- Blog
- Profile
-
Alles abhören scheint in Mode zu kommen.
Shazaam hat jetzt ein always on Feature.
-
Android Botnet
Newly Found Android Botnet Is Used in Multiple Spyware Campaigns
-
What's new in Django 1.6
For the interessted: [slideshare id=28280202&doc=whatsnewindjango1-131115071110-phpapp02]
-
Access Control Types
Directive Deterrent Preventive Compensating Detective Corrective Recovery
-
Tiny ASCII-Fluid-Simulator
Der International Obfuscated Code Contest liefert anständig ab. [youtube=http://youtu.be/QMYfkOtYYlg] via Tiny ASCII-Fluid-Simulator.
-
EMail Protocols
Privacy Enhanced Mail (PEM): Uses Data Encryption Standard (DES) in the Cipher Block Chaining (CBC) Mode. Secure Multipurpose Internet Mail Extension (S/MIME): Uses the user’s encryption algorithm with RC2, DES, […]
-
Data Link Layer Protocols
Synchronous data link control / SDLC: supports loop or hub go-ahead configuration used with bounded and unbounded media. High Level Data Link Control / HDLC: Provides an option for a […]
-
WAN Protocol Characteristics
Frame Relay Provides point to point connections by creating virtual circuit paths. Forwards frames and performs error check only at the end points. X.25 Is designed to operate over unreliable […]
-
Packet Switching / WAN Technology
X.25: defines communication between DTE and DCE devices. Switched multimegabit data services (SMDS): Is a connectionless protocol and can provide bandwidth for exchange of large amounts of data. A connectionless, […]
-
Region 8 GOLD Exceptional Volunteer Award
Both surprised and excited, I am also honored to have been awarded the “Exceptional Volunteer Award“, together with Khaled Mokhtar from Egypt and Tomislav Pokrajcic from Croatia from IEEE Region […]