top of page
Laila Alahaideb
Dec 17, 20243 min read
Sharing is caring, but not when it comes to cookies!
Sharing cookies can lead to several potential risks and privacy issues thus you should be mindful of how you handle cookies and share...
Laila Alahaideb
Aug 27, 20242 min read
Stuxnet Computer Worm
The fascinating story of Stuxnet, a super sneaky computer worm discovered in 2010 but thought to have been in development since 2005....
Laila Alahaideb
Aug 19, 20244 min read
Fall into my trap by landing on a fake website
Imagine a scenario where a malicious entity launches a Man-In-The-Middle (MITM) Attack with a Compromised Certificate Authority (CA)....
Laila Alahaideb
Aug 19, 20241 min read
The Lifeblood of the Modern World
Data is the lifeblood of the modern world. In an age where information is power, harnessing and analyzinge data is crucial for success....
Laila Alahaideb
May 14, 20246 min read
BGP Hijacking
BGP is the Border Gateway Protocol. It is the protocol used to carry the best paths for sending data across autonomous systems (ASes). An...
Laila Alahaideb
May 6, 20243 min read
Marshmallow
Android, the open-source operating system for mobile devices, is famous for its robust app ecosystem and user-friendly design. Its...
Laila Alahaideb
Jan 26, 20242 min read
DES algorithm strengths and weaknesses
During the 1970s and 1980s, electronic data encryption often utilized the symmetric key algorithm called the Data Encryption Standard...
Laila Alahaideb
Jan 7, 20242 min read
Information Security Policy
Information Security, also known as InfoSec, refers to the policies, processes, and tools designed and deployed to protect sensitive...
Laila Alahaideb
Nov 3, 20222 min read
Cognitive Computing
Cognitive Computing is a branch of computer science widely related to the Artificial Intelligence (AI) concept and refers to a range of...
Laila Alahaideb
Oct 27, 20222 min read
The fifth generation
In the human lifecycle, the firstborn babies came into the world with no skills, then they start monitoring the environment around them,...
Laila Alahaideb
Oct 5, 20222 min read
The most interesting Technology
Quantum computer When I say quantum what’s the first thing that comes to your mind? Your answer will show your major or your era of...
Laila Alahaideb
Sep 27, 20222 min read
Cloud Computing
Cloud computing is a computer system delivered via the Internet without direct active supervision by the user, in particular, data...
Laila Alahaideb
Sep 7, 20223 min read
Across 4 generations
From vacuum tups to quantum Over the centuries, all computers have interacted with bits either 0 or 1, which share one thing in common,...
Laila Alahaideb
Dec 9, 20211 min read
CS432 - Network Security Course Project
Imagine that I was hired by XSecure, a great cyber security company, to design a secure file-sharing application. The company wants the...
Laila Alahaideb
Dec 9, 20214 min read
BERT in the Arabic Language
BERT is a pre-trained contextual language model that is available for several languages. It has achieved high performance in many NLP...
Laila Alahaideb
Apr 22, 20211 min read
CS445-Compilers Cours Project Program
In java programming language I build a program that acts like a compiler to : 1. Check whether the given input string belongs to the...
Laila Alahaideb
Mar 2, 20211 min read
Regular Expression in compiler
Regular Expression concept! Regular expressions are used to characterize tokens (lexical constructs). A token characterizes a pattern of...
Laila Alahaideb
Mar 1, 20211 min read
CS445-Compilers Cours(Exercises!)
Here I will attach some Lectures Exercise: 1-Lexical Analyzer CHAPTER 03 (PART 02) Exercise: Describe the language expressed by: a *...
Laila Alahaideb
Feb 27, 20211 min read
CS445-Compilers Cours(Homework 1)
Homework 1 I. Write Regular Expression for the following languages for Σ = {a,b}: ... II. Convert the following regular expressions into:...
Laila Alahaideb
Dec 3, 20201 min read
CS370-Introduction to Databases Corse Assignment
I have been asked to design a database for Healthway Hospital, it covers all aspects of designing a database and the SQL requests that...
bottom of page