ºÝºÝߣshows by User: masteramuk / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: masteramuk / Fri, 03 Apr 2020 03:08:47 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: masteramuk Ontology model for c overflow vulnerabilities attack /slideshow/ontology-model-for-c-overflow-vulnerabilities-attack/231329195 ontologymodelforc-overflowvulnerabilitiesattackijatcse-200403030848
An Ontology Model for C Overflow Vulnerabilities Attack developed based on C Overflow Vulnerabilities Attack Taxonomy]]>

An Ontology Model for C Overflow Vulnerabilities Attack developed based on C Overflow Vulnerabilities Attack Taxonomy]]>
Fri, 03 Apr 2020 03:08:47 GMT /slideshow/ontology-model-for-c-overflow-vulnerabilities-attack/231329195 masteramuk@slideshare.net(masteramuk) Ontology model for c overflow vulnerabilities attack masteramuk An Ontology Model for C Overflow Vulnerabilities Attack developed based on C Overflow Vulnerabilities Attack Taxonomy <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ontologymodelforc-overflowvulnerabilitiesattackijatcse-200403030848-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> An Ontology Model for C Overflow Vulnerabilities Attack developed based on C Overflow Vulnerabilities Attack Taxonomy
Ontology model for c overflow vulnerabilities attack from Nurul Haszeli Ahmad
]]>
240 0 https://cdn.slidesharecdn.com/ss_thumbnails/ontologymodelforc-overflowvulnerabilitiesattackijatcse-200403030848-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Agile Project Management: Introduction to AGILE - The Basic 101 /slideshow/agile-project-management-introduction-to-agile-the-basic-101/55918178 agileprojectmanagement-basic101-151208041547-lva1-app6891
The slide briefly describe the current project management and issues, briefly on agile and share some of example in implementing agile with very basic and simple implementation.]]>

The slide briefly describe the current project management and issues, briefly on agile and share some of example in implementing agile with very basic and simple implementation.]]>
Tue, 08 Dec 2015 04:15:47 GMT /slideshow/agile-project-management-introduction-to-agile-the-basic-101/55918178 masteramuk@slideshare.net(masteramuk) Agile Project Management: Introduction to AGILE - The Basic 101 masteramuk The slide briefly describe the current project management and issues, briefly on agile and share some of example in implementing agile with very basic and simple implementation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/agileprojectmanagement-basic101-151208041547-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The slide briefly describe the current project management and issues, briefly on agile and share some of example in implementing agile with very basic and simple implementation.
Agile Project Management: Introduction to AGILE - The Basic 101 from Nurul Haszeli Ahmad
]]>
5738 18 https://cdn.slidesharecdn.com/ss_thumbnails/agileprojectmanagement-basic101-151208041547-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Windows Services 101 /slideshow/windows-services-101/48830438 gictknowledgesharing-windowsservices101vpublic-150601082553-lva1-app6892
A slide on windows services - basic and introduction of windows services]]>

A slide on windows services - basic and introduction of windows services]]>
Mon, 01 Jun 2015 08:25:53 GMT /slideshow/windows-services-101/48830438 masteramuk@slideshare.net(masteramuk) Windows Services 101 masteramuk A slide on windows services - basic and introduction of windows services <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/gictknowledgesharing-windowsservices101vpublic-150601082553-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A slide on windows services - basic and introduction of windows services
Windows Services 101 from Nurul Haszeli Ahmad
]]>
2081 8 https://cdn.slidesharecdn.com/ss_thumbnails/gictknowledgesharing-windowsservices101vpublic-150601082553-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
A SOURCE CODE PERSPECTIVE �C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY �BASED ON WELL-DEFINED CRITERIA - Viva Presentation /slideshow/a-source-code-perspective-c-overflow-vulnerabilities-exploit-taxonomy-based-on-welldefined-criteria-viva-presentation/46845342 vivapresentationslide-150410025124-conversion-gate01
A presentation slide for masters study which shares on research work including result done for research on C overflow vulnerabilities and solutions]]>

