Today's Question:  What does your personal desk look like?        GIVE A SHOUT

SEARCH KEYWORD -- Security camera



  30 minutes to fix Java vulnerability

On September 25, Adam Gowdiak from the Polish security consulting firm Security Explorations submitted a Java security vulnerability to Oracle and provided a proof-of-concept. The vulnerability exists in Java 5 6,7, once the user accesses hosted malware site, an attacker can remotely control the infected machine.Gowdiak later got in touch again with Oracle and got the response that the fix has reached the final stage. He can expect the patch in four months later. He eventually unbearable Oracle'...

   Java, Vulnerability,Fix     2012-10-29 11:53:43

  8 very useful and free web security testing tools

With more pervasive of web applications, web security threats are becoming increasingly prominent. Hackers gain web server control by exploiting web server vulnerabilities and SQL injection vulnerabilities, then they may tamper with web content, or steal important internal data, the more serious is to inject malicious code into web pages to affect visitors of websites. Attention is gradually warming up to Web Application Security. Here we recommend eight very useful and free web security testing...

   Website, security,Web security,Attack     2012-07-22 10:59:09

  Huawei phone with HarmonyOS installed is becoming real

In past few days, there is a photo of a Huawei phone with HarmonyOS installed appearing on the web. This is an engineering testing phone circulating inside Huawei according to the source.  This is the first time that a real phone with Huawei's own operating system HarmonyOS installed is being seen on the web. This indicates that it will not be that far for general public to be able to access the new Huawei self developed OS. From the photo, there are a few indications: This phone sample s...

   HUAWEI,HARMONYOS,P40     2020-05-19 08:23:48

  Building Security onto Your Mobile Application

Analysts state that more than 75% of the mobile applications will fail the basic security tests in 2015 – Gartner Research. Enterprises that follow the Bring Your Own Device (BYOD) approach and facilitate mobile computing to their employees are susceptible to security threats and other vulnerabilities, unless they implement stringent security measures. In the development or deployment of mobile applications, a business can be severely impacted both financially and otherwise, if they are to...

   Web Application Development Company, iPhone App Development Company     2015-08-21 07:22:32

  Never ever touch a programmer

This is a technical license plate block example. We don't know whether it is working or not, however, the idea is very good. When you drive through some of the junctions, the camera captures the license number and convert it into text with OCR, and then insert them into the database. Therefore, this license plate on the car becomes a SQL injection. This picture tells us -- never trust user input.Author : 陈皓 Source : http://coolshell.cn/articles/6639.html#more-6639...

   Programmer,SQL injection     2012-04-21 01:19:48

  Windows Security Improvements

Traenk is still upset by his recent dive into Windows security.  So much more was promised when the merger of Windows 9x and NT lines was announced, so long ago. I honestly expected better.Long ago, Microsoft announced that it would merge the then NT and Windows 9x lines of products.  Wow!  That means a file access control system, logging, different accounts and filespaces for accounts!  Finally!  We would have a secure version of Windows for our homes!And we do hav...

   Windows,Security,Improvement,Windows NT     2011-09-02 11:54:50

  10 stupid things smartphone users usually do

What are the things you like doing with your smartphones? Making phone calls? Playing games? Taking photos? Today we will not discuss what we should do with our smartphones, instead we will summarize 10 stupid things smartphone users usually do. 1. Taking photos of food and share them Please. The only time people want to stare at food is when we see the menu before ordering. 2. Sending SMS to solve dispute You will miss the two key components in communication : content and tone. 3. Holding mobil...

   Smartphone,Stupid     2013-05-28 12:49:05

  How to check whether a web page can be loaded in iframe

Sometimes you may want to load other website's page in your own website's iframe, but due to some security concerns, other website may have security configurations which prevent you from loading their pages into your iframe. In this case, if you try to load them, you would see a blank page or a text message telling that it's prohibited. Fortunately, you can detect this before you actually decide to load it. To prevent a page from being loaded by an iframe from other site, the response ...

   HTTP,HTML,IFRAME,SECURITY,X-FRAME-OPTIONS,CONTENT-SECURITY-POLICY     2018-07-27 22:36:02

  Samsung will release 10.1 inch Windows RT Tablet

Today, Samsung not only announced Galaxy Note â…¡, first Windows Phone 8 device Ativ S and camera EK-GC100 Galaxy equipped with Android 4.1 system, but also announced a Windows RT Tablet PC Samsung Ativ Tab.The 10.1-inch Samsung Ativ Tab has a resolution of 1366 x 768,1.5 GHz dual-core processor, 2G RAM, a 32/64G storage space, support for microSD memory expansion. Other configurations as well as the standard Wi-Fi and Bluetooth 4.0, support for USB 2.0, uHDMI and NFC.In addition, the table...

   Samsung,Windows 8,Tablet     2012-08-29 19:36:31

  How to prevent next HeartBleed bug?

How to ensure the security of open source projects is a concern for many open source users including individual users and companies. But it's not an easy task to ensure the security of open source projects. Because everyone can see the source code, there is much higher possibility that a bug may be found by someone. Once a bug is disclosed, people may exploit it and do evil things, this may cause loss of money either for individuals or companies, some of the bugs may even have big impact to the...

   Open source,HeartBleed,Security     2014-04-24 09:07:05