Security Programing Techniques

INTRODUCTION

The main goal of this post is to introduce the reader with the security programing techniques into deferent program languages and operating system security models. The post is introducing four following topics:

  1. Session storage’s in Ruby on Rail
  2. Parameterized statements into Java with JDBC, C# with ASP.NET …
more ...

Mobile Malware Analysis

PURPOSE

The goal of this post is to identify and analyze mobile malware file: mmc.jar. Thereby please follow the following steps for completing the task:

  • Unpack the file (hint – using zip on .jar)
  • Examine .class files using tool available here (local copies for Mac and Linux and Win
  • Find …
more ...

Script Kiddie

PURPOSE and SCENARIO

The goal of this laboratory test is to make effort to attack server and to deface website. Here is the scenario: your client is worried about some stuff posted on a blog. They ask You to take care of it. They have a throwaway “script kiddie”[Script …

more ...


Major changes in warfare from antiquity to modern

Analyse the major changes in warfare from antiquity to modern days. What are the most significant changes? What has remained unchanged?

Before we start the discussion about the major changes in warfare from antiquity to present day we will precede with definition of War and its significant and remained unchanged …

more ...

IP Responsibility and abuse reporting procedure

PURPOSE

The main goal of laboratory report is to identify the responsibilities for the IP addresses below and how we can make connection to them. IP addresses are randomly chosen by the lecture.

IP addresses:

​1. 69.163.171.238

​2. 31.44.184.101

​3. 188.72.228.69 …

more ...