Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Android security



  Does My Online Business Need Log Aggregation?

Logs crop up all over the place. They are generated by everything from web servers and databases to the firewalls which protect them from breaches. Because logs accumulate in large volumes from all of these different sources, log aggregation is an important process which works to organize and impose order over otherwise disparate log files. That sounds good, but should your online business be eager to jump on the log aggregation bandwagon? Here is a look at the main benefits and considerations t...

   SOFTWARE DESIGN,LOG AGGREGATION     2021-10-12 21:44:39

  Taking Precautions to Avoid Shady VPN Providers

VPNs or virtual private networks are virtual tunnels that obscure your IP address, routing your internet traffic through a server located in a country of your choice, in an encrypted and anonymous way. Using a VPN allows you to: secure your sensitive data from hackers obscure the IP address so you can see content not available in your country avoid websites you routinely surf (e.g., Facebook) noticing a different IP address when you are traveling, and asking you to verify your identity bypass t...

   VPN,NETWORKING     2019-02-19 07:26:26

  Samsung announces Galaxy Note II

Samsung announced Galaxy Note II in today's Mobile Unpacked conference. It has been one year since the first generation of Galaxy Note released in October last year.Galaxy Note â…¡ is not lighter, but a little thinner compared to Galaxy Note I. It is equipped with Android 4.1 Jelly Bean with a 5.5-inch screen. Detailed parameters are as follows: 1.6GHz quad-core Exynos processor 5.5 inches HD Super AMOLED screen, 1280 x 720 (16:9) 8 megapixel rear camera, 1.9 megapixel front camera 2G RAM,...

   Samsung,Galaxy Note II,Parameters,Price     2012-08-29 20:01:08

  Crash your Chrome with %%30%30

Have you ever wondered a simple string can crash one of the most sophisticated designed web browsers -- Chrome? There is a finding from Andris Atteka who found that a null string "%%30%30" appended to an URL can crash Chrome. For example, if you have below URL in your browser address bar or you mouse over below URL, Chrome will crash: http://www.pixelstech.net/%%30%30 When the browser crashed, it may show : Or on Windows, you will see : This bug has been reported to Google at Is...

   CRASH,SECURITY,CHROME,GOOGLE     2015-09-20 08:24:16

  First Chinese app on Google Glass : PM25.in

PM25.in is an open source PM2.5 project developed by BestApp. It retrieves PM2.5 data of different cities in China through a crawler and then processes the data retrieved. They also created an API which enables third parties to access these data. Now the team has built something new, they moved this project to Google Glass and developed the world's first Chinese Google Glass application -- PM25.in. Now users with Google Glass can check PM2.5 of different cities in China. The final effect on Goog...

   Google Glass,China,PM25.in,BestApp     2013-06-23 10:17:40

  10 notorious computer virus

The history of computer virus is the same as computer history. With more and more powerful computers, virus also are smarter and harder to be detected and killed. They have big impact on data security and system usability. We introduce 10 notorious computer virus in the history. 1. Creeper In 1971, the Creeper virus, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies. Creeper infected DEC PDP-10 computers running the TENEX operating sy...

   Computer virus,History,Security     2013-07-16 21:09:22

  When a CA becomes untrustable

Information security has become a vital part of people's life, especially for those people who spend much time online. Tons of data are being transmitted over the internet every second. These data include user ids, passwords, credit card information etc and some of them are sensitive information which needs secure way to transmit. Hence different protocols have been developed including SSL/TLS to encrypt data transmitted over the internet. The core of these security protocols is the certifi...

   APPLE,SECURITY,GOOGLE,MOZILLA,NEWS,WOSIGN     2016-10-01 23:03:44

  Using public key authentication in SSH

SSH is a popular cryptographic network protocol for secure network service operation. It is frequently used in remote server login. For a system administrator or software developer, SSH is frequently used to access remote servers or development servers or testing servers etc.  To login with SSH, there are different authentication mechanisms : password, public key and interactive etc. If a remote server needs to be accessed frequently, password authentication may be too troublesome as p...

   LINUX,DEBUG,SSH,PUBLIC KEY     2016-09-10 05:55:46

  Hadoop or Spark: Which One is Better?

What is Hadoop? Hadoop is one of the widely used Apache-based frameworks for big data analysis. It allows distributed processing of large data set over the computer clusters. Its scalable feature leverages the power of one to thousands of system for computing and storage purpose. A complete Hadoop framework comprised of various modules such as: Hadoop Yet Another Resource Negotiator (YARN MapReduce (Distributed processing engine) Hadoop Distributed File System (HDFS) Hadoop Common Thes...

   COMPARISON,HADOOP,SPARK     2018-11-22 07:08:57

  Path gets another $40miliion investment

Social network website Path may officially announce today that it has completed its funding round B. According to sources, Red Point led this round of  funding of $ 40 million. In addition,  Path's market value is estimated about $ 250 million.Path was established in November 2010, there are currently over 2 million registered users. The company's slogan "Path to help you easily share with friends Life". Path call themselves "private social network" because Path is based on e-mail addr...

   Path,Social network,Funding round     2012-04-17 06:50:10