October 2022

SYSTEM ARCHITECURE

In this section, we describe the system architecture along with implementation details. Functional diagram of the clearing house subsystem...

AK 30 Oct, 2022

Ethical Considerations and Warnings

A book about hacking would be irresponsibly incomplete without a chapter giving you a fair warning on the consequences of misusing these ...

AK 23 Oct, 2022

The Universal Machine

Almost everyone has used a computer at one time or another. Perhaps you have played computer games or used a computer to write a paper or ...

AK 23 Oct, 2022

Competitor analysis

Competitor analysis or the monitoring of competitor use of e‑commerce to acquire and retain customers is especially important in the d...

AK 23 Oct, 2022

Ports and Firewalls

Ports, which are also sometimes called sockets , were one of the  hardest Fundamental  concepts for me to wrap my head around when I first...

AK 19 Oct, 2022

TECHNICAL APPROACH

The proliferation of unsolicited commercial e-mail messages has caused a reaction from technical and  legal Points  of view. Some technica...

AK 19 Oct, 2022

Attack Types and Famous Viruses

Most of you have probably heard of viruses, worms, malware, key  loggers, Rootkits , and Trojans before, but what the heck are these thing...

AK 18 Oct, 2022

Digital business and e‑commerce

Digital business transformation Significant changes to organizational processes, structures, and systems implemented to improve organizatio...

AK 18 Oct, 2022