Posts
 
Reputation
Joined
Last Seen
Ranked #843
Strength to Increase Rep
+1
Strength to Decrease Rep
-0
65% Quality Score
Upvotes Received
9
Posts with Upvotes
8
Upvoting Members
5
Downvotes Received
6
Posts with Downvotes
5
Downvoting Members
2
4 Commented Posts
2 Endorsements
Ranked #622
~5K People Reached
About Me

NGIT CSA

Interests
Information security
PC Specs
Intel Core i9, 64 GB DDR5, 1 TB SSD

11 Posted Topics

Member Avatar for Jameswood32

Personally, I use RAD Studio and FireMonkey, and for database management, I use FireDAC. For specialized Internet solutions, IPWorks. It is very easy to create multiplatform REST solutions with high performance. Moreover, the code is the same for Windows, iOS, Android, and Linux. But still, this requires you to know …

Member Avatar for fabwebstudio
2
54
Member Avatar for Dani

In modern development environments (like RAD Studio), syntax errors that AIs make are not a problem at all. And what kind of programming are we talking about? **Has anyone reviewed programs "written" by AI in Delphi, C#, C++, or assembler?** It is a completely different matter that everything that is …

Member Avatar for xrjf
0
84
Member Avatar for Ahsan_38

The widely used cryptographic solutions are based on encryption algorithms that use integer factorization or discrete logarithms. On the other hand, Shor's algorithm allows obtaining unauthorized access to a protected system in a time comparable to that required for multiplying prime numbers. Since 2006, the possible threats associated with the …

Member Avatar for IS-92
-2
44
Member Avatar for kamal12362

Hi Kamal, Reliable file uploading to a server requires a combination of configuration, code processing, and security measures. File uploads can pose significant risks, including malicious file uploads, server overload, and data leaks. To answer the question posed in this way, I would have to write an entire monograph. However, …

Member Avatar for IS-92
0
99
Member Avatar for Dani

Several technical inconsistencies in the GDPR are not addressed, but are critically important. The "right to be forgotten" is a typical example of such a technical inconsistency, and I can immediately explain why. **How exactly is the deletion of the "digital environment" carried out so that the requirements are actually …

Member Avatar for IS-92
0
69
Member Avatar for Reverend Jim

I completely agree with what you wrote. The reason for what is happening (I mean the commercial breaks) is the dependence on financial income from advertising. A similar trend is observed on the Internet. No product (or content) is sold, but advertising is relied on. Yes, but the number of …

Member Avatar for Reverend Jim
10
4K
Member Avatar for Dani

I started programming when punched cards were used. I was young then, and computers looked quite different. Terminals too. The first Apple II used a cassette player because I couldn't afford floppy disk drives. The most fun was programming the ZX Spectrum. That's when Linux was born (Novell too), but …

Member Avatar for IS-92
1
48
Member Avatar for IS-92

Control strings can be considered as an alternative to asymmetric encryption. **Unlike solutions that use public and private secret keys, here, session cryptographic protocols are exchanged implicitly.** In practice, a control string allows both parties (*sender and recipient*) to independently generate a symmetric set of cryptographic primitives (*encryption algorithm, encryption …

Member Avatar for Ritikadas
0
263
Member Avatar for Dani

I have direct observations regarding China. The truth is that in industrial production, the degree of automation is many times greater in the US and the EU, but this has had no impact on overall employment and tax policy. At the same time, it is good to take into account …

Member Avatar for Dani
0
359
Member Avatar for Dani

A very topical issue. Laws are mandatory, which requires their implementation. Standards, unlike laws, are often recommended, but they are subject to updating, taking into account the changes that have occurred, while this is not the case with laws. The cases of Cyberheaven, ExtensionTotal, Chrome Web Store, etc., have shown …

Member Avatar for IS-92
1
78
Member Avatar for mahjongsolitari

Do you use group calls? Much efficient to load the drawing state machine with long lists of commands and then unload them into the video buffer. For example, when drawing multiple lines, it's much better to create a single path with all the lines and draw it in a single …

Member Avatar for IS-92
1
48

The End.