Raid Hussein

Raid Hussein

I am a PhD candidate at University of Southampton, working with security issues related to Cloud computing.

Location Southampton

Activity

  • Hi Jimmy Rafferty,
    That is cool. Good luck

  • Hi Martin Gonzalez,
    Thank you very much for you.

  • Hi Leozandrae De Leon,
    Thank you too very much.

  • Hi paul Frost,
    Thank you very much. Hope you will not have any problem.

  • Hi Martin Gonzalez,
    Thank you very much.

  • Hi Mike Gough,
    Thank you very much.I think you did not install the VM as I can understand and it is more secure.

  • HI
    Mike Gough,
    Thank you for your suggestions. We will consider it in the next run for the course.

  • Hi Adrian Salter ,
    Thank you too to join this course. Good Luck.

  • HI Hugh S,
    Happy to know that and Good luck.

  • Hi Mihaela McKendrick,
    Sure and all the best.

  • Hi Sarah Chacko,
    Thank you for you and for your suggestions. We will consider that in the nest run for the course.

  • HI,
    I do agree with you. The user should know what kind of permission should be granted to an app.

  • Hi Jan Ramsli,
    Good point. The operating system must be licenced otherwise the user is not safe.

  • HI Ajo,
    I do agree with you.

  • Raid Hussein made a comment

    Hi Grant Amey,
    Have a look at this terminology in this link:
    http://shapingsoftware.com/2008/03/30/threats-attacks-vulnerabilities-and-countermeasures/

  • Hi Myo Thi Ha,
    Welcome to the course. Good Luck.

  • Hi Fabio Augusto Bruns,
    Thank you very much for you and good luck.

  • Hi Fabio Augusto Bruns,
    Happy to know that. Good luck.

  • Hi Fiona,
    Thats brilliant. Keep going and good luck.

  • Hi John LIM,
    would you show us what problems you have so we can help.

  • Hi John LIM,
    Thats absolutely right.

  • Hi Mila Moreira,
    I strongly agree with you.

  • Hi Patrick Fleming,
    Please describe to us what difficulties you have so we are happy to help.

  • Hi
    Elly Elly,
    Welcome to the course. Best of luck with the course modules.

  • Hi Mihaela McKendrick,
    It depends on you are going to use it or deleted after sometime.

  • Hi Firas MA,
    thank you very much for your interesting in the course. Good luck with week four.

  • HI Mihaela McKendrick,
    Select typical.

  • Hi Olivera Tešić,
    yes it is a good starting point for you. Good luck.

  • Hi Arthur Schultz,
    Happy to know that.Best of luck with week four modules.

  • Hi PHILIP WINDERS,
    Best of luck with week four modules.

  • Hi Alan Hart,
    Thanks to let us know that the video is not clear. We will do the best to post better quality.

  • Hi EDWIN ASARE,
    All the best with week four modules.

  • Hi Garth Sampson,
    Thank you for your interesting in the course. Good luck with week four modules.

  • Hi Andrew Hodgson,
    ya I do agree that cloud computing has some security issues however, still there are techniques to secure your data in the cloud.

  • Hi
    Leozandrae De Leon,
    Thank you very much. Good luck with week four modules.

  • Hi Garth Sampson,
    Good luck.

  • Hi minahil majeed,
    Thank you very much. Good luck with week four modules.

  • HI minahil majeed,
    ya thats right. But users of these devices need to have knowledge about security Otherwise they will be hacked easily.

  • Hi minahil majeed,
    I do agree with you.

  • HI Alan,
    I think If your phone include any bank details so for safety redone its not right to give this access as it might be risky.

  • hi,
    If your computer is Apple product then check:
    https://www.youtube.com/watch?v=ThDtEr8IA3U
    If your computer is Windows OS then check :
    https://www.youtube.com/watch?v=QRf_eLv2Cqc
    If your computer is Ubuntu then check:
    https://www.youtube.com/watch?v=xTWFl99Gz1g

  • Hi Mihaela McKendrick,
    Still there is time to follow the course. good luck.

  • Hi Iván Martínez Herce
    You are welcome. Best of luck with week four.

  • Hi Mihaela McKendrick,
    you are welcome. Best of luck with week four.

  • hi Brian Price,
    Kindly, would show us which part of the code does not match the text?

  • Hi Olumide S. Olatigbe,
    Thank you very much. we need all the participants to get the best benefit from the course. best of luck.

  • Your are welcome. Thank you to join the course.

  • Hi Ian Jenkinson,
    Best of luck with week four modules.

  • DearJohn,
    Your welcome. Best of luck with week four modules.

