Hi! My name is Vladimir Remenar...

Vladimir Remenar ...and I am an Head of IT Operations Department at Sberbank d.d. Croatia. I love highly demanding projects and implementation of cutting edge tools and services. Oh, I love that security and forensics stuff.

07.2.2010 ~ 4 Comments

Netokracija: Realigned

Netokracija: Realigned

Netokracija is relatively young Croatian portal dealing with subjects of Internet technology, business and culture in general. It has been started by Ivan Brezak Brkan and he has managed to gather some of the most influential Croatian Internet experts on one place to write about design, UX, SEO, social media and so on.
The design of Netokracija is very good with nice set of colours and design elements, but in some elements it’s inconsistent and missing some of the basic usability guidelines.

Tags: , ,

30.1.2010 ~ 1 Comment

Hacking websites: The Series

Hacking websites: The Series

This is the beginning of the “Hacking websites” series which will try to explain why sites are hacked, how they are hacked and how to protect your website(s) from being hacked and broken. Motivated with rather discouraging results form Breach and WhiteHat security statistics reports I decided to start these series which will, hopefully, educate readers enough to protect their websites from top 10 vulnerability classes.

Tags: ,

12.1.2010 ~ 0 Comments

Possible Collision Avoidance With Off-Line Route Selection

Possible Collision Avoidance With Off-Line Route Selection

The paper describes the traffic flow problems in telecommunication networks based on the Internet protocol. The main aim of telecommunication network operator today is to offer an SLA (Service Level Agreement) contract to end users, with provided QoS for different classes of services. In order to achieve this, it is necessary to establish the routes between marginal network nodes meeting the network traffic requirements and optimizing the network performances free of simultaneous flows conflicts. In DiffServ/MPLS networks traffic flows traverse the network simultaneously and there may come to collision of concurrent flows. They are distributed among LSPs (Labeled Switching Paths) related to service classes. In LSP creation the IGP (Interior Gateway Protocol) uses simple on-line routing algorithms based on the shortest path methodology. In highly loaded networks this becomes an insufficient technique. In this suggested approach LSP need not necessarily be the shortest path solution. It can be pre-computed much earlier, possibly during the SLA negotiation process. In that sense an effective algorithm for collision control is developed. It may find a longer but lightly loaded path, taking care of the collision possibility. It could be a very good solution for collision avoidance and for better load-balancing purpose where links are running close to capacity. The algorithm can be significantly improved through heuristic approach. Heuristic options are compared in test-examples and their application for collision control is explained.

08.1.2010 ~ 0 Comments

Application Development for Geo-Referenced Audio Video Recording of the Traffic System Using Mobile Phones

Application Development for Geo-Referenced Audio Video Recording of the Traffic System Using Mobile Phones

The paper analyzes the development feasibility and the possibilities of using the application for mobile terminal devices with the aim of generating geo-referenced audio-video recordings of the traffic network. The application has been developed at the Faculty of Transport and Traffic Sciences in Zagreb, in J2ME environment. The application is meant to create a geo-referenced audio-video recording of the traffic network, and can therefore be efficiently applied by all who are involved in activities regarding the general condition of roads, road signage, road environment, in short, by anyone who may benefit from the geo-referenced audio-video recording of the traffic network in order to operate more efficiently.

Tags:

05.1.2010 ~ 0 Comments

Classification of Information System Hacking Tools

Classification of Information System Hacking Tools

In a process of hacking information system the attacker will be using one or more hacking tools to accomplish his objective. The hacking tools can be divided into two main categories: procedural classification and functional classification. Procedural classification describes which tools are use during seven steps of hacking attacker is going through. Functional classification is describing the main four categories based on the tools functionalities.

03.1.2010 ~ 0 Comments

Ink to the pen for the paper = keyboard to the blog for the Internet

Ink to the pen for the paper = keyboard to the blog for the Internet

A few of the recent articles: Smashing Magazine Killed The Community (Or Maybe It Was Me) from Drawar, That’s Why It’s Called Smashing Magazine from Echo Enduring Blog and Zero things I like about list posts from Janko At Warp Speed got me thinking about what are people using for what purpose, how are they calling it and how do people perceive some of the available services like Blog, Facebook and Twitter.

12.12.2009 ~ 1 Comment

Hacking Information Systems: Tools of the trade

Hacking Information Systems: Tools of the trade

For every step of the hacking process one or more tools could be required for the attacker to complete his objective. Although there are thousand of hacking tools variations all of them can be categorized to 14 basic categories.

Although, when talking about “tools” many will think about software solutions. But in a broader sense, hackers toolkit is much more than just software and it can be anything from piece of paper and a pen to human activities for collection of sensitive information and the penetration into the target system.

05.12.2009 ~ 2 Comments

Hacking Information Systems: The Seven Steps

Hacking Information Systems: The Seven Steps

Hacking an information system which can be a computer network, server or a web site collection can be, and it is, very complex procedure and different procedure for every information system. But in it’s essence follows the basic seven steps of hacking into some kind of information system. From basic scouting to full takeover these seven steps […]

01.12.2009 ~ 0 Comments

Microsoft Open Days 2009: How it was

Microsoft Open Days 2009: How it was

The Microsoft Open Days 2009 at Faculty of Transport and Traffic Sciences were held at 24th of November 2009. With auditorium crowded with students some might say it went really well :) Students could attend lectures thought out the entire day and in between lectures students could sense a part of the history with first Pocket PC […]

17.11.2009 ~ 1 Comment

WordPress installed. What now?

WordPress installed. What now?

So you have a fresh WordPress installation and you are wondering what to do now. Here are a few links that might help you customizing you WordPress installation to your needs, help you get better ranking on search engines and much more. Where to look for hi quality themes, hacks, plugins and a bunch of useful tips. […]