A presentation slide for masters study which shares on research work including result done for research on C overflow vulnerabilities and solutions]]>
Fri, 10 Apr 2015 02:51:24 GMT /slideshow/a-source-code-perspective-c-overflow-vulnerabilities-exploit-taxonomy-based-on-welldefined-criteria-viva-presentation/46845342 masteramuk@slideshare.net(masteramuk) A SOURCE CODE PERSPECTIVE �C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY �BASED ON WELL-DEFINED CRITERIA - Viva Presentation masteramuk A presentation slide for masters study which shares on research work including result done for research on C overflow vulnerabilities and solutions <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vivapresentationslide-150410025124-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presentation slide for masters study which shares on research work including result done for research on C overflow vulnerabilities and solutions
A SOURCE CODE PERSPECTIVE C OVERFLOW VULNERABILITIES EXPLOIT TAXONOMY BASED ON WELL-DEFINED CRITERIA - Viva Presentation from Nurul Haszeli Ahmad
]]>
1139 3 https://cdn.slidesharecdn.com/ss_thumbnails/vivapresentationslide-150410025124-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
C Overflows Vulnerabilities Exploit Taxonomy And Evaluation on Static Analysis Tools - Mock Viva for Msc Studies /slideshow/c-overflows-vulnerabilities-exploit-taxonomy-and-evaluation-on-static-analysis-tools-mock-viva-for-msc-studies/35470031 mockviva-140604042144-phpapp01
This is a presentation slide presented during mock viva as a requirement from IPSIS, UiTM for Post-graduate student before submitting complete thesis for viva]]>

This is a presentation slide presented during mock viva as a requirement from IPSIS, UiTM for Post-graduate student before submitting complete thesis for viva]]>
Wed, 04 Jun 2014 04:21:44 GMT /slideshow/c-overflows-vulnerabilities-exploit-taxonomy-and-evaluation-on-static-analysis-tools-mock-viva-for-msc-studies/35470031 masteramuk@slideshare.net(masteramuk) C Overflows Vulnerabilities Exploit Taxonomy And Evaluation on Static Analysis Tools - Mock Viva for Msc Studies masteramuk This is a presentation slide presented during mock viva as a requirement from IPSIS, UiTM for Post-graduate student before submitting complete thesis for viva <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mockviva-140604042144-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is a presentation slide presented during mock viva as a requirement from IPSIS, UiTM for Post-graduate student before submitting complete thesis for viva
C Overflows Vulnerabilities Exploit Taxonomy And Evaluation on Static Analysis Tools - Mock Viva for Msc Studies from Nurul Haszeli Ahmad
]]>
1151 6 https://cdn.slidesharecdn.com/ss_thumbnails/mockviva-140604042144-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE /slideshow/vulnerabilities-and-exploitation-in-computer-system-past-present-and-future/25866841 siskom2013-130903210714-
Software vulnerabilities are regard as the most critical vulnerabilities due to its impact and availability as compared to hardware and network vulnerabilities. Throughout the years from the first appearance of software vulnerabilities in late 80s until today, there are many identified and classified software vulnerabilities such as the well-known buffer overflow, scripting and SQL command. We studied on those known software vulnerabilities, compared the criticality, impact and significant of the vulnerabilities, and further predicted the trend of the vulnerabilities and proposed the focus area based on the comparative studies. The result shows that C overflow vulnerabilities will continue to persist despite losing its dominance in terms of numbers of availability and exploitation. However, the impact of exploiting the C overflow vulnerabilities is still regard as the most critical as compare to others. Therefore, C overflow vulnerabilities will prevail again and continues its domination as it did for the past two decades.]]>

