Digital watermarking is a security technique that provides copy protection, authentication, and more for audio and other forms of information. The approach Michael presents here is based on a statistical algorithm working in the Fourier domain.
Over the past 25 years, most security protocols have focused on securing network connections, ignoring relatively simple file-encryption problems. Don presents guidelines for avoiding a common security pitfall when combining encryption with digital signatures.
SMTP banners that contain version information can result in security vulnerabilities. Our authors show how to close this hole.
Daniel reports on Dmitry Sklyarov's analysis of PC-based digital rights management security techniques.
System outage isn't just a hardware problem. The design and implementation of software must be robust and hardy enough to survive failures of all kinds.
A photomosaic is a digital image made up of other digital images, pieced together by software.
Kylix brings Borland's Delphi toolset and environment from Windows to Linux. And one of the most challenging aspects of the port involved exception handling.
The PacketCable Security Specification provides rigorous security standards for cable-based telephony networks.
The Instrument Markup Language is an XML dialect designed to aid in the exchange of data and commands with remote instruments.
The rapidly increasing number of e-mail relay packages means interoperability challenges for programmers who need compatibility with existing e-mail software.
Biometrics offers a strong authentication alternative to traditional passwords and tokens, and can do so without imposing the burden and cost of application source-code modification.
Just because Michael sees conspiracies everywhere, doesn't mean he's fantasizing. Or does it?
If he didn't know before, you can bet Al knows now that Schroeder is the piano player and Linus is the blanket-holder. Al goes on to examine programming issues related to a specific DSP audio problem.
It's no surprise that microcontrollers and other embedded devices are used in life-support systems. But can you really, really trust them?
Java provides two types of exceptions: checked and unchecked.
The algorithm Jiri presents here performs undo/redo for a general network of interconnected objects.
Ecco and Liane discover that urban planning in Texas isn't an oxymoron after all.
Jack examines a pair of books that focus on embedded systems: Embedded Controller Hardware Design, by Ken Arnold; and Programming Microcontrollers in C, Second Edition, by
Ted van Sickle.