For part 1 of this series, please click here.
In the first part, our discussion of the estimation focused primarily on the general principles of creating any type of estimate. It also showed the importance of proper assessment to make your life easier and save you disagreements with clients and […]
Each of us who has ever worked in any programming project has had to deal with one of the biggest problems we face when creating projects. It is, of course, the execution time estimate. The question about the duration of the project appears in virtually every conversation prior. Definitely […]
Thoughts from My Three-Night Coding Excursion: Part 3 – Leveraging C# for Your Daily Reverse Engineering
For part 2 of this series, please click here.
C# is my favourite language and I definitely intend to stick with it, as the community is amazing and more and more programming paradigms are incorporated in .NET. From Eiffel to F#, IronPython to managed/unmanaged C++/CLI, you can’t go wrong with […]
For part 1 of this series, please click here.
Let’s get on to understanding the GDI+ library to leverage the use of C# and build any kind of visual unit you want. The moment you use GDI+, the confines of a form breaks down, at the very least visually. You […]
I will discuss a few topics that motivate me to make software the way I like it. Currently I am writing an Android analysis tool and since I am using C# for the same, I do have a few things to share as notes from my daily excursions in […]
For part 5 of this series, please click here.
Here’s another article on human resource management. We will work in the efficiency aspect and introduce elements of discipline in Agile. Of course, some form of bracing is not harmful, if we do not then we fall from extreme to extreme. […]
As I mentioned in a previous article, it is time to return to human resource management. We will focus here on the re-generation of projects in teams. But first, we will educate ourselves about the types of projects that can be implemented in the project team.
Types of projects we […]
A few days ago, I attended (and maybe trolled) a hacker conference called ROOTCON in Cebu City, Philippines at Cebu Parklane Hotel. To be honest, this is my second experience with ROOTCON and I think there are a lot of things I learned from this experience. One of the […]
InfoSec Institute is seeking an energetic and innovative Content Acquisition Manager for our Intense School brand to develop and maintain an industry-leading online publication. You will shape the success for our program’s initiatives by developing and defining the content and publishing schedule. This is a multi-faceted job in a […]
If you woke up tomorrow morning and found that your computer or portable device wouldn’t turn on, or had been stolen, what would you do? I’m a computer troubleshooter, web designer and IT teacher, backups are my passion and I ask that question of all my clients..
Some look smug […]
In the previous parts of our discussion we focused on internal team building and communication within the team and self-motivation. Today we will go on. We’ll talk about how all this fits into the environment of Agile and talk about the production of products in Agile environments. So let’s […]
In a previous article we discussed how we can build a good team, composed of professionals. We got to know the ins and outs of good feedback. Now we are moving on to much more difficult issues. Namely, we talk about communication, cooperation and motivation. After all, it may […]
Part one of this article series can be found here: Human Resource Management in Agile Part 2.
From the previous article you could find out what mistakes you make when implementing your own projects and business projects. Today we’ll do something a little different. We will learn how to build […]
Human Resource Management in Agile – Part 1
I think we all have been behind projects that were not successful. They can be both our own projects and projects for clients. This article is a continuation of risk management in projects related to Agile, but is an entirely different facet, […]
In connection with the upcoming USA presidential elections in 2012, I would like to discuss holding the election via the Internet and the risks associated with it. This is not a technical text; it does not show a technician carrying out attacks on individual choices. It is an article […]
1. Introduction to Tor Bridging
Running a Tor bridge is essentially the same as running a Tor relay, as far as configuration is concerned. We already mentioned that the only difference is that Tor bridges are not listed in the Tor directory. We also said that using a bridge is […]
We’ve seen that Tor network is constituted from Tor nodes, through which we tunnel our traffic to reach anonymity. So far we didn’t bother with terminology, because it wasn’t important; all we wanted to achieve was anonymity, which we did. But when we’re trying to configure a Tor […]
In previous articles: Part 1 and Part 2 we extensively used the Tor Browser Bundle that helps us ensure our anonymity. With the Tor Browser Bundle, we can easily start using Tor without installing and configuring any additional items. It also contains one very interesting project, a web […]
1. Using Burp with Tor
So far we’ve looked at how to set up our web browser to use Privoxy, which in turn uses Tor to achieve anonymity on the Internet. But what if we want to intercept requests with Burp? To help us better understand what’s really going on, […]
Malware threats have become very common these days. In the past, many honeypots have been created to detect malware propagation over the network. These honeypots trick the malware into believing that they are a part of the network. These honeypots are however isolated and once they have been infected, […]