Raid Hussein
I am a PhD candidate at University of Southampton, working with security issues related to Cloud computing.
Location Southampton
Activity
-
Raid Hussein replied to Jimmy Rafferty
Hi Jimmy Rafferty,
That is cool. Good luck -
Raid Hussein replied to Martin Gonzalez
Hi Martin Gonzalez,
Thank you very much for you. -
Raid Hussein replied to Leozandrae De Leon
Hi Leozandrae De Leon,
Thank you too very much. -
Raid Hussein replied to paul Frost
Hi paul Frost,
Thank you very much. Hope you will not have any problem. -
Raid Hussein replied to Martin Gonzalez
Hi Martin Gonzalez,
Thank you very much. -
Raid Hussein replied to Detlef Kittler
Hi Mike Gough,
Thank you very much.I think you did not install the VM as I can understand and it is more secure. -
Raid Hussein replied to Mike Gough
HI
Mike Gough,
Thank you for your suggestions. We will consider it in the next run for the course. -
Raid Hussein replied to Adrian Salter
Hi Adrian Salter ,
Thank you too to join this course. Good Luck. -
Raid Hussein replied to Hugh S
HI Hugh S,
Happy to know that and Good luck. -
Raid Hussein replied to Shivani Gamit
Hi Mihaela McKendrick,
Sure and all the best. -
Raid Hussein replied to Sarah Chacko
Hi Sarah Chacko,
Thank you for you and for your suggestions. We will consider that in the nest run for the course. -
HI,
I do agree with you. The user should know what kind of permission should be granted to an app. -
Hi Jan Ramsli,
Good point. The operating system must be licenced otherwise the user is not safe. -
Raid Hussein replied to Ajo Abraham
HI Ajo,
I do agree with you. -
Raid Hussein made a comment
Hi Grant Amey,
Have a look at this terminology in this link:
http://shapingsoftware.com/2008/03/30/threats-attacks-vulnerabilities-and-countermeasures/ -
Raid Hussein replied to Myo Thi Ha
Hi Myo Thi Ha,
Welcome to the course. Good Luck. -
Raid Hussein replied to Fabio Augusto Bruns
Hi Fabio Augusto Bruns,
Thank you very much for you and good luck. -
Hi Fabio Augusto Bruns,
Happy to know that. Good luck. -
Raid Hussein replied to Fiona Mac
Hi Fiona,
Thats brilliant. Keep going and good luck. -
Raid Hussein replied to John LIM
Hi John LIM,
would you show us what problems you have so we can help. -
Raid Hussein replied to John LIM
Hi John LIM,
Thats absolutely right. -
Hi Mila Moreira,
I strongly agree with you. -
Hi Patrick Fleming,
Please describe to us what difficulties you have so we are happy to help. -
Raid Hussein replied to Elly Elly
Hi
Elly Elly,
Welcome to the course. Best of luck with the course modules. -
Hi Mihaela McKendrick,
It depends on you are going to use it or deleted after sometime. -
Raid Hussein replied to Firas MA
Hi Firas MA,
thank you very much for your interesting in the course. Good luck with week four. -
HI Mihaela McKendrick,
Select typical. -
Raid Hussein made a comment
Hi Rene van der Stel.
