Hi! My name is Vladimir Remenar...

Vladimir Remenar ...and I am an assistant teacher at Faculty of Transport and Traffic Sciences in Zagreb, Croatia. I'm currently teaching students about mobile terminal equipment, information systems and securing information and communication systems (mostly web based information systems). I reeeeaaaally do enjoy developing and designing web sites. And did I mention, I like to break web sites :)

28.10.2014 ~ 0 Comments

Backup Group Policy objekata

Backup Group Policy objekata

Backup je najvažniji proces u održavanju bilo kojeg IT sustava. U slučaju katastrofalnog kvara ali i manje greške u radu sustava, uredno pohranjeni podaci u backup sustavu mogu značiti nekoliko sati kraći rad na oporavku sustava. Group Policy objekti u Active Directory infrastrukturi bitan su dio rada cijele infrastrukture. Greška u radu GPO-a može znatno […]

Tags: ,

23.10.2014 ~ 1 Comment

Scheduled Tasks i gMSA

Scheduled Tasks i gMSA

Scheduled Tasks (ili na hrvatskom “zadani zadaci”, ja ću koristiti engleski izraz) omogućavaju djelomičnu ili potpunu automatizaciju repetitivnog zadatka koji je potrebno izvršavati u definiranim vremenskim intervalima ili čak samo jednom ukoliko cilj tako zahtijeva. Scheduled Task se pokreće pod određenim korisničkim računom te da bi izvršio svoju radnju taj korisnički račun mora imati minimalno […]

22.10.2014 ~ 2 Comments

Group Managed Service Accounts

Group Managed Service Accounts

Group Managed Service Account (gMSA ili MSA) su iznimno korisni Active Directory objekti koji se mogu primjenjivati za mnoštvo stvari poput pokretanja servisa, zadataka (scheduled tasks), IIS servisa, itd. Sam gMSA objekt je derivat (ili bolje rečeno, hibrid) computer i user objekta Active Directorya. Najveća prednost gMSA objekata pred klasičnim user objektima je način upravljanja […]

Tags:

03.1.2014 ~ 0 Comments

Suvremeni informacijsko komunikacijski sustavi za usmjeravanje prometnih entiteta

Primjena suvremenih informacijsko komunikacijskih sustava, poput Cloud Computing platforme, u svrhu pružanja usluge usmjeravanja prometnih entiteta u stalnom je razvoju. Danas je dostupno tek nekolicina komercijalnih usluga koje su slabo primjenjive u svakodnevnoj uporabi. U svrhu usmjeravanja još uvijek se pretežno koriste samostalni navigacijski uređaji. Rad daje pregled razvoja i primjene suvremenih informacijsko komunikacijskih sustava i usluga primjenjivih za usmjeravanje prometnih entiteta. Uz navedeno, u radu je dana komparativna analiza primjene trenutno dostupnih Cloud Computing baziranih usluga za usmjeravanje prometnih entiteta. Provedeno istraživanje temelje je za daljnju analizu mogućnosti primjene XaaS modela te novih vrijednosnih lanaca u isporuci usluga usmjeravanja prometnih entiteta.

03.1.2014 ~ 0 Comments

Designing Secure Information and Communication Infrastructure of Faculty of Transport and Traffic Sciences

With the development of information and communication systems various methods and tools to attack them are being developed. Initially the attacks where performed for individual proof and the desire to learn, but the rise in popularity of Internet and the value of information that this medium transmit target attacks become financial benefit or even war activities. The purpose of this study is to determine the current state of information and communication systems of the Faculty of Transport and Traffic Sciences, define its security vulnerabilities or weaknesses, and based on its findings recommended solutions that will improve the level of safety and reliability of the system by applying the known methods and means of protection.

03.1.2014 ~ 0 Comments

Research of Security Threats in the Use of Modern Terminal Devices

Modern mobile terminal devices are multi-functional terminal devices with options such as: Internet access, using of applications, e-mail communication, messaging, data storage and using of multimedia files. The value of such data is often invaluable and vulnerability is often very high. Given the high use of smartphones and a variety of operating systems that they use (iOS, Android, Windows Phone …), the logical is the fact that these devices are frequent targets of malicious attacks. Research of this paper will focus on defining forms of security threats and possible attacks on smartphones and a brief description of possibilities for protecting smartphones. There will be displayed features of operating systems and specified the security aspects and specifics which carry some of the modern operating systems of mobile terminal devices.

Tags:

01.9.2012 ~ 13 Comments

Dobili ste dijete? Čeka Vas sređivanje papirologije :)

Novorođenče ste doveli doma, presretni ste ali čeka Vas dosadan posao sređivanja papirologije. Što očekivati? Ukratko: matični ured, MUP, Gradski ured za zdravstvo i branitelje, tvrtka roditelja, HZZO i Porezna uprava. Ako nemate popis dokumenata koji Vam treba obavljanje navedenog moglo bi biti mukotrpno. Zato pišem ovaj blog post u nadi da ću pomoći sadašnjim i budućim roditeljima. Popis sam dobio od prijateljice koja je taj popis dobila od prijateljice. Popis je iz 2010 godine i neke stvari su promijenjene ali u ovom blog postu će sve biti s datumom ovog blog posta. Uz redoslijed kada i što obaviti priložiti ću i potrebne formulare koje je potrebno ispuniti. Uvijek provjerite na stranicama ustanove da li su formulari izmijenjeni kako bi izbjegli nepotreban put. Jedini formular koji je potrebno kupiti i ispuniti je Tiskanica 3 koji možete kupiti u Narodnim novinama.

30.8.2012 ~ 0 Comments

Study of Implementing Available Security Controls of Wireless Computer Networks

This article will present an analysis of security levels of wireless home networks based on IEEE 802.11 standard. The analysis of security implementation will be done on the basis of activated security checks available to end users in order to protect their own wireless system to the full. The analysis will encompass average users as regards to their knowledge of network communication systems and implemented security checks. The end result, i.e. a realistic picture of the way end users think about wireless computer network security, which in turn will have an impact on science and society in general, will enhance the awareness of possible ways wireless networks can be abused.

Tags: , ,

30.8.2012 ~ 0 Comments

Guidelines for Developing e-Learning System for Visually Impaired

According to the last “People with Disabilities Report” (cro. Izvješće o osobama s invaliditetom) in Republic of Croatia lives 529 103 persons with disability which is more than 10 % of total population. There is 18 317 persons with impaired vision (blind and visually impaired). Compared to previous years this number has increased by 2044 people. According to estimates 10%, with a tendency to increase, of blind people is using the Internet. Estimates are based on documents and reports that are currently derived from the project “Communication Rod to Independence” (cro. Komunikacijskom štapom do neovisnosti). This paper will discuss described definitions and standards that will be im-plemented in learning management system (LMS) as a module for visually im-paired. LMS developed at the Faculty of Transport and Traffic Sciences has been in use since 2004. System is composed of five modules: Document Management System (DMS), The Authorization and Supervision System (cro. Sustav Autorizacije i Nadzora; SAN), students module e-Student, SMS module SMSCentar and mobile learning module FPZMobile.

Tags: ,

29.7.2012 ~ 0 Comments

Mendeley & Citation Style Language

Mendeley & Citation Style Language

As I continued to write my Ph.D. thesis I found it very hard to organize and find literature that was on my hard drive I needed at that moment. The problem has always existed but now it has escalated because I currently have more than 150 different papers that needed to be organized, categorized and searchable. After digging around […]