SEARCH KEYWORD -- Security camera
30 minutes to fix Java vulnerability
On September 25, Adam Gowdiak from the Polish security consulting firm Security Explorations submitted a Java security vulnerability to Oracle and provided a proof-of-concept. The vulnerability exists in Java 5 6,7, once the user accesses hosted malware site, an attacker can remotely control the infected machine.Gowdiak later got in touch again with Oracle and got the response that the fix has reached the final stage. He can expect the patch in four months later. He eventually unbearable Oracle'...
Java, Vulnerability,Fix 2012-10-29 11:53:43
8 very useful and free web security testing tools
With more pervasive of web applications, web security threats are becoming increasingly prominent. Hackers gain web server control by exploiting web server vulnerabilities and SQL injection vulnerabilities, then they may tamper with web content, or steal important internal data, the more serious is to inject malicious code into web pages to affect visitors of websites. Attention is gradually warming up to Web Application Security. Here we recommend eight very useful and free web security testing...
Website, security,Web security,Attack 2012-07-22 10:59:09
Huawei phone with HarmonyOS installed is becoming real
In past few days, there is a photo of a Huawei phone with HarmonyOS installed appearing on the web. This is an engineering testing phone circulating inside Huawei according to the source. This is the first time that a real phone with Huawei's own operating system HarmonyOS installed is being seen on the web. This indicates that it will not be that far for general public to be able to access the new Huawei self developed OS. From the photo, there are a few indications: This phone sample s...
Building Security onto Your Mobile Application
Analysts state that more than 75% of the mobile applications will fail the basic security tests in 2015 – Gartner Research. Enterprises that follow the Bring Your Own Device (BYOD) approach and facilitate mobile computing to their employees are susceptible to security threats and other vulnerabilities, unless they implement stringent security measures. In the development or deployment of mobile applications, a business can be severely impacted both financially and otherwise, if they are to...
Web Application Development Company, iPhone App Development Company 2015-08-21 07:22:32
Never ever touch a programmer
This is a technical license plate block example. We don't know whether it is working or not, however, the idea is very good. When you drive through some of the junctions, the camera captures the license number and convert it into text with OCR, and then insert them into the database. Therefore, this license plate on the car becomes a SQL injection. This picture tells us -- never trust user input.Author : 陈皓 Source : http://coolshell.cn/articles/6639.html#more-6639...
Programmer,SQL injection 2012-04-21 01:19:48
Windows Security Improvements
Traenk is still upset by his recent dive into Windows security. So much more was promised when the merger of Windows 9x and NT lines was announced, so long ago. I honestly expected better.Long ago, Microsoft announced that it would merge the then NT and Windows 9x lines of products. Wow! That means a file access control system, logging, different accounts and filespaces for accounts! Finally! We would have a secure version of Windows for our homes!And we do hav...
Windows,Security,Improvement,Windows NT 2011-09-02 11:54:50
10 stupid things smartphone users usually do
What are the things you like doing with your smartphones? Making phone calls? Playing games? Taking photos? Today we will not discuss what we should do with our smartphones, instead we will summarize 10 stupid things smartphone users usually do. 1. Taking photos of food and share them Please. The only time people want to stare at food is when we see the menu before ordering. 2. Sending SMS to solve dispute You will miss the two key components in communication : content and tone. 3. Holding mobil...
Smartphone,Stupid 2013-05-28 12:49:05
How to check whether a web page can be loaded in iframe
Sometimes you may want to load other website's page in your own website's iframe, but due to some security concerns, other website may have security configurations which prevent you from loading their pages into your iframe. In this case, if you try to load them, you would see a blank page or a text message telling that it's prohibited. Fortunately, you can detect this before you actually decide to load it. To prevent a page from being loaded by an iframe from other site, the response ...
HTTP,HTML,IFRAME,SECURITY,X-FRAME-OPTIONS,CONTENT-SECURITY-POLICY 2018-07-27 22:36:02
Samsung will release 10.1 inch Windows RT Tablet
Today, Samsung not only announced Galaxy Note â…¡, first Windows Phone 8 device Ativ S and camera EK-GC100 Galaxy equipped with Android 4.1 system, but also announced a Windows RT Tablet PC Samsung Ativ Tab.The 10.1-inch Samsung Ativ Tab has a resolution of 1366 x 768,1.5 GHz dual-core processor, 2G RAM, a 32/64G storage space, support for microSD memory expansion. Other configurations as well as the standard Wi-Fi and Bluetooth 4.0, support for USB 2.0, uHDMI and NFC.In addition, the table...
How to prevent next HeartBleed bug?
How to ensure the security of open source projects is a concern for many open source users including individual users and companies. But it's not an easy task to ensure the security of open source projects. Because everyone can see the source code, there is much higher possibility that a bug may be found by someone. Once a bug is disclosed, people may exploit it and do evil things, this may cause loss of money either for individuals or companies, some of the bugs may even have big impact to the...
Open source,HeartBleed,Security 2014-04-24 09:07:05
RECENT
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- A journey to investigate a goroutine leakage case
- Understanding Slice Behavior in Go
- Breaking Barriers: How 3D Printing is Democratizing Product Development
- The Power of Efficiency: 10 Practical Energy-Saving Tips for Tech Startups
- more>>