Blog

Advantages and Disadvantages of SaaS,PaaS and IaaS

The following is a list of disadvantages and advantages of SaaS, PaaS and IaaS in comparison to one another. SaaS (Advantages) The most cost effective Cloud service as you only lease the software and not the resource. SaaS requires minimal planning and is easy to setup, as applications are usually simple in usage and readymade. […]

Read More

Log file locations in Ubunutu

Details of the log files and their locations used in Ubuntu Following is a list of default log files/folders found in Ubuntu 12.04 LTS /var/log/apt/ – Contains files log and term.logdetails. These log files contain a list of installed applications. /var/log/log Login/authentication information. /var/log/log System boot log file. /var/log/Consolekit/history Log file of what users are […]

Read More

Review of Paper “Brubaker et al “Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS”

SSL/TLS is the most widely deployed security protocol and probably the most important protocol used on the internet today. It is commonly implemented to protect HTTP communication from network attacks such as man-in-the-middle attacks. SSL/TLS is layered on top of HTTP to support end-to-end confidentiality, integrity of data and client/server authentication. In this paper by […]

Read More

Uncertainty in security risk analyses

Uncertainty can be defined as the unquantifiable likelihood of an event, which could be either in the past or future. Certainty on the other hand can be defined as having absolute knowledge of an event. For example, to be certain that your computer was not infected by a virus in the past, you would have […]

Read More