All posts by: Samir Daoudi

Watch Rick Garibay’s session on Node.js. He introduces you to: Node.js programming fundamentals on Windows Design considerations for building a URL shortening service Building Node.js services that embrace REST/Hypermedia principles Estimated viewing time: 58 minutes....
Continue Reading →
A short, fun, animated approach, showing you what SharePoint is all about ...
Continue Reading →
What is open source software? Open source software is a solution where not only the complied version of the product is provided, but also the source code So advanced users can have a look on the source of the software...
Continue Reading →
Internet has opened new market ways and gave a new vision and new methods of selling products PayPal micropayment is an example of many other platforms of micropayment, and the same challenges apply to all these systems: Micropayments revisited ...
Continue Reading →
Protecting images is not obvious, considering the wide spread of images especially after the appearance of Internet Images are used in different areas (products, banners, logos …etc.) and sometimes it’s crucial to protect images from illegal usage same as audio...
Continue Reading →
Previously suggested digital content copyright protection systems (e.g., Pay-TV, DVD) are generally all broken Do you think it is possible to protect the copyright of digital contents The goals of DRM technics have evolved since the first versions, initially it...
Continue Reading →
Since the appearance of ARPANET and the interconnection of networks, security was in most debates for new network design, existing networks audit or systems design Some of the tools are very robust and provided a very acceptable and hard to...
Continue Reading →
Different kind of attacks exist nowadays, such the viruses, spams, phishing, DOS or DDOS …etc. If we think about phishing in another context rather than computing, the first image I get in mind is the fish phishing using a hook...
Continue Reading →
OS hardening To protect against misconfiguration-based attacks, install the very good hardening utility Bastille (http://sourceforge.net) Bastille essentially closes all the doors left open in a default installation. Network services access control Secure Remote Access ...
Continue Reading →
0-    Introduction to physical tamper-resistant devices Anti-tamper device contains tamper detection, tamper resistance, tamper response and tamper detection (Rannenberg et.al, 2010). Different types of physical tamper-resistant devices exist Physical Tamper Resistance Tamper resistant devices ...
Continue Reading →
Another method or implementation of cryptography is the Identity based which derives from the public-key cryptography If we deploy Identity Based Cryptosystem, do we still need password? Will identity based cryptosystem replace PKI? ...
Continue Reading →
Agile Testing lecture for Software QA Testing students delivered by Iana Mourza at Portnov Computer School ...
Continue Reading →
One of the interesting aspects of security is the tamper resistance, which are couple of technics and approaches aiming to avoid data, software or devices getting changed or altered by unauthorized persons or processes Tamper resistance can be used to...
Continue Reading →
The series takes an interesting turn when the whiteboard's personality emerges and it becomes a co-host, much to Bill's chagrin. Visit www.msdev.com for more informational videos about how to use Windows Azure. To learn more about Windows Azure visit http://www.microsoft.com/windowsazure......
Continue Reading →
Trying to build an efficient and secure system is a hard task and no exact method or technique has been developed allowing computer experts to submit a software or a system for security check and have exact results whether the...
Continue Reading →
Show Buttons
Hide Buttons