codesinverse.blogspot.com
Codes in Verse: Hands-On Project 11-3 (Page 396)
http://codesinverse.blogspot.com/2010/08/hands-on-project-11-3-page-396.html
Friday, August 27, 2010. Hands-On Project 11-3 (Page 396). 8220;As an alternative to EFS, third party applications can also be downloaded to protect files with cryptography. In this project, you will download and install TrueCrypt.” (Ciampa, 2009). 1 The first step was to download TrueCrypt at truecrypt.org and install it. 2 Next, I opened up TrueCrypt and created a new volume. 4 Then, I selected the ‘Standard TrueCrypt Volume’. 6 Next, I set the volume size to 1 MB. 11 Following the instructions in the ...
codesinverse.blogspot.com
Codes in Verse: April 2010
http://codesinverse.blogspot.com/2010_04_01_archive.html
Friday, April 30, 2010. I registered this blogsite with the purpose of logging my ST2401 : IT SECURITY ESSENTIALS 1. Module progress in my course DISM in Singapore Polytechnic. I will look upon your treasures gypsy, is this understood? Subscribe to: Posts (Atom). A propos de moi. Dip in Infocomm Security (01). Jun Liang's Log Blog. Kin Wee's Log Blog. Ngai Fong's Log Blog. Zi Ying's Log Blog.
codesinverse.blogspot.com
Codes in Verse: WAD Practical 2 - Develop a Customer Registration form using JSTL
http://codesinverse.blogspot.com/2011/06/wad-practical-2-develop-customer.html
Sunday, June 12, 2011. WAD Practical 2 - Develop a Customer Registration form using JSTL. After completing this practical, you should be able to. Independently try out other example codes that come with the book and duplicate the examples in your WADprac project. Understand what scope variables are. Understand how to use include page directives. Able to access Application Data. Able to access Forms Data. Exercise 1 - Duplicate the example codes in the WADprac project. Fig 11: Created new folder 'pract2'.
codesinverse.blogspot.com
Codes in Verse: Web Application Development Notice
http://codesinverse.blogspot.com/2011/06/web-application-development-notice.html
Sunday, June 5, 2011. Web Application Development Notice. From this point onwards, this blog can be used to document the WEB APPLICATIONS DEVELOPMENT (ST2217) Practicals with the tag 'wad'. Subscribe to: Post Comments (Atom). A propos de moi. Dip in Infocomm Security (01). Jun Liang's Log Blog. Kin Wee's Log Blog. Ngai Fong's Log Blog. Zi Ying's Log Blog. WAD Practical 2 - Develop a Customer Registration . WAD Practical 1 - Setting up the Web Applications . Web Application Development Notice.
codesinverse.blogspot.com
Codes in Verse: /dev/null_("Credits")
http://codesinverse.blogspot.com/p/credits.html
Xkimjoanne. (n.d.). With Roses In My Hair. Retrieved May 22, 2010, from DeviantArt: http:/ xkimjoanne.deviantart.com/art/With-Roses-In-My-Hair-164855477? Q=boost%3Apopular in%3Aphotography max age%3A24h&qo=20. Subscribe to: Posts (Atom). A propos de moi. Dip in Infocomm Security (01). Jun Liang's Log Blog. Kin Wee's Log Blog. Ngai Fong's Log Blog. Zi Ying's Log Blog. WAD Practical 2 - Develop a Customer Registration . WAD Practical 1 - Setting up the Web Applications . Web Application Development Notice.
takuminopage.wordpress.com
Practical 2 | Jun Liang's Page
https://takuminopage.wordpress.com/practical-2
Jun Liang's Page. Familiarisation of Lab environment. Monday, 1 May 2010. Basically, using Vmware is like using another computer system (guest) in the current computer (host) that is running the VMware. It’s the same as navigating through a normal computer but the system software could not be maintained or updated up to date and you can also change add or remove devices virtually, compared to physically doing so on a host computer. Monday, 1 May 2010. Monday, 1 May 2010. The Microsoft Windows Malicious S...
takuminopage.wordpress.com
Practical 1 | Jun Liang's Page
https://takuminopage.wordpress.com/it-security-essentials-1
Jun Liang's Page. IT SECURITY ESSENTIALS 1. Monday, 26 April 2010. What is VMware Server? It’s a virtual machine that enables the user to work with different operating system concurrently such as from Windows, Solaris, Linux and NetWare. Getting started with VMware server. Monday, 26 April 2010. Recent article that relates to today’s security attack. Basically, Firefox registers a URL protocol handler to handle firefoxurl. If an IE user visits a webpage that tries to call a firefoxurl (e.g. i...RSS solve...
codesinverse.blogspot.com
Codes in Verse: /bin_("Content Page")
http://codesinverse.blogspot.com/p/contents.html
Security Guide to Network Security Fundementals. Mark Ciampa, 2009). Chapter 1: Introduction to Security. Hands-On Practical 1-1 (Page 30). Hands-On Practical 1-2 (Page 31). Hands-On Practical 1-3 (Page 33). Hands-On Practical 1-4 (Page 35). Chapter 2: System Threats and Risks. Hands-On Project 2-1 (Page 70). Hands-On Project 2-2 (Page 71). Hands-On Project 2-3 (Page 72). Chapter 3: Protecting Systems. Hands-On Project 3-2 (Page 111). Hands-On Project 3-3 (Page 113). Hands-On Project 4-1 (Page 148).