by accident. Sure, a crashed router will keep hackers (and everyone else) out of your network, but in most cases if you want security along with functionality, you have to make a conscious effort to make things secure. Most estimates will tell you it’s 20 […]
Important steps before opening Photoshop/Text Editor – a design approach
a) Know your end users
b) Form the concept in your head
Wireframing / Userflow
2. UI mistakes in websites and how to avoid them
1. Important steps before opening Photoshop/Text Editor – a design approach
a) Know your end users
Before every activity that […]
We have previously traced all types of estimates, and we introduced Planning Poker. Today, we finish that and do a summary of the entire series. As I have said, estimates are really important, almost as important as the management of human resources in Agile, and Planning Poker is so […]
Java Native Interface (JNI)
JNI is a native programming interface supported by Java and is part of the Java SDK. With JNI, we can write code in other languages like C/C++ and use it in Java. We can also call C/C++ functions using Java code and vice versa – call […]
As software geeks, you might sometimes feel that hardware seems esoteric. For most people, electronics is always a bit of a mystery. They use it every day, but never really get the hang of how it actually works. This black box creates awe and that leads to the primordial […]
In previous articles on planning and estimating projects, we explored the basic principle of estimates. Estimating cannot really determine precisely what we will provide to the client or what the exact date will be. To do this accurately, and to provide the client with the correct information about the […]
1. Prototyping – what is it?
2. The design process.
3. Showing the project to client before developers will write any line of code.
4. Changes in project? Sooner equals better.
5. Examples of tools for prototyping.
1. Prototyping – what is it?
First of all I will describe what exactly prototyping is. It is […]
In a previous article, we introduced the concept of exceptions. As I mentioned, this is the most important thing when writing high-quality software. Today we will develop this concept and also take care of the login. I hope that this section will be as interesting as the other.
The most […]
In previous articles on the diagnosis of computer networks we generally learned a lot of tools available and understood how they work. Today we will be doing something much simpler, namely, we will talk about two diagnostic programs that are available almost everywhere. Today is not going to torture […]
As you know, I delight in writing articles on the Agile environment. Why is that? Because I like to advise people about the methodology of software development. Agile is really a very flexible approach to all processes of software development. But even that is not really very flexible, it […]
When analyzing malware we can gather a lot of information just by identifying the IP addresses and domains the malware software uses. Most malware software programs use DNS addresses to find the resources online. The domain resolution system is a system where we provide a hostname which is […]
Previously, we took the principles of DHCP and DNS servers. We already know how to operate, inter alia. We also have data on how computers communicate over a network. Today we can finally move on and take care of other things. In total, we probably will return to the […]
For part 1 of this series, please click here.
Troubleshooting a computer network is really a very vast topic. In the first part of the series you learned how to create a network on the computer and what is needed to navigate the Web. You met the principle of action […]
Facebook is like a big house that’s turned into a menagerie. While it generously welcomes us all, some of its rooms shelter elephants conveniently hidden in plain view. Ladies and gentlemen, behold one of the most controversial social media pachyderms out there: Porn.
Is that an outraged “no!” that I […]
To some extent, the answer to the question in the title is yes. However there are many variables to consider. Just in the United States, there are many laws on the books (especially post-9/11) that have enabled “Big Brother” to potentially violate several of the rights granted to Americans […]