Recent posts

Cryptography Explained

3 minute read

Cryptography (encryption) is the process of protecting information by transforming it into an unreadable format, called cipher text. This will usually be don...

Public Key Infrastructure

2 minute read

Why is PKI necessary? The trouble with communication on the internet is that it is very easy for a third party to intercept the data being sent between two p...

Vpn And Vlan For Secure Remote Networking

5 minute read

Introduction This report will discuss the use of VPN technologies for secure communication across the internet. It will critically evaluate various VPN solut...

What Is A Restful Api

4 minute read

What is an API? An Application Programming Interface (API) is simply a way of exposing the internal functionality of a service in a safe way. This enables cl...

How To Get Your Current Location In Android

less than 1 minute read

The following is a reference implementation for retrieving your current geo-graphical location using your Android device. The following Helper class can be u...