- Strength to Increase Rep
- +1
- Strength to Decrease Rep
- -0
- Upvotes Received
- 9
- Posts with Upvotes
- 8
- Upvoting Members
- 5
- Downvotes Received
- 6
- Posts with Downvotes
- 5
- Downvoting Members
- 2
NGIT CSA
- Interests
- Information security
- PC Specs
- Intel Core i9, 64 GB DDR5, 1 TB SSD
11 Posted Topics
Personally, I use RAD Studio and FireMonkey, and for database management, I use FireDAC. For specialized Internet solutions, IPWorks. It is very easy to create multiplatform REST solutions with high performance. Moreover, the code is the same for Windows, iOS, Android, and Linux. But still, this requires you to know …
In modern development environments (like RAD Studio), syntax errors that AIs make are not a problem at all. And what kind of programming are we talking about? **Has anyone reviewed programs "written" by AI in Delphi, C#, C++, or assembler?** It is a completely different matter that everything that is …
The widely used cryptographic solutions are based on encryption algorithms that use integer factorization or discrete logarithms. On the other hand, Shor's algorithm allows obtaining unauthorized access to a protected system in a time comparable to that required for multiplying prime numbers. Since 2006, the possible threats associated with the …
Hi Kamal, Reliable file uploading to a server requires a combination of configuration, code processing, and security measures. File uploads can pose significant risks, including malicious file uploads, server overload, and data leaks. To answer the question posed in this way, I would have to write an entire monograph. However, …
Several technical inconsistencies in the GDPR are not addressed, but are critically important. The "right to be forgotten" is a typical example of such a technical inconsistency, and I can immediately explain why. **How exactly is the deletion of the "digital environment" carried out so that the requirements are actually …
I completely agree with what you wrote. The reason for what is happening (I mean the commercial breaks) is the dependence on financial income from advertising. A similar trend is observed on the Internet. No product (or content) is sold, but advertising is relied on. Yes, but the number of …
I started programming when punched cards were used. I was young then, and computers looked quite different. Terminals too. The first Apple II used a cassette player because I couldn't afford floppy disk drives. The most fun was programming the ZX Spectrum. That's when Linux was born (Novell too), but …
Control strings can be considered as an alternative to asymmetric encryption. **Unlike solutions that use public and private secret keys, here, session cryptographic protocols are exchanged implicitly.** In practice, a control string allows both parties (*sender and recipient*) to independently generate a symmetric set of cryptographic primitives (*encryption algorithm, encryption …
I have direct observations regarding China. The truth is that in industrial production, the degree of automation is many times greater in the US and the EU, but this has had no impact on overall employment and tax policy. At the same time, it is good to take into account …
A very topical issue. Laws are mandatory, which requires their implementation. Standards, unlike laws, are often recommended, but they are subject to updating, taking into account the changes that have occurred, while this is not the case with laws. The cases of Cyberheaven, ExtensionTotal, Chrome Web Store, etc., have shown …
Do you use group calls? Much efficient to load the drawing state machine with long lists of commands and then unload them into the video buffer. For example, when drawing multiple lines, it's much better to create a single path with all the lines and draw it in a single …
The End.