Hi! My name is Vladimir Remenar...

Vladimir Remenar ...and I am an Head of IT Operations Department at Sberbank d.d. Croatia. I love highly demanding projects and implementation of cutting edge tools and services. Oh, I love that security and forensics stuff.

21.7.2010 ~ 0 Comments

Conceptual Model of Developing a New LMS System of the Faculty of Transport and Traffic Sciences

The e-Learning system of the Faculty of Transport and Traffic Sciences has been continuously developed since 2004 for the study requirements according to the German study concept of the Fachhochschule and according to the specific study characteristics in the Republic of Croatia, using a modular approach. Currently there are five modules functioning (DMS, SAN, e-Student, SMSCentar and FPZmobile) which together form the Learning Management System (LMS) of the Faculty of Transport and Traffic Sciences.
DMS (Document Management System) is a system for managing documents and processes which is used for authorized access by the Faculty staff members to modules: control of work of the computer laboratories (check of access to exercises, etc.), e-Learning system administration (publishing of teaching materials, control and grading of seminar papers, etc.) and the module for documents and processes management within the Faculty (orders for equipment, report on failures, updated on-line directory, etc.)
SAN (cro. Sustav autorizacije i nadzora, eng. The authorization and control system) is a set of applications which applies the advanced IT technologies to allow supervising the work of students on the computers at the computer laboratories of the Faculty of Transport and Traffic Sciences and personalization of the working environment in the Windows operation system, regardless of which computer is being used by the student.

Tags: , ,

08.5.2010 ~ 0 Comments

EMERGING 2010: The Second International Conference on Emerging Network Intelligence

EMERGING 2010: The Second International Conference on Emerging Network Intelligence

Next-generation large distributed networks and systems require substantial reconsideration of exiting ‘de facto’ approaches and mechanisms to sustain an increasing demand on speed, scale, bandwidth, topology and flow changes, user complex behavior, security threats, and service and user ubiquity. As a result, growing research and industrial forces are focusing on new approaches for advanced communications considering new devices and protocols, advanced discovery mechanisms, and programmability techniques to express, measure and control the service quality, security, environmental and user requirements.

The event EMERGING 2010, The Second International Conference on Emerging Network Intelligence, constitutes a stage to present and evaluate the advances in emerging solutions for next-generation architectures, devices, and communications protocols. Particular focus is aimed at optimization, quality, discovery, protection, and user profile requirements supported by special approaches such as network coding, configurable protocols, context-aware optimization, ambient systems, anomaly discovery, and adaptive mechanisms.

Tags: ,

06.3.2010 ~ 1 Comment

Usability Testing: Eye Tracking and Control

Usability Testing: Eye Tracking and Control

Usability testing is becoming an important participant in designing and developing web sites and application. Good usability can save a company thousands of dollars either in customer satisfaction, reduced time for company employed in performing everyday tasks and so on. Most of the usability testing today is performed using a combination of screen sharing software, screen capture software, voice recording software to capture what the participant is doing and thinking (think aloud) while using the application which is being tested. But, does a participant move a mouse where his eyes are looking? Most of the time no! This is where Tobii Eye Tracking and Control solutions help to realize what is user looking at and how long is the user looking at something.

Tags:

07.2.2010 ~ 4 Comments

Netokracija: Realigned

Netokracija: Realigned

Netokracija is relatively young Croatian portal dealing with subjects of Internet technology, business and culture in general. It has been started by Ivan Brezak Brkan and he has managed to gather some of the most influential Croatian Internet experts on one place to write about design, UX, SEO, social media and so on.
The design of Netokracija is very good with nice set of colours and design elements, but in some elements it’s inconsistent and missing some of the basic usability guidelines.

Tags: , ,

30.1.2010 ~ 1 Comment

Hacking websites: The Series

Hacking websites: The Series

This is the beginning of the “Hacking websites” series which will try to explain why sites are hacked, how they are hacked and how to protect your website(s) from being hacked and broken. Motivated with rather discouraging results form Breach and WhiteHat security statistics reports I decided to start these series which will, hopefully, educate readers enough to protect their websites from top 10 vulnerability classes.

Tags: ,

12.1.2010 ~ 0 Comments

Possible Collision Avoidance With Off-Line Route Selection

Possible Collision Avoidance With Off-Line Route Selection

The paper describes the traffic flow problems in telecommunication networks based on the Internet protocol. The main aim of telecommunication network operator today is to offer an SLA (Service Level Agreement) contract to end users, with provided QoS for different classes of services. In order to achieve this, it is necessary to establish the routes between marginal network nodes meeting the network traffic requirements and optimizing the network performances free of simultaneous flows conflicts. In DiffServ/MPLS networks traffic flows traverse the network simultaneously and there may come to collision of concurrent flows. They are distributed among LSPs (Labeled Switching Paths) related to service classes. In LSP creation the IGP (Interior Gateway Protocol) uses simple on-line routing algorithms based on the shortest path methodology. In highly loaded networks this becomes an insufficient technique. In this suggested approach LSP need not necessarily be the shortest path solution. It can be pre-computed much earlier, possibly during the SLA negotiation process. In that sense an effective algorithm for collision control is developed. It may find a longer but lightly loaded path, taking care of the collision possibility. It could be a very good solution for collision avoidance and for better load-balancing purpose where links are running close to capacity. The algorithm can be significantly improved through heuristic approach. Heuristic options are compared in test-examples and their application for collision control is explained.

08.1.2010 ~ 0 Comments

Application Development for Geo-Referenced Audio Video Recording of the Traffic System Using Mobile Phones

Application Development for Geo-Referenced Audio Video Recording of the Traffic System Using Mobile Phones

The paper analyzes the development feasibility and the possibilities of using the application for mobile terminal devices with the aim of generating geo-referenced audio-video recordings of the traffic network. The application has been developed at the Faculty of Transport and Traffic Sciences in Zagreb, in J2ME environment. The application is meant to create a geo-referenced audio-video recording of the traffic network, and can therefore be efficiently applied by all who are involved in activities regarding the general condition of roads, road signage, road environment, in short, by anyone who may benefit from the geo-referenced audio-video recording of the traffic network in order to operate more efficiently.

Tags:

05.1.2010 ~ 0 Comments

Classification of Information System Hacking Tools

Classification of Information System Hacking Tools

In a process of hacking information system the attacker will be using one or more hacking tools to accomplish his objective. The hacking tools can be divided into two main categories: procedural classification and functional classification. Procedural classification describes which tools are use during seven steps of hacking attacker is going through. Functional classification is describing the main four categories based on the tools functionalities.

03.1.2010 ~ 0 Comments

Ink to the pen for the paper = keyboard to the blog for the Internet

Ink to the pen for the paper = keyboard to the blog for the Internet

A few of the recent articles: Smashing Magazine Killed The Community (Or Maybe It Was Me) from Drawar, That’s Why It’s Called Smashing Magazine from Echo Enduring Blog and Zero things I like about list posts from Janko At Warp Speed got me thinking about what are people using for what purpose, how are they calling it and how do people perceive some of the available services like Blog, Facebook and Twitter.

12.12.2009 ~ 1 Comment

Hacking Information Systems: Tools of the trade

Hacking Information Systems: Tools of the trade

For every step of the hacking process one or more tools could be required for the attacker to complete his objective. Although there are thousand of hacking tools variations all of them can be categorized to 14 basic categories.

Although, when talking about “tools” many will think about software solutions. But in a broader sense, hackers toolkit is much more than just software and it can be anything from piece of paper and a pen to human activities for collection of sensitive information and the penetration into the target system.