C# Abstract Classes Vs Interfaces D 12:17:00 PM Add Comment We use abstract classes when the base class can't have concrete implementation and that we need the derived class to fully implement it... Read More
Phishing D 7:11:00 AM Add Comment Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me... Read More
Data Mining of Email Traffic Patterns D 6:08:00 AM Add Comment E-mail traffic is one of the main target of intelligence surveillance to detect terrorist and other malicious activities. Its rather easy a... Read More
Wiretapping of US Citizen Internet Usage D 6:04:00 AM Add Comment First of all, I don't think a search warrant is surely required in such a case as it is against Fourth Amendment. Now after 9/11, the i... Read More
Internet Intelligence Add-ons and Hackers D 6:00:00 AM Add Comment Here's a special report that analyzes how the Internet can facilitate terrorist operations - http://www.usip.org/pubs/specialreports/sr... Read More