Have a look at this link:
https://www.threatanalysis.com/2010/05/03/threat-vulnerability-risk-commonly-mixed-up-terms/ -
Hi Olivera Tešić,
yes it is a good starting point for you. Good luck. -
Raid Hussein replied to Arthur Schultz
Hi Arthur Schultz,
Happy to know that.Best of luck with week four modules. -
Raid Hussein replied to PHILIP WINDERS
Hi PHILIP WINDERS,
Best of luck with week four modules. -
Raid Hussein replied to Alan Hart
Hi Alan Hart,
Thanks to let us know that the video is not clear. We will do the best to post better quality. -
Raid Hussein replied to EDWIN ASARE
Hi EDWIN ASARE,
All the best with week four modules. -
Raid Hussein replied to Garth Sampson
Hi Garth Sampson,
Thank you for your interesting in the course. Good luck with week four modules. -
Hi Andrew Hodgson,
ya I do agree that cloud computing has some security issues however, still there are techniques to secure your data in the cloud. -
Hi
Leozandrae De Leon,
Thank you very much. Good luck with week four modules. -
Hi Garth Sampson,
Good luck. -
Raid Hussein replied to minahil majeed
Hi minahil majeed,
Thank you very much. Good luck with week four modules. -
HI minahil majeed,
ya thats right. But users of these devices need to have knowledge about security Otherwise they will be hacked easily. -
Hi minahil majeed,
I do agree with you. -
HI Alan,
I think If your phone include any bank details so for safety redone its not right to give this access as it might be risky. -
hi,
If your computer is Apple product then check:
https://www.youtube.com/watch?v=ThDtEr8IA3U
If your computer is Windows OS then check :
https://www.youtube.com/watch?v=QRf_eLv2Cqc
If your computer is Ubuntu then check:
https://www.youtube.com/watch?v=xTWFl99Gz1g -
Raid Hussein replied to Shivani Gamit
Hi Mihaela McKendrick,
Still there is time to follow the course. good luck. -
Raid Hussein replied to Iván Martínez Herce
Hi Iván Martínez Herce
You are welcome. Best of luck with week four. -
Raid Hussein replied to Thiago Ribeiro
Hi Mihaela McKendrick,
you are welcome. Best of luck with week four. -
hi Brian Price,
Kindly, would show us which part of the code does not match the text? -
Raid Hussein replied to Olumide S. Olatigbe
Hi Olumide S. Olatigbe,
Thank you very much. we need all the participants to get the best benefit from the course. best of luck. -
Raid Hussein replied to Ian Jenkinson
Your are welcome. Thank you to join the course.
-
Raid Hussein replied to Ian Jenkinson
Hi Ian Jenkinson,
Best of luck with week four modules. -
Raid Hussein replied to John Powdrell
DearJohn,
Your welcome. Best of luck with week four modules. -
Raid Hussein replied to Abdulla Mohamud
Hi Abdulla Mohamud,
you 're welcome. -
Raid Hussein replied to Ajo Abraham
Hi Ajo Abraham,
You are welcome. Best of luck with the course modules. -
Hi Mihaela McKendrick,
Thank you to share this information. -
Hi Leozandrae De Leon,
Its important to understand what is going in this area as being a tech. user Otherwise, you will be a victims. -
Raid Hussein replied to Kurt Appolis
Hi Kurt,
For sure its a good . Good luck with week 4. -
Raid Hussein replied to Aref Aldughaim
Hi Aref,
you are most welcome -
Yes. Absolutely right.
-
Hi Ajo,
I do agree with you -
Hi Martin,
Great. all the best. -
Hi Ahmed,
you need to check what sort of permission the apps ask about. If it is relevant to the apps you should decide to agree or if its not you need to reject. -
My pleasure.
-
Hi Jan,
I totally agree with you. That is why we should have different level of security. There are information more secure than the other information. -
Hi Luis,
check it now:
https://www.futurelearn.com/courses/secure-android-app-development/1/steps/161076 -
Raid Hussein replied to Peter (bob) C
Hi Peter,
It will be fine.Just carry on and all the best. -
Raid Hussein replied to Olumide S. Olatigbe
Hi
Olumide S. Olatigbe,
There is no secure system 100% so we need to work out to secure our apps. Every day there will be a new threats affecting our apps. -
Hi Jack Benhaim,
I think it is important to understand how to secure yourself as part of security on the user. -
Raid Hussein replied to Olumide S. Olatigbe
Olumide S. Olatigbe,
Thank you very much for your interest in the course. what you suggest is a good idea. However, you will not learn without installing and run . -
HI Ahmed,
That's right. It is important to check what sort of information it is going to access and according to that we should decide to accept or reject the permission. -
