Hi! My name is Vladimir Remenar...

Vladimir Remenar ...and I am an DevOps Engineer at Sberbank d.d. Croatia. I love highly demanding projects and implementation of cutting edge tools and services. Oh, I love that security and forensics stuff.

11.11.2011 ~ 0 Comments

My Google Reader RSS subscriptions

I love RSS. I love Google Reader. I love my RSS collection!
I’ve been collecting this for some time now. This collection is not just a bunch of links but it’s a collection of carefully selected RSS channels. It contains almost 300 hundred RSS channels for web desing, UX and security. Most of the RSS channels are security related which include forensic analysis, exploits, malware analysis and PEN testinging.
Feel free to download this OPML and use it as you like it :)

13.7.2011 ~ 0 Comments

The Framework of e-Forensics in the Republic of Croatia

The Framework of e-Forensics in the Republic of Croatia

With the development of information communication systems and the services they provide, the complexity of the organization of information within information systems is growing. The complexity itself contributes to the increase in the number of electronic incidents and affects the high demands of forensic procedure implementation. It is estimated that in the near future the number of electronic incidents will outgrow the number of classical criminal incidents both financially and quantitatively. Due to the things mentioned above, early identification, discovering and taking legal proceedings against the perpetrator of an electronic incident are necessary. It is necessary to investigate all electronic incidents adequately and promptly and adapt the legal framework and laws related to e-Forensics. e-Forensics is a relatively new discipline within which there is a low level of standardization and consistency. With the purpose of increasing the quality of performing e-Forensics and presenting the evidence in a possible judicial proceeding one has to define the legal framework of e-Forensics. The analysis of current legal standards and methods used to perform e-Forensics is presented in the paper as well as the proposal of performing e-Forensics with defined procedures and methods.

07.12.2010 ~ 0 Comments

Model of the new LMS generation with user-created content

Model of the new LMS generation with user-created content

The Learning Management System (LMS) of the Faculty of Transport and Traffic Sciences has been in operation since 2004 when it was developed for the studying purposes according to the German Fachhochschule study concept and according to the then specific characteristics of studying in the Republic of Croatia. The system consists of five own developed modules (DMS, SAN, e-Student, SMSCentar and FPZmobile) which in synergy form the Faculty LMS. The Document Management System (DMS) is a system of managing documents and processes used for authorized access of the Faculty staff members to the modules that control the work of computer laboratories, e-Learning system administration (publishing of teaching materials, control and assessment of seminar papers, etc.), as well as the module for managing documents and processes within the Faculty (orders for equipment, reports on malfunctions, updated on-line directory, etc.). The authorization and supervision system (SAN) is a set of technologies and applications that allow supervision of students’ work on computers in computer classrooms of the Faculty, and personalization of the working environment in the Windows operating system, regardless of the particular computer the student is using. The e-Student system allows students authorized access to the teaching materials, tasks, exercises and instructions. Apart from this the system provides support in applying and producing seminar papers and various forms of knowledge testing (e-Blic, e-Test, e-Kviz). The SMSCentar and SAN system with smsCRM application (Customer Relationship Management via SMS) open up the possibilities for a number of information services for students and Faculty staff members based on interactive communication by means of SMS messages. Some three years ago, the m-Learning module was added to the e-Learning system of the Faculty in the form of interactive application for real-time information of students via mobile terminal devices, called FPZmobile. The basic idea was to develop an application that will provide accurate and up-to-date information related to the Faculty and the students’ achievements (seminars, exercises, quizzes, etc.) during their studying, in a form suitable for browsing on the mobile terminal devices interface, such as mobile phones, PDA devices or Smartphones. The modularity of such a system allows fast implementation of the new services according to the ideas and suggestions expressed both by the teaching and the non-teaching staff, and the students.

Tags: , ,

22.11.2010 ~ 0 Comments

HTML5 and CSS3 Frameworks

HTML5 and CSS3 Frameworks

With CSS3 and HTML5 around the corner, well sort of, and tons of articles found on the web with introductions and tutorials maybe it’s time to introduce some of the tools that can make your life and work just a bit easier. I’m talking about CSS3 and HTML5 frameworks. As frameworks like Blueprint, 960gs, BlueTrip, Elasticss and YAML made your life easier when developing web site and applications using HTML4 and CSS2.1 frameworks described here can be used today to help you develop modern and future-ready rich web sites and applications.

