SEARCH KEYWORD -- CYBER SECURITY
Internet trends and your web development strategy
Takeaway: Ryan Boudreaux looks at some of the latest reports on how users are spending their time on the web. Keeping an eye on trends is one way for web developers to stay current. Recent figures in Internet activity include several interesting trends, including: the number of smartphone-user adoption rates Cyber Monday sales figures mobile banking app usage social networking on mobile social media hours spent online search habits Trends in worldwide Internet activity may or may not translate ...
Internet trend,Mobile,Web design,Web app 2012-02-01 00:02:29
Apple.com is down
UPDATE : The service is back now! Apple.com is now inaccessible. It shows below "Access denied" message on its official site. It is still unknown why the service is down. And there is no ETA on when the service will be back to normal. From the error message, some people think this happens because Apple uses Akamai's security product and the security policy in place is violated. It's basically a WAF. The big issue is it takes 45 minutes for changes to propagate through Akamai's network. So, you ...
IPHONE 6S,IPHONE 6S PLUS,APPLE 2015-09-12 00:50:17
Introduction to DTLS(Datagram Transport Layer Security)
Secure communication has become a vital requirement on the Internet. Lots of information transferred through the Internet are sensitive data such as financial transactions, medical information, media streaming etc. To ensure security of data transferred on the Internet, a few secure protocols have been designed including SSL/TLS and IPsec. Many large websites in the world have adopted TLS. Apart from SSL/TLS, there is some other protocol designed to be used in special cases. One of them is ...
Useful functions to provide secure PHP application
Security is a very important aspect of programming. There are many functions or modules in any kind of real programming language providing security functionalities In modern websites, we may often get inputs form users all around the world.There is a famous saying which says that never trust user input. So in web programming languages, we will often see functions which will guarantee the security of the data input from users. Today we will cover some of these functions in the most famous o...
PHP,security,SQL Injection,XSS,AJAX 2014-10-30 04:21:59
A serious security vulnerability found in MySQL/MariaDB
Recently a serious security vulnerability was found in MySQL/MariaDB. It relates to the access to the database. The issue is described below.When a user connects to MariaDB/MySQL, a token (SHA over a password and a random scramble string) is calculated and compared with the expected value. Because of incorrect casting, it might've happened that the token and the expected value were considered equal, even if the memcmp() returned a non-zero value. In this case MySQL/MariaDB would think that the p...
Simple Strategies to Boost Your Android Phone Security
Android is one of the safest operating systems for smartphones and tablets if used correctly. Unfortunately, only a third of Android users use the latest version, and older versions are far more vulnerable than newer ones. Not to mention that many manufacturers take their time when it comes to downloading the latest security patches. A news blog Android Authority ranked the fastest manufacturers in downloading system updates. Here are the results: LG - 78 days Motorola - 88 days HTC - 95 days S...
ANDROID,DATA SECURITY 2019-02-19 07:36:46
Generate certificate in Java -- Store certificate in KeyStore
In previous post, we have explained how to create a certificate chain in Java. After generating the chain, we need to store it somewhere so that it can be used later when we are doing the actual SSL communication, either in a key store or trust store. This post will show you how to store the private key and its associated certificate chain in a keystore file. There are different types of keystore in Java, in this post, we will choose the JKS to demonstrate how to store the certificate chain. Whe...
Java,Certificate chain,Keystore 2014-08-20 03:56:39
Singapore ISP SingTel experiences nation wide service down
On 3 Dec, 2016, many people from Singapore found that they were disconnected from the world the moment they waked up. Their Internet Service Provider(ISP) SingTel, the largest ISP in the country, experienced a nation wide service down incident. The incident started at 8:21 am according to SingTel and all Internet service subscribers across the country are affected. The incident lasted for over 15 hours(The time this post is being written) and there is still no timeline for when the service will ...
SINGAPORE,SERVICE DOWN,NEWS,SINGTEL 2016-12-03 09:33:46
Evolution mail configuration with Hotmail on Ubuntu
Evolution mail now is the default Email client on Ubuntu. When we configure this mail client with Hotmail. The steps should be followed. Step 1: Open Evolution mail through Applications->Internet->Evolution mail Step 2: Goto Edit->Preferences Step 3 : Click Add button or double click on the added mail account. Step 4 : On the Identity tab, fill the Hotmail account you want to use. Step 5 : On "Receiving email" Tab, ...
Ubuntu,Evolution mail,Hotmail,Configurat 2011-04-28 09:24:01
Difference between keystore and truststore
Security has become a vital concern in most of the online transactions nowadays. Lots of the world's most popular websites have adopted security protocols to transfer data, especially sensitive data. These security protocols including SSL/TLS which are using the private/public key exchange mechanism to establish secure connections. The private/public key cryptography is a really important invention and it allows data to be transferred securely and solves the big problem of transferrin...
KEYSTORE,TRUSTSTORE,SECURITY,SSL 2017-03-04 07:52:47
RECENT
- Why init() is not recommended in Go
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- more>>