Software vulnerabilities are regard as the most critical vulnerabilities due to its impact and availability as compared to hardware and network vulnerabilities. Throughout the years from the first appearance of software vulnerabilities in late 80s until today, there are many identified and classified software vulnerabilities such as the well-known buffer overflow, scripting and SQL command. We studied on those known software vulnerabilities, compared the criticality, impact and significant of the vulnerabilities, and further predicted the trend of the vulnerabilities and proposed the focus area based on the comparative studies. The result shows that C overflow vulnerabilities will continue to persist despite losing its dominance in terms of numbers of availability and exploitation. However, the impact of exploiting the C overflow vulnerabilities is still regard as the most critical as compare to others. Therefore, C overflow vulnerabilities will prevail again and continues its domination as it did for the past two decades.]]>
Tue, 03 Sep 2013 21:07:14 GMT /slideshow/vulnerabilities-and-exploitation-in-computer-system-past-present-and-future/25866841 masteramuk@slideshare.net(masteramuk) VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE masteramuk Software vulnerabilities are regard as the most critical vulnerabilities due to its impact and availability as compared to hardware and network vulnerabilities. Throughout the years from the first appearance of software vulnerabilities in late 80s until today, there are many identified and classified software vulnerabilities such as the well-known buffer overflow, scripting and SQL command. We studied on those known software vulnerabilities, compared the criticality, impact and significant of the vulnerabilities, and further predicted the trend of the vulnerabilities and proposed the focus area based on the comparative studies. The result shows that C overflow vulnerabilities will continue to persist despite losing its dominance in terms of numbers of availability and exploitation. However, the impact of exploiting the C overflow vulnerabilities is still regard as the most critical as compare to others. Therefore, C overflow vulnerabilities will prevail again and continues its domination as it did for the past two decades. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/siskom2013-130903210714--thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Software vulnerabilities are regard as the most critical vulnerabilities due to its impact and availability as compared to hardware and network vulnerabilities. Throughout the years from the first appearance of software vulnerabilities in late 80s until today, there are many identified and classified software vulnerabilities such as the well-known buffer overflow, scripting and SQL command. We studied on those known software vulnerabilities, compared the criticality, impact and significant of the vulnerabilities, and further predicted the trend of the vulnerabilities and proposed the focus area based on the comparative studies. The result shows that C overflow vulnerabilities will continue to persist despite losing its dominance in terms of numbers of availability and exploitation. However, the impact of exploiting the C overflow vulnerabilities is still regard as the most critical as compare to others. Therefore, C overflow vulnerabilities will prevail again and continues its domination as it did for the past two decades.
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE from Nurul Haszeli Ahmad
]]>
7669 10 https://cdn.slidesharecdn.com/ss_thumbnails/siskom2013-130903210714--thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Introduction to UML /slideshow/introduction-to-uml-17275640/17275640 matrixintrotoumlandea-vdraft-20120705-130317034315-phpapp01
This is an introduction to UML (Unified Modeling Language) given to people whom has no background on business modeling using UML. This is based on UML version 2.]]>

This is an introduction to UML (Unified Modeling Language) given to people whom has no background on business modeling using UML. This is based on UML version 2.]]>
Sun, 17 Mar 2013 03:43:15 GMT /slideshow/introduction-to-uml-17275640/17275640 masteramuk@slideshare.net(masteramuk) Introduction to UML masteramuk This is an introduction to UML (Unified Modeling Language) given to people whom has no background on business modeling using UML. This is based on UML version 2. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/matrixintrotoumlandea-vdraft-20120705-130317034315-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is an introduction to UML (Unified Modeling Language) given to people whom has no background on business modeling using UML. This is based on UML version 2.
Introduction to UML from Nurul Haszeli Ahmad
]]>
1955 7 https://cdn.slidesharecdn.com/ss_thumbnails/matrixintrotoumlandea-vdraft-20120705-130317034315-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Introduction To TRIZ /slideshow/introduction-to-triz/17183136 matrixintrototriz-130313203518-phpapp02
This slide is to give viewer a brief introduction on TRIZ]]>