Raid Hussein replied to Ant Harrison
Hi Andrew Salter,
Thank you to share this information. -
Raid Hussein replied to Dieter Adjei
Hi Dieter Adjei,
Thank you very much.All the best. -
Raid Hussein made a comment
Dear wilson Abiaodung,
The virtual machine software we provide is for 64 bit system. However you need to look for virtual machine with 32 bit . Mostly you will need tp pay for it. -
Raid Hussein replied to Robbie Robinson
Hi Robby K N,
look at this link :
https://www.cs.cmu.edu/~aldrich/courses/654-sp07/tools/dsouza-fortify-07.pdf -
Raid Hussein replied to Emmanuel Rwiza
Hey Robby,
have a look at this link:
http://www.ed.ac.uk/information-services/library-museum-gallery/finding-resources/library-databases/databases-overview/evaluating-websites -
Raid Hussein replied to Mark Tulley
Hi HMark Tulley,
Thank you so much for your suggestion. We will consider it in the next run for the course. -
Raid Hussein replied to Sushant Mohan
Hi Sushant Mohan,
You are welcome in the course. Best of luck with week three modules. -
Raid Hussein replied to Shivani Gamit
Hi Shivani Gamit,
Kindly, would you show us which terminology you don't understand? -
Raid Hussein replied to Jean-Luc Giboire
Hi Jean-Luc Giboire,
Please ask any question you need. -
Hi Mashael Abdulrahman,
have a look at this link:
https://communities.vmware.com/docs/DOC-8978 -
Raid Hussein replied to Dauda Conteh
Hi Dauda Conteh,
Welcome to the course. Best of luck with the course modules. -
Hi Waseem Iqbal Khan,
Welcome to the course. Best of luck with the course modules. -
Hi Dudley Worcester,
you will sure can work out for installation. keep going and we will help. -
Raid Hussein replied to Emmanuel Rwiza
Hi Emmanuel Rwiza,
welcome to the course. keep going and Best of luck. -
Raid Hussein replied to Mallika Raj
Hi Mallika Raj,
I am sorry to know that however, installing the apps needs a little of patient. what I can understand you can not download android inside the VM? would you give us more details. -
Hi siddharth g,
I do agree with you. But still the apps ask the user for accessing a certain data like pics so the user should know how to secure themselves. -
Hi Sarah Chacko,
I do agree with you. There should be always separation according to the level of security required. -
Raid Hussein replied to Andrew Salter
Hi Sushant Mohan,
Thank you for your suggestions. However, we will take it into consideration in the next run of the course. -
Raid Hussein replied to Sarah Chacko
Hi Sarah Chacko,
Limit the privilege is simply only authorized people should allowed to access resources. This will enforce a level of security. -
Hi wilson Abiaodung,
would you give us more details so we can help. Is your system 32 bit? -
Raid Hussein replied to Fabio Mello
Hi Fabio Mello,
Thank you very much to share this information. -
Raid Hussein replied to Enock Chesire
Hi enock,
Have a look at this link:
https://www.enisa.europa.eu/publications/info-notes/the-dangers-of-trusting-user-input -
Hi Jeda Ogaga,
As any system can not avoid the risk 100%, still there will be a type of risk even if it would happen, it will not harm a lot so we will consider it as acceptable risk. -
Raid Hussein replied to John LIM
Hi John LIM,
Welcome to the course. Best of luck with the course modules. -
Dear Sharon Lengert,
whatever the provider support, still there is a responsibility lay on the user. -
Hi Gabriel Spotorno,
thanks to share this information. -
Raid Hussein replied to John LIM
Hi ohn LIM,
Security is not easy to implement. However the most important thing is to know how to secure ourselves while using the apps. Even though the system is secure, If you don't know how to use it, you might lost your data. -
Raid Hussein replied to Dauda Conteh
Hi Dauda Conteh,
Thats right. But more important is to secure our data and credentials. -
that is great Diego Martínez. It is important for ever apps user know to protect themselves.
-
Dear Sarah Chacko,
Install software is not an easy task. However, you would sure overcome these obstacle .Kindly, give us some more details so we could help. -
Dear Alisher Botirov,
It is important to learn how to secure the apps that we use. Welcome to the course. This course will help you how to secure the mobile Android apps. best of luck with the course modules. -
Dear GIBOIRE jean-luc,
We recommend to download it from Windows Evaluation website. We have tested this one works properly.