Month: January 2019

ActiveX Security Model

Abstract Modern browsers act as a thin client by executing untrusted or portable code called Mobile_Code. For example, windows media player too could be used to run a song file in the browser. However, it is a trusted code to be executed in browsers. Moreover, it becomes malicious when hackers run it without the consent of the end […]

Resource Usage and Management Policy

Abstract Resources of a company vital assets, therefore required to be utilized with great caution, as well as administered and monitored by a responsible entity. This article comprises of resource usages, such as a computer, networks, the internet, phone, software application, and management policy related contents to provide insight into the subject that might be […]

Automated Unit Testing

Unit testing is a software development and testing approach in which the smallest testable parts of an application, called units, are individually and independently tested to see if they are operating properly. Unit testing can be done manually but is usually automated. Unit testing is a part of the test-driven development (TDD) methodology that requires […]

C# Secure Programming

OOP’s Object-oriented programming is the core ingredient of the .NET framework. OOP is so important that before embarking on the road to .NET, you must understand its basic principles and terminology to write even a simple program. The fundamental idea behind OOP is to combine into a single unit both data and the methods that […]

Scroll to top