Press "Enter" to skip to content

Posts published by “admin”

Developer, blogger, writer.

Distributed Computing

Networks have been used in many places and with the advances and improvements that have been taking place over time, distributed computing has arisen as…

Disposable Email Services

Email messages can be sent and deleted from the sender server as soon as they have been sent. This is made possible by the use…

Digital Warfare and Its Economic Impact

Digital warfare is a very bad crime that has been known to bring down big business entities and corporations on the internet. It is perpetrated…

Determining the Performance of a Mobile Device

A mobile device’s performance can be determined from the various metrics that are generated during the process of using the device. For instance, the processing…

Determining the Efficiency of an Application

Applications are designed to perform differently and make use of the underlying operating system in varied ways. The efficiency of an application gets to be…

Detecting Weaknesses in Security Systems

Security systems are set up and configured in such a manner as to keep the information safe and secure at all times. Any weakness in…

Detecting Unsecure Connections

Unsecure connections to a web server via the browser are easy to hack into and even listen into while the communication session is still in…

Detecting Network Intrusions

A network intrusion is a form of illegal access into a network where the party trying to gain access into the network uses all the…