21.7.2010 ~ 0 Comments

Conceptual Model of Developing a New LMS System of the Faculty of Transport and Traffic Sciences

The e-Learning system of the Faculty of Transport and Traffic Sciences has been continuously developed since 2004 for the study requirements according to the German study concept of the Fachhochschule and according to the specific study characteristics in the Republic of Croatia, using a modular approach. Currently there are five modules functioning (DMS, SAN, e-Student, SMSCentar and FPZmobile) which together form the Learning Management System (LMS) of the Faculty of Transport and Traffic Sciences.
DMS (Document Management System) is a system for managing documents and processes which is used for authorized access by the Faculty staff members to modules: control of work of the computer laboratories (check of access to exercises, etc.), e-Learning system administration (publishing of teaching materials, control and grading of seminar papers, etc.) and the module for documents and processes management within the Faculty (orders for equipment, report on failures, updated on-line directory, etc.)
SAN (cro. Sustav autorizacije i nadzora, eng. The authorization and control system) is a set of applications which applies the advanced IT technologies to allow supervising the work of students on the computers at the computer laboratories of the Faculty of Transport and Traffic Sciences and personalization of the working environment in the Windows operation system, regardless of which computer is being used by the student.

Tags: , ,

08.5.2010 ~ 0 Comments

EMERGING 2010: The Second International Conference on Emerging Network Intelligence

EMERGING 2010: The Second International Conference on Emerging Network Intelligence

Next-generation large distributed networks and systems require substantial reconsideration of exiting ‘de facto’ approaches and mechanisms to sustain an increasing demand on speed, scale, bandwidth, topology and flow changes, user complex behavior, security threats, and service and user ubiquity. As a result, growing research and industrial forces are focusing on new approaches for advanced communications considering new devices and protocols, advanced discovery mechanisms, and programmability techniques to express, measure and control the service quality, security, environmental and user requirements.

The event EMERGING 2010, The Second International Conference on Emerging Network Intelligence, constitutes a stage to present and evaluate the advances in emerging solutions for next-generation architectures, devices, and communications protocols. Particular focus is aimed at optimization, quality, discovery, protection, and user profile requirements supported by special approaches such as network coding, configurable protocols, context-aware optimization, ambient systems, anomaly discovery, and adaptive mechanisms.

Tags: ,

06.3.2010 ~ 1 Comment

Usability Testing: Eye Tracking and Control

Usability Testing: Eye Tracking and Control

Usability testing is becoming an important participant in designing and developing web sites and application. Good usability can save a company thousands of dollars either in customer satisfaction, reduced time for company employed in performing everyday tasks and so on. Most of the usability testing today is performed using a combination of screen sharing software, screen capture software, voice recording software to capture what the participant is doing and thinking (think aloud) while using the application which is being tested. But, does a participant move a mouse where his eyes are looking? Most of the time no! This is where Tobii Eye Tracking and Control solutions help to realize what is user looking at and how long is the user looking at something.

Tags:

07.2.2010 ~ 4 Comments

Netokracija: Realigned

Netokracija: Realigned

Netokracija is relatively young Croatian portal dealing with subjects of Internet technology, business and culture in general. It has been started by Ivan Brezak Brkan and he has managed to gather some of the most influential Croatian Internet experts on one place to write about design, UX, SEO, social media and so on.
The design of Netokracija is very good with nice set of colours and design elements, but in some elements it’s inconsistent and missing some of the basic usability guidelines.

Tags: , ,

30.1.2010 ~ 1 Comment

Hacking websites: The Series

Hacking websites: The Series

This is the beginning of the “Hacking websites” series which will try to explain why sites are hacked, how they are hacked and how to protect your website(s) from being hacked and broken. Motivated with rather discouraging results form Breach and WhiteHat security statistics reports I decided to start these series which will, hopefully, educate readers enough to protect their websites from top 10 vulnerability classes.

Tags: ,

12.1.2010 ~ 0 Comments

Possible Collision Avoidance With Off-Line Route Selection

Possible Collision Avoidance With Off-Line Route Selection

The paper describes the traffic flow problems in telecommunication networks based on the Internet protocol. The main aim of telecommunication network operator today is to offer an SLA (Service Level Agreement) contract to end users, with provided QoS for different classes of services. In order to achieve this, it is necessary to establish the routes between marginal network nodes meeting the network traffic requirements and optimizing the network performances free of simultaneous flows conflicts. In DiffServ/MPLS networks traffic flows traverse the network simultaneously and there may come to collision of concurrent flows. They are distributed among LSPs (Labeled Switching Paths) related to service classes. In LSP creation the IGP (Interior Gateway Protocol) uses simple on-line routing algorithms based on the shortest path methodology. In highly loaded networks this becomes an insufficient technique. In this suggested approach LSP need not necessarily be the shortest path solution. It can be pre-computed much earlier, possibly during the SLA negotiation process. In that sense an effective algorithm for collision control is developed. It may find a longer but lightly loaded path, taking care of the collision possibility. It could be a very good solution for collision avoidance and for better load-balancing purpose where links are running close to capacity. The algorithm can be significantly improved through heuristic approach. Heuristic options are compared in test-examples and their application for collision control is explained.