Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- PERMISSION DENIED



  Using public key authentication in SSH

SSH is a popular cryptographic network protocol for secure network service operation. It is frequently used in remote server login. For a system administrator or software developer, SSH is frequently used to access remote servers or development servers or testing servers etc.  To login with SSH, there are different authentication mechanisms : password, public key and interactive etc. If a remote server needs to be accessed frequently, password authentication may be too troublesome as p...

   LINUX,DEBUG,SSH,PUBLIC KEY     2016-09-10 05:55:46

  Apple CEO criticizes Windows 8 on D10

In the D10 Digital Conference held by The Wall Street Journal, Apple’s CEO Tim Cook expressed his sharp criticism about Windows 8 to be launched by Microsoft. According to Cook, the idea of this OS attempting to perfectly apply to both tablet and PC is far from realistic.On D10, Tim Cook said : "[With Windows 8, Microsoft] is pulling all of the leg weight of the PC market. You wind up with something that's very similar to what tablets were 10 years ago. The more you look at combining th...

   Apple CEO,Tim Cook,Windows 8,D10     2012-05-31 05:31:32

  Using htpasswd to protect your website in Nginx

We need to build a password protected website frequently such as an internal website within the team, demo website. Here what we are talking about is password protection in Nginx server level instead of application level registration and login. We are going to use Nginx server configuration and htpasswd file to achieve password authentication. The final result looks like below(Different browsers may have different interfaces): If the authentication fails, it will report a HTTP error: 401 Author...

   Nginx,Password protected,htpasswd     2013-06-07 21:35:27

  Apple.com is down

UPDATE : The service is back now! Apple.com is now inaccessible. It shows below "Access denied" message on its official site. It is still unknown why the service is down. And there is no ETA on when the service will be back to normal. From the error message, some people think this happens because Apple uses Akamai's security product and the security policy in place is violated. It's basically a WAF. The big issue is it takes 45 minutes for changes to propagate through Akamai's network. So, you ...

   IPHONE 6S,IPHONE 6S PLUS,APPLE     2015-09-12 00:50:17

  SQLite C/C++ function interfaces

Some simple introduction to the SQLite function interfaces. First let's check some error codes defined in SQLite3 (They are in SQLite3.h file in the SQLite installation).#define SQLITE_OK           0   /* Successful result */  /* beginning-of-error-codes */  #define SQLITE_ERROR        1   /* SQL error or missing database */  #define SQLITE_INTERNAL     2&nb...

   SQLite,Function interface,C/C++     2012-07-04 12:23:43

  Android socket programming example

Socket is a kind of interface for different sides t communicate, it usually identified by an IP and a port. There are many server side software on a server and they would provide different service. Each server many create some sockets and bind them to some ports so that clients can listen to. Software on the Internet will exchange data though a bidirectional connection established. Each end of the connection has a socket created. In Java, Socket and ServerSocket are in java.net package, ServerSo...

   Android,Socket,Java     2013-05-11 22:17:16

  Android and Security

The last year has been a phenomenal one for the Android ecosystem. Device activations grew 250% year-on-year, and the total number of app downloads from Android Market topped 11 billion. As the platform continues to grow, we’re focused on bringing you the best new features and innovations - including in security.Adding a new layer to Android securityToday we’re revealing a service we’ve developed, codenamed Bouncer, which provides automated scanning of Android Market ...

   Android,Security,Android Apps,App market,Bouncer     2012-02-03 08:03:51

  Using JavaScript to operate clipboard

Browsers allow JavaScript to read and write data on clipboard. Generally script should not modify user's clipboard to avoid impacting user expectation, but there are cases where this can indeed bring convenience to users. For example, for some code snippet, user can copy it to clipboard with one click instead of select and copy manually. There are three options for clipboard operation provided in JavaScript/browser: document.execCommand() Asynchronous Clipboard API copy and paste events This p...

   JAVASCRIPT,CLIPBOARD,NAVIGATOR.CLIPBOARD     2021-01-23 23:23:34

  Android Security

Android is an open source mobile platform that includes an operating system, middleware and applications. Android has revolutionized the mobile world in a big way. Android, which started as an alternative to Apple’s iOS, is now slowly eating into the market share of Apple and is of primary concern to the company. Let’s have a brief introduction about android and then look into the security concerns and vulnerabilities that need to be focused on. Android Introduction: Android was deve...

   Android security,Input validation     2013-04-16 12:19:37

  Bill Gates to return as Microsoft's white knight?

Summary: Could and should Bill Gates return to day-to-day responsibilities at Microsoft? Fortune is reporting there’s a rumor to that effect. Fortune reported on December 8 that there’s talk Microsoft Chairman Bill Gates might be mulling a comeback, largely to help boost Microsoft’s stagnant stock price and employee morale. I have to say I am very, very, very skeptical on this one. First, it seems this is a single-sourced report....

   Microsoft,Change,Bill Gates,Return,White Knight     2011-12-09 07:39:39