Today's Question:  What does your personal desk look like?        GIVE A SHOUT

 CODE SECURITY


  HeartBleed: Inside the heart, what happens to a normal WEB user?

To be brief, our email, IM, facebook etc. are at the risk, so try to minimize the access in these few days. Especially we should try to avoid log into our internet-banking, because we may expose our user id and password. Also later when the service providers fix the bug, we would better to change a new password for all the web accounts that are important to us.Here comes the technical explanation.You might notice before that a lot of websites use URL starting with "https". For example, https://www.google.com.sg. HTTPS literally means secure HTTP, as the "s" stands for secure. Both HTTP and HTT...

4,523 0       ANALYSIS HEARTBLEED


  HeartBleed: OpenBSD now starts to clean up OpenSSL

Since the disclosure of HeartBleed bug in OpenSSL, some arguments emerge around the safety of OpenSSL, the largest open source SSL/TLS library used by large number of servers, applications. Some people are even starting to create their own version of SSL library. This includes OpenBSD, a famous Unix like open source operating system.Just a few days after the HeartBleed bug, OpenBSD forked a new branch of OpenSSL and started to clean up the forked branch and plans to merge it to its own code base. So far these changes done on the forked OpenSSL library include:Splitting up libcrypto and li...

4,469 0       HEARTBLEED OPENBSD


  Why should we drop or reduce use of MD5?

MD5 is a frequently used one-way hash algorithm, it is commonly used in following situations:Check data integrity. We take hash of the data stored in two different places and compare them. If the hash results are the same, then there is no need to check the actual data. This utilizes the collision-resistant feature. Two different data block will have little chance that their hash values will be the same. Many data service providers use such technique to check repeated data to avoild repeating uploading. Also, it is frequently used in transferring file to ensure the file is not modified during ...

3,611 0       ATTACK VULNERABILITY MD5


  The Curious Case of App Store Optimization

You may have heard of App Store Optimization (ASO) and feel your brains go into overdrive! Chances are you probably have no idea what that means or that it appears pretty much the same as Search Engine Optimization (SEO), only to realize that it is not so. Despite being warily relatable to SEO, the reality of ASO is far more deep and complex. A key differentiator of ASO and SEO is what happens when a visitor or user enters the website or the app, in this case. The moment a user enters the site the purpose of SEO is over, whereas the purpose of ASO begins when a user lands on an app page and th...

2,219 0       IOS APP DEVELOPMENT COMPANY IPHONE APP DEVELOPMENT COMPANY MOBILE APP COMPANY MOBILE APPLICATION