Press "Enter" to skip to content

Posts published by “admin”

Developer, blogger, writer.

Detecting Intrusions on Networked Systems

Networked systems are at the highest threat of incoming attacks thanks to the fact that they expose much of their information architecture to the outside…

Detecting Information Leaks

Information that moves over a network might get lost while it is still in transit owing to the reason that the network has been configured…

Detecting Hackers on a Network

Hackers are internet users who try to gain an advantage over conventional internet users through the use of tools and tricks which they craft up…

Designing Web Applications for Failure

Web applications can be designed both for failure as well as success. The design that is intended for failure tends to stand up to the…

Designing Readable Websites

Readability for any website is a crucial factor that determines if users of the website are able to make out the content on the website…

Designing Playful Web Experiences

Playful web experiences have been known to take the stiffness out of web users and make them free to move about a website as they…

Designing a Friendly Web Interface

Friendly web interfaces are known to be the reason behind the success of many businesses that carry out their operations over the websites and web…

Defending Systems from Hackers

Hackers enter systems using illegal means and plant malware that resides on the systems they are trying to gain control of. A digital information system…