Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Account Policy



  How Can Your Data Be Stolen Online?

In 2019, according to Statista, nearly 165 million sensitive records were exposed in the US due to data breaches. Unfortunately, data theft is not going anywhere. Hackers are using increasingly sophisticated methods to steal information, but thankfully there are measures you can take to ensure your data stays safe. Here are some of the most common ways people get their data stolen online and how you can take precautions against the methods cybercriminals use. Human Error Hacking is one of the m...

   DATA SECURITY,PROTECTION KID     2021-01-27 19:46:05

  An experience on fixing HTTP 406 Not Acceptable error

This post is about an experience of mine on fixing a HTTP 406 Not Acceptable error seen on one of my page. Just got back from a business trip and opened my computer as usual to start to monitor my website statistics. But when I opened the page on showing real time page views, it shows nothing but zero. So I pressed F12 to bring up the developer tool to check on what's going on. The logic of loading the real time page view is backed by AJAX call. In the developer tool console, I see that the rAJA...

   PHP,AJAX,HTML,HTTP 406,CONTENT-TYPE     2019-03-30 04:09:10

  Apple unveils iPad Mini

Apple unveiled iPad family's new product -- iPad Mini, it means that Apple gets into 7 inch tablet PC market now formally. iPad mini, has a 1024*768 resolution 7.9-inch screen, It has the same resolution as iPad 2. As a low-end product of iPad family, iPad mini still retains the front and rear camera, a dual-core A5 processor, battery life time is 10 hours. Apple said that the iPad mini battery is the thinnest and biggest in iPad family. Previously the media said the smallest storage space of iP...

   iPad mini,Price     2012-10-23 15:10:41

  How Do You Find the Best Password Managers?

Looking for a smart way to protect your range of electronic devices? Most of us access tons of websites and it could be difficult to store our passwords. It is important to not reuse store passwords that are easily identifiable. Keeping your information secure is more important than ever. Data breaches can occur anytime and sometimes takes months to discover. Sometimes, maybe, they aren’t. Target is a data breach, for instance, took months to discover. Information was leaked online from ce...

       2017-05-11 06:33:55

  Introduction to OAuth (in Plain English)

Last week we talked about giving away your passwords and how you should never do it.  When a website wants to use the services of another—such as Bitly posting to your Twitter stream—instead of asking you to share your password, they should use OAuth instead. OAuth is an authentication protocol that allows you to approve one application interacting with another on your behalf without giving away your password. This is a quick guide to illustrate, as simply as possibl...

   Security,OAuth,Permission,Partial access     2012-04-05 11:39:54

  Investing in myself: Realizing my value as a programmer

Being a programmer, you have an invaluable skill that you need to learn to harness. Investors realize this already which is why they’ll spend stacks of cash to have you build them something that’ll someday be profitable. Large corporations realize the value in good developers and sometimes bend over backwards trying to retain their top talent. To be able to program well is a skill that people clearly value but why do programmers tend to place such little value on their own ta...

   Career,Inverstment,Self,Software,Developer     2012-01-11 04:36:16

  It makes nothing but sense...Mobile Payment...

Chinese New Year is around the corner, every place in China and lots of places in the work have been in the CNY mode. People are rushing out to get all the stuff ready to welcome the New Year Eveand the Spring Festival. I also packed my stuff and flew back to my howntown in China to enjoy the great moment to stay with families and hang out with friends whom I have't been seeing for almost one year. I am exited... However, the first thing stunned me is not my friends but the mobile payment s...

   CHINA,WECHAT PAY,ALIPAY,MOBILE PAYMENT     2018-02-12 00:07:46

  Is Singapore a good place for startups?

Singapore is long time being considered as a perfect place for living and investing given its beautiful environment, warmly climate,  well-polished legal system and well-known richness. Its government is relatively young and open-minded. They like to take new challenges and embrace new technologies. It's the first country to open its government data to the world online. Many of you may consider that Singapore would be a perfect place for you to start your next startup. But the tr...

   SINGAPORE,STARTUP     2016-03-09 09:06:32

  SSH Security and You - /bin/false is *not* security

Backstory While at RIT around 2004 or 2005, I discovered that a few important machines at the datacenter allowed all students, faculty, and staff to authenticate against them via ssh. Everyone's shells appear to be set to /bin/false (or some derivative) on said machines, so the only thing you'll see after you authenticate is the login banner and your connection will close. I thought to myself, "Fine, no shell for me. I wonder if port forwarding works?" ...

   Linux,Security,/bin/false,SSH     2012-02-06 07:46:29

  PHP to get access token for Twitter app

Previously we wrote an article about getting access token for Facebook app--PHP to get access token for Facebook app. Today we will introduce how to get access token for Twitter app using PHP. Since now Twitter is also using OAuth 2.0 to allow some web apps to access some users information on behalf of one user. They provided some APIs for developers to easily get them integrated with their own websites. The first step to get all these done is how to get the access token, the access token seems ...

   Twitter,OAuth,access token,PHP     2013-03-03 03:49:26