Youry's Blog

Youry's Blog

Archive for March 2009

Windows Slideshow: 25 Things You Didn’t Know About Microsoft by eweek.com

leave a comment »

Windows Slideshow: 25 Things You Didn’t Know About Microsoft https://youryblog.wordpress.com/wp-admin/post-new.php

Written by youryblog

March 30, 2009 at 8:57 PM

Posted in Interesting

The snooping dragon: social-malware surveillance of the Tibetan movement by Shishir Nagaraja, Ross Anderson March 2009

leave a comment »

“…a case of malware-based electronic surveillance of a political organisation by the agents of a nation state. While malware attacks are not new, two aspects of this case make it worth serious study. First, it was a targeted surveillance attack designed to collect actionable intelligence for use by the police and security services of a repressive state, with potentially fatal consequences for those exposed. Second, the modus operandi combined social phishing with high-grade malware. ” see more on http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-746.html

Written by youryblog

March 30, 2009 at 8:01 PM

Posted in SecurityNews

Define System Scope and Boundaries by Mosaic, Inc. 2001-2008

leave a comment »

“Since system size is a measure of the magnitude of all components of a system that are within the current scope, the system scope should be documented in the project plan before the system size is estimated. The scope statement defines what the project will and will not include, in enough detail to clearly communicate to all participants.” see more here http://www.testablerequirements.com/testablerequirements/def_sys_scope_bound.htm

Written by youryblog

March 30, 2009 at 4:01 PM

Posted in SW Design

Use Case Templates from TechnoSolutions Corporation 1995-2007

leave a comment »

Use Case Templates from TechnoSolutions Corporation 1995-2007 see here http://www.technosolutions.com/use_case_template.html

Written by youryblog

March 30, 2009 at 2:26 PM

Posted in SW Design

UML 2 Use Case Diagrams by Scott W. Ambler 2003-2006

with one comment

“The Object Primer 3rd Edition: Agile Model Driven Development (AMDD) with UML 2 use case diagrams overview the usage requirements for a system. They are useful for presentations to management and/or project stakeholders, but for actual development you will find that use cases provide significantly more value because they describe “the meat” of the actual requirements.” see more here http://www.agilemodeling.com/artifacts/useCaseDiagram.htm

Written by youryblog

March 30, 2009 at 2:17 PM

Posted in SW Design

Shining a Light on LAMP By Peter Yared

leave a comment »

Shining a Light on LAMP
By Peter Yared on http://www.developer.com/open/article.php/3560296
“In the past, LAMP, whether as a whole or as mix-and-match components, was primarily used by large, massively scalable Web sites such as Amazon, Google, Yahoo, and Friendster. Now, LAMP is seeing increasing adoption from enterprise customers, particularly for Wiki and content management solutions. Furthermore, large transactional LAMP applications are already deployed at major companies including Lufthansa, Sabre (Travelocity), Boeing, and Disney.”
“LAMP is composed of several separate open source projects, each with its own owners, packages, and distributors. Each of the core components of LAMP has a major commercial or nonprofit foundation behind it:

* Linux: Red Hat, Novell
* Apache: Covalent
* MySQL: MySQL AB
* PHP/Python/Perl: Zend, Python Software Foundation, the Perl Foundation”
LAMP Architecture

Written by youryblog

March 30, 2009 at 10:20 AM

Posted in LAMP

Security Slideshow: 14 Insider Security Threats

leave a comment »

Written by youryblog

March 29, 2009 at 10:13 AM

Posted in SecurityNews