- Strength to Increase Rep
- +2
- Strength to Decrease Rep
- -0
- Upvotes Received
- 16
- Posts with Upvotes
- 14
- Upvoting Members
- 8
- Downvotes Received
- 8
- Posts with Downvotes
- 7
- Downvoting Members
- 3
NGIT CSA
- Interests
- Information security
- PC Specs
- Intel Core i9, 64 GB DDR5, 1 TB SSD
13 Posted Topics
I completely agree with what you wrote. The reason for what is happening (I mean the commercial breaks) is the dependence on financial income from advertising. A similar trend is observed on the Internet. No product (or content) is sold, but advertising is relied on. Yes, but the number of …
Hello, What I can help with is a solution for creating and managing the lifecycle of virtual disks for all versions of Windows. The simplest solution for virtual disks in Delphi (RAD Studio) looks like this: uses Windows; var VirtualDiskFile: THandle; VirtualDiskAttributes: DWORD; begin // Creating a virtual disk ... …
Do you use group calls? Much efficient to load the drawing state machine with long lists of commands and then unload them into the video buffer. For example, when drawing multiple lines, it's much better to create a single path with all the lines and draw it in a single …
I have a question: **What should be studied in the so-called "computer science"?** In addition to semiconductor computers, we also have mechanical, hydraulic, pneumatic, photonic (*which are developing extremely dynamically*), and other types of computers. Mechanical differentiation and integration (*used in all metalworking machines*) is many times more precise than …
I started programming when punched cards were used. I was young then, and computers looked quite different. Terminals too. The first Apple II used a cassette player because I couldn't afford floppy disk drives. The most fun was programming the ZX Spectrum. That's when Linux was born (Novell too), but …
In modern development environments (like RAD Studio), syntax errors that AIs make are not a problem at all. And what kind of programming are we talking about? **Has anyone reviewed programs "written" by AI in Delphi, C#, C++, or assembler?** It is a completely different matter that everything that is …
Hi Kamal, Reliable file uploading to a server requires a combination of configuration, code processing, and security measures. File uploads can pose significant risks, including malicious file uploads, server overload, and data leaks. To answer the question posed in this way, I would have to write an entire monograph. However, …
Personally, I use RAD Studio and FireMonkey, and for database management, I use FireDAC. For specialized Internet solutions, IPWorks. It is very easy to create multiplatform REST solutions with high performance. Moreover, the code is the same for Windows, iOS, Android, and Linux. But still, this requires you to know …
The widely used cryptographic solutions are based on encryption algorithms that use integer factorization or discrete logarithms. On the other hand, Shor's algorithm allows obtaining unauthorized access to a protected system in a time comparable to that required for multiplying prime numbers. Since 2006, the possible threats associated with the …
Several technical inconsistencies in the GDPR are not addressed, but are critically important. The "right to be forgotten" is a typical example of such a technical inconsistency, and I can immediately explain why. **How exactly is the deletion of the "digital environment" carried out so that the requirements are actually …
Control strings can be considered as an alternative to asymmetric encryption. **Unlike solutions that use public and private secret keys, here, session cryptographic protocols are exchanged implicitly.** In practice, a control string allows both parties (*sender and recipient*) to independently generate a symmetric set of cryptographic primitives (*encryption algorithm, encryption …
I have direct observations regarding China. The truth is that in industrial production, the degree of automation is many times greater in the US and the EU, but this has had no impact on overall employment and tax policy. At the same time, it is good to take into account …
A very topical issue. Laws are mandatory, which requires their implementation. Standards, unlike laws, are often recommended, but they are subject to updating, taking into account the changes that have occurred, while this is not the case with laws. The cases of Cyberheaven, ExtensionTotal, Chrome Web Store, etc., have shown …
The End.