  • Hi Abdulla Mohamud,
    you 're welcome.

  • Hi Ajo Abraham,
    You are welcome. Best of luck with the course modules.

  • Hi Mihaela McKendrick,
    Thank you to share this information.

  • Hi Leozandrae De Leon,
    Its important to understand what is going in this area as being a tech. user Otherwise, you will be a victims.

  • Hi Kurt,
    For sure its a good . Good luck with week 4.

  • Hi Aref,
    you are most welcome

  • Yes. Absolutely right.

  • Hi Ajo,
    I do agree with you

  • Hi Martin,
    Great. all the best.

  • Hi Ahmed,
    you need to check what sort of permission the apps ask about. If it is relevant to the apps you should decide to agree or if its not you need to reject.

  • My pleasure.

  • Hi Jan,
    I totally agree with you. That is why we should have different level of security. There are information more secure than the other information.

  • Hi Peter,
    It will be fine.Just carry on and all the best.

  • Hi
    Olumide S. Olatigbe,
    There is no secure system 100% so we need to work out to secure our apps. Every day there will be a new threats affecting our apps.

  • Hi Jack Benhaim,
    I think it is important to understand how to secure yourself as part of security on the user.

  • Olumide S. Olatigbe,
    Thank you very much for your interest in the course. what you suggest is a good idea. However, you will not learn without installing and run .

  • HI Ahmed,
    That's right. It is important to check what sort of information it is going to access and according to that we should decide to accept or reject the permission.

  • Hi Andrew Salter,
    Thank you to share this information.

  • Hi Dieter Adjei,
    Thank you very much.All the best.

  • Dear wilson Abiaodung,
    The virtual machine software we provide is for 64 bit system. However you need to look for virtual machine with 32 bit . Mostly you will need tp pay for it.

  • Hi HMark Tulley,
    Thank you so much for your suggestion. We will consider it in the next run for the course.

  • Hi Sushant Mohan,
    You are welcome in the course. Best of luck with week three modules.

  • Hi Shivani Gamit,
    Kindly, would you show us which terminology you don't understand?

  • Hi Jean-Luc Giboire,
    Please ask any question you need.

  • Hi Mashael Abdulrahman,
    have a look at this link:
    https://communities.vmware.com/docs/DOC-8978

  • Hi Dauda Conteh,
    Welcome to the course. Best of luck with the course modules.

  • Hi Waseem Iqbal Khan,
    Welcome to the course. Best of luck with the course modules.

  • Hi Dudley Worcester,
    you will sure can work out for installation. keep going and we will help.

  • Hi Emmanuel Rwiza,
    welcome to the course. keep going and Best of luck.

  • Hi Mallika Raj,
    I am sorry to know that however, installing the apps needs a little of patient. what I can understand you can not download android inside the VM? would you give us more details.

  • Hi siddharth g,
    I do agree with you. But still the apps ask the user for accessing a certain data like pics so the user should know how to secure themselves.

  • Hi Sarah Chacko,
    I do agree with you. There should be always separation according to the level of security required.

  • Hi Sushant Mohan,
    Thank you for your suggestions. However, we will take it into consideration in the next run of the course.

  • Hi Sarah Chacko,
    Limit the privilege is simply only authorized people should allowed to access resources. This will enforce a level of security.

  • Hi wilson Abiaodung,
    would you give us more details so we can help. Is your system 32 bit?

  • Hi Fabio Mello,
    Thank you very much to share this information.

  • Hi Jeda Ogaga,
    As any system can not avoid the risk 100%, still there will be a type of risk even if it would happen, it will not harm a lot so we will consider it as acceptable risk.

  • Hi John LIM,
    Welcome to the course. Best of luck with the course modules.

  • Dear Sharon Lengert,
    whatever the provider support, still there is a responsibility lay on the user.

  • Hi Gabriel Spotorno,
    thanks to share this information.

  • Hi ohn LIM,
    Security is not easy to implement. However the most important thing is to know how to secure ourselves while using the apps. Even though the system is secure, If you don't know how to use it, you might lost your data.

  • Hi Dauda Conteh,
    Thats right. But more important is to secure our data and credentials.

  • that is great Diego Martínez. It is important for ever apps user know to protect themselves.

  • Dear Sarah Chacko,
    Install software is not an easy task. However, you would sure overcome these obstacle .Kindly, give us some more details so we could help.

  • Dear Alisher Botirov,
    It is important to learn how to secure the apps that we use. Welcome to the course. This course will help you how to secure the mobile Android apps. best of luck with the course modules.

  • Dear GIBOIRE jean-luc,
    We recommend to download it from Windows Evaluation website. We have tested this one works properly.