Elliptic Curve Cryptography: computing shared key
If Alice and Bob want to exchange encrypted messages, they need to first agree on a Key. This shared key (also known as symmetric key) will be used to by both parties to encrypt messages. There are many ways of arriving at the shared key (including the old fashioned ... read more
Microsoft and Nokia missed the boat on tablets and smartphones. Microsoft’s Surface RT tablets were priced very high, and there were not many takers, with the result that Microsoft wrote off 900 million dollars as inventory adjustment. Nokia Lumia line with Windows Phone OS has been well received. Microsoft has bought Nokia’s struggling phone business. ... read more
VPS (Virtual private server) hosting that costs less than typical shared-hosting? Sounds too good to be true? I wondered about this and raised this issue a while back on the forum and got replies from the management and comments from others.
It is true. The VPS provider is the relatively newer kid on the block ... read more
There is no substitute for detailed code reviews, more so if the code is related to security. Any changes to such code, however minor, should be reviewed. However, in addition, it also helps if the compiler, tools etc can help in flagging potential errors.
Take the case of the very serious security error in ... read more