Polyomino Combinatorics: How to count distinct n- letter long array permutations

Let’s say we have 3 arrays of following tetromino letters: J, L, O. Tetromino J is a 4 member long array (J[0],J[1],J[2],J[3]), signifying the number of positions J block can take. L tetromino is also a 4 member long array and O is a square tetromino that has only one position (1 member long array). How do we calculate the total number of all unique n-letter long permutations, without programmatically permuting through them? [Read more…]

Java for Beginners – Addressing Data Type Limitations

Java offers eight primitive data types which are not always adequate to store data of all types. There are situations when the specific data type does not fit into any of the primitive data types offered by Java. Thus it is essential to understand the boundaries and restrictions of the primitive data types in Java. In this article, I demonstrate a couple of the scenarios in which the Java data types are not sufficient enough and require substitute approach.

[Read more…]

Ascent of Information warfare (IW) in Cyberspace

We live in a time when foreign nations no longer achieve supremacy by engaging in a traditional battlefield warfare. Most nations realized that there are considerable disadvantages to fighting the battle in the open by using the old-style weapons and mechanisms, which helped to establish an entirely new kind of combat, the information warfare.  Instead of using heavy weaponry, the warfare operations are executed in secrecy primarily by leveraging the information and communication technology. As a result, the modern war has moved from a physical space into a virtual cyberspace.

[Read more…]

VMware’s NSX™ Distributed Firewall, Intrusion Prevention and Intrusion Detection System.

The security breaches usually occur when the organization does not sufficiently restrict communication inside network perimeter or does not implement lateral security controls, which allow hackers to target the priority systems or infiltrate information. The following article talks about VMware’s NSX™ Distributed Firewall, Intrusion Preventions, and Intrusion Detection System.

Note: Article in Progress. The following is only a basic skeleton for the more comprehensive overview.

[Read more…]

Is Ethical Hacking Ethical?

In the following article, I concentrate on some of the often-asked questions topic connected to ethical hacking, the area of computing concerned with the discovery of security vulnerabilities that can potentially be exploited by real hackers. [Read more…]

IT Compliance and Auditing in Canada

The following post is intended to explain some of the IT audit standards, control process and associated laws and regulations currently used in Canada. Even though, the 2012 research showed that only 16% of Canadian Businesses were not aware of privacy or security-related standards and we could say, that Canadian IT companies have moderate to high awareness of the compliance standards.

Note: This article is a work in progress. [Read more…]

Kali Linux (VirtualBox) instructions for testing any Wi-Fi device against WPA2 Key Reinstallation Attack (KRACK Attack)

The following article demonstrates the process of testing any Wi-Fi capable device against a key reinstallation attack. I’ll demonstrate the processes of executing the test using Kali Linux installed in the VirtualBox on a Windows machine. Then I’ll illustrate the process of testing recently patched Windows 10 as well as testing unpatched Android 7.0 mobile phone against the key Reinstallation Attack. This article also explores a newly discovered vulnerability of WPA2 named KRACK Attack (key reinstallation attack) in little more detail, as it’s one of the biggest vulnerabilities found in WPA2 to this day (patched only by a handful operating systems and Wi-Fi product manufacturers). The main issue introduced by KRACK attack is that it allows attackers to intercept all wirelessly transferred information in an unencrypted format, and do so without the knowledge of the wireless WPA/WPA2 network password. Serious? You bet…
[Read more…]

How to fix Windows 7 RDP resolution limit of 3840×2048 on 4K (3840×2160) monitors? (also applicable for Win Server 2008 R2)

One of the issues of Windows 7 (and Windows Server 2008 R2) is related to its inability to support 4K resolutions over RDP. Windows 7 RDP resolution is limited at 3840 x 2048, whereas 4K monitors run at 3840 x 2160, which leaves a small black strip at the top and bottom of the remote desktop window. The following article describes the way I was able to resolve this issue. [Read more…]

How to restore missing ‘Mobile Data’ and ‘Mobile Hotspot’ quick settings menu icons on Samsung Galaxy mobile devices

Recently, I have updated my Samsung Galaxy S7 to Android 7.0 Nougat and realized that I am missing both ‘Mobile Data’ and ‘Mobile Hotspot’ quick settings menu icons/toggles. For some reason, Samsung has decided to disable adding them into the menu. The following post shows you how to add them back using Android platform tools and ADB. [Read more…]

The future of cloud computing relative to becoming a monopoly

In early days of Cloud computing, media frequently probed and disputed the viability of cloud computing. And not so long ago, in 2009, even the most famous futurists were skeptical. Jamais Cascio, who listed as one of the 2009 Top 100 Global Thinkers said, “I have to admit it: I’m not a huge fan of the cloud computing concept.”(Fast Company, 2009). However, not even a decade later, the positive impact of cloud computing can no longer be disputed. With that, a new concern comes to view, the likelihood of Cloud computing becoming a monopolized technology. This article is a brief look at the current landscape of cloud computing relative to becoming a monopoly. [Read more…]