Use case studies to demonstrate the good practices and bad practices listed in task 1. You can take example of desktop software, mobile apps, or websites or any other interface. Critically analyze the good and practices in context of software or user interfaces selected by you. October 18, 2016 Read More »
List down the 5 good practices for user interface design and 5 bad practices for user interface design October 18, 2016 Read More »
use GPG to perform some common operations to communicate securely with the course coordinator. October 5, 2016 Read More »
There are many different software (and hardware) implementations of cryptographic operations. GNU Privacy Guard (GPG) is one such piece of software, which focusses on a simple, open source implementation of common public key operations October 5, 2016 Read More »