Java for Beginners 7 – Abstract Classes and Interfaces

The Java recognizes the limited nature of abstract classes and interfaces and their inability to become an object or a traditional class. Nevertheless, it is the absence of the qualities above and the ability to use abstract classes in various objects that proves to be incredibly useful to developers. In this article, I briefly outline the possible application of abstract classes and interfaces as well as provide examples to highlight the contrast between them.

[Read more…]

Java for Beginners 4 – Working with Java Loop Statements

Java recognizes three types of loops, namely ‘for,’ ‘while’ and ‘do-while’ loops that all accomplish the similar goals of iterating the block of code until a certain condition is met. The following article explores the differences between each of the loop variants and demonstrates the situations when choosing one type of loop over the other can be a benefit. There are many examples of using all three types of loops, but I’ve selected the general form and the infinite loop to illustrate the primary differences.

[Read more…]

Polyomino Combinatorics: How to count distinct n- letter long array permutations

Let’s say we have 3 arrays of following tetromino letters: J, L, O. Tetromino J is a 4 member long array (J[0],J[1],J[2],J[3]), signifying the number of positions J block can take. L tetromino is also a 4 member long array and O is a square tetromino that has only one position (1 member long array). How do we calculate the total number of all unique n-letter long permutations, without programmatically permuting through them? [Read more…]

Ascent of Information warfare (IW) in Cyberspace

We live in a time when foreign nations no longer achieve supremacy by engaging in a traditional battlefield warfare. Most nations realized that there are considerable disadvantages to fighting the battle in the open by using the old-style weapons and mechanisms, which helped to establish an entirely new kind of combat, the information warfare.  Instead of using heavy weaponry, the warfare operations are executed in secrecy primarily by leveraging the information and communication technology. As a result, the modern war has moved from a physical space into a virtual cyberspace.

[Read more…]

VMware’s NSX™ Distributed Firewall, Intrusion Prevention and Intrusion Detection System.

The security breaches usually occur when the organization does not sufficiently restrict communication inside network perimeter or does not implement lateral security controls, which allow hackers to target the priority systems or infiltrate information. The following article talks about VMware’s NSX™ Distributed Firewall, Intrusion Preventions, and Intrusion Detection System.

Note: Article in Progress. The following is only a basic skeleton for the more comprehensive overview.

[Read more…]

Is Ethical Hacking Ethical?

In the following article, I concentrate on some of the often-asked questions topic connected to ethical hacking, the area of computing concerned with the discovery of security vulnerabilities that can potentially be exploited by real hackers. [Read more…]

IT Compliance and Auditing in Canada

The following post is intended to explain some of the IT audit standards, control process and associated laws and regulations currently used in Canada. Even though, the 2012 research showed that only 16% of Canadian Businesses were not aware of privacy or security-related standards and we could say, that Canadian IT companies have moderate to high awareness of the compliance standards.

Note: This article is a work in progress. [Read more…]