SEARCH KEYWORD -- INTERNET SECURITY
Boeing is developing Android phone?
Boeing is also involved in to the mobile Internet? It is said to be true. Recently, the Journal of the American national defense disclosure, Boeing is developing a super-safe Android phone.The magazine said Boeing President Roger Krone said this is Boeing's first foray into research and development of communication devices using the cellular network. Security infrastructure sector vice president Brian Palma said the mobile phone code-named "the Boeing Phone" has entered the final stage , is exp...
Boeing,Android,Safety mobile phone 2012-04-15 01:45:14
How does CSDN dare to use plain text as password?
Recently, the China's largest Chinese IT community website named CSDN leaked its user's account information. Later today CSDN made an announcements to its users on their website. The announcement said that some user account information was leaked and the passwords of the accounts were stored as plain text in their database before 2009, and after 2009, they adopted an encryption algorithm to encrypt user password. They urged all users who registered the account before 2009 to change their passwor...
Security,Information leak,CSDN,Plain text 2011-12-22 09:10:01
Evolution mail configuration with Hotmail on Ubuntu
Evolution mail now is the default Email client on Ubuntu. When we configure this mail client with Hotmail. The steps should be followed. Step 1: Open Evolution mail through Applications->Internet->Evolution mail Step 2: Goto Edit->Preferences Step 3 : Click Add button or double click on the added mail account. Step 4 : On the Identity tab, fill the Hotmail account you want to use. Step 5 : On "Receiving email" Tab, ...
Ubuntu,Evolution mail,Hotmail,Configurat 2011-04-28 09:24:01
Bad code plagues business applications, especially Java ones
A new study examining 365 million lines of code in 745 applications identifies bad coding practices that affect security, performance and uptime, with Java Enterprise Edition applications having the greatest number of problems. Cast Software, which makes tools that automate the analysis of business applications, examined programs written in Java-EE, .NET, ABAP, C, C++, Cobol, Oracle Forms, and Visual Basic, used across a wide range of industries from energy and financial services to IT co...
Difference between keystore and truststore
Security has become a vital concern in most of the online transactions nowadays. Lots of the world's most popular websites have adopted security protocols to transfer data, especially sensitive data. These security protocols including SSL/TLS which are using the private/public key exchange mechanism to establish secure connections. The private/public key cryptography is a really important invention and it allows data to be transferred securely and solves the big problem of transferrin...
KEYSTORE,TRUSTSTORE,SECURITY,SSL 2017-03-04 07:52:47
Top 10 Tell Tale Signs Your Computer Has a Virus
The true genius of the 'computer' is its ability to make human lives easier. This is only achieved from the ability of running software such as word processing, number crunching with Excel or learning from the worlds largest source of knowledge, via web browsers. Today being connected to the internet is fundamental to leading a productive modern life. While internet is a boon it comes with its own share of problems. As internet users increase so does the instance of com...
COMPUTER VIRUS, INTERNET SECURITY, DATA SECURITY, ANTIVIRUS, COMPUTER REPAIR 2017-03-19 21:05:12
25 worst passwords in 2012
Weak password is a serious security vulnerability, but the majority of network users still use some universal simple character sequences as the password. SplashData recently announced the world's worst password list in 2012. "password","123456" and "12345678" are still at top places, while others have varying, some new passwords like "welcome" "Jesus" "ninja","mustang"and "password1 "are in the list. With the risk of password loss, SplashData CEO Morgan Slain said we hoped netw...
Generate certificate in Java -- Self signed certificate
This is the first post in this series which I will show you how to generate SSL certificate in Java programmatically. Certificates are frequently used in SSL communication which requires the authentication of server to client. This is to make the client to trust that the server is actually the one it claims. Certificates are really important on the Internet. All HTTPS communications on the Internet need the server side to present their certificates signed by trusted CAs. The basic flow of a requ...
Java,Certificate,X509 2014-07-30 07:42:18
Different types of keystore in Java -- PKCS11
PKCS11 keystore is designed for hardware storage modules(HSM). It's an interface to talk to the HSMs. It doesn't actually store any keys but provide a set of classes to communicate with the underlying HSM. The actual keys and certificates are stored on the HSMs. The reason for storing the keys and materials is to ensure security and efficiency. Since the keys are on the HSMs, they are safe to be stolen. All encryption/decryption operations are performed on the HSMs as well, this incre...
30 minutes to fix Java vulnerability
On September 25, Adam Gowdiak from the Polish security consulting firm Security Explorations submitted a Java security vulnerability to Oracle and provided a proof-of-concept. The vulnerability exists in Java 5 6,7, once the user accesses hosted malware site, an attacker can remotely control the infected machine.Gowdiak later got in touch again with Oracle and got the response that the fix has reached the final stage. He can expect the patch in four months later. He eventually unbearable Oracle'...
Java, Vulnerability,Fix 2012-10-29 11:53:43
RECENT
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- The Power of Efficiency: 10 Practical Energy-Saving Tips for Tech Startups
- more>>