This slide is to give viewer a brief introduction on TRIZ]]>
Wed, 13 Mar 2013 20:35:18 GMT /slideshow/introduction-to-triz/17183136 masteramuk@slideshare.net(masteramuk) Introduction To TRIZ masteramuk This slide is to give viewer a brief introduction on TRIZ <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/matrixintrototriz-130313203518-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This slide is to give viewer a brief introduction on TRIZ
Introduction To TRIZ from Nurul Haszeli Ahmad
]]>
12228 22 https://cdn.slidesharecdn.com/ss_thumbnails/matrixintrototriz-130313203518-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Understanding Vulnerability by Refining Taxonomy /slideshow/ias-presentdraft2-lighter/16907891 iaspresent-draft2lighter-130303210716-phpapp02
In this presentation slide, we share our reviews and critics on various vulnerability taxonomy. We also proposed on criteria for a taxonomy to be graded as well-defined taxonomy. On top of that, we share our taxonomy that specifically constructed to understand various vulnerability in C programming language]]>

In this presentation slide, we share our reviews and critics on various vulnerability taxonomy. We also proposed on criteria for a taxonomy to be graded as well-defined taxonomy. On top of that, we share our taxonomy that specifically constructed to understand various vulnerability in C programming language]]>
Sun, 03 Mar 2013 21:07:16 GMT /slideshow/ias-presentdraft2-lighter/16907891 masteramuk@slideshare.net(masteramuk) Understanding Vulnerability by Refining Taxonomy masteramuk In this presentation slide, we share our reviews and critics on various vulnerability taxonomy. We also proposed on criteria for a taxonomy to be graded as well-defined taxonomy. On top of that, we share our taxonomy that specifically constructed to understand various vulnerability in C programming language <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iaspresent-draft2lighter-130303210716-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this presentation slide, we share our reviews and critics on various vulnerability taxonomy. We also proposed on criteria for a taxonomy to be graded as well-defined taxonomy. On top of that, we share our taxonomy that specifically constructed to understand various vulnerability in C programming language
Understanding Vulnerability by Refining Taxonomy from Nurul Haszeli Ahmad
]]>
553 4 https://cdn.slidesharecdn.com/ss_thumbnails/iaspresent-draft2lighter-130303210716-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Amazing quran by Dr Milller /slideshow/amazing-quran-by-dr-milller/16396341 amazingquranbydrmiller-130207030703-phpapp02
]]>

]]>
Thu, 07 Feb 2013 03:07:03 GMT /slideshow/amazing-quran-by-dr-milller/16396341 masteramuk@slideshare.net(masteramuk) Amazing quran by Dr Milller masteramuk <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/amazingquranbydrmiller-130207030703-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Amazing quran by Dr Milller from Nurul Haszeli Ahmad
]]>
376 4 https://cdn.slidesharecdn.com/ss_thumbnails/amazingquranbydrmiller-130207030703-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
2013 Security Report by Sophos /slideshow/2013-security-report-by-sophos/16396322 sophossecuritythreatreport2013-130207030525-phpapp01
]]>

]]>
Thu, 07 Feb 2013 03:05:25 GMT /slideshow/2013-security-report-by-sophos/16396322 masteramuk@slideshare.net(masteramuk) 2013 Security Report by Sophos masteramuk <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sophossecuritythreatreport2013-130207030525-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
2013 Security Report by Sophos from Nurul Haszeli Ahmad
]]>
2109 9 https://cdn.slidesharecdn.com/ss_thumbnails/sophossecuritythreatreport2013-130207030525-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-masteramuk-48x48.jpg?cb=1619141238 A local IT company focusing on: 1. Provide technical consultancies in IT especially on system development and optimization 2. Design, develop, integrate, deploy and support system development 3. Provide penetration test and consultancies 4. Perform R&D 5. Others IT related http://malaysiandeveloper.blogspot.com https://cdn.slidesharecdn.com/ss_thumbnails/ontologymodelforc-overflowvulnerabilitiesattackijatcse-200403030848-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/ontology-model-for-c-overflow-vulnerabilities-attack/231329195 Ontology model for c o... https://cdn.slidesharecdn.com/ss_thumbnails/agileprojectmanagement-basic101-151208041547-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/agile-project-management-introduction-to-agile-the-basic-101/55918178 Agile Project Manageme... https://cdn.slidesharecdn.com/ss_thumbnails/gictknowledgesharing-windowsservices101vpublic-150601082553-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/windows-services-101/48830438 Windows Services 101