Today's Question:  What's your opinion about Alibaba mooncake incident?        GIVE A SHOUT

SEARCH KEYWORD -- security



  PHP 7 is coming soon


After a few RCs, PHP 7 will be officially released on November 12, 2015. This is a major release of PHP since PHP 5.6. @Laruence, one of the core contributors of PHP, has posted this news on Weibo(China's Twitter).  This is a one month later than the expected time as recorded in PHP 7 timeline. But it's not that late. The new release will come with a few features including: Scalar type declaration, you can define variable like int now Return type support. Besides declare scalar type ...

   RELEASE DATE,PHP7     2015-11-08 09:13:37


  Can we believe our eyes?


Several days ago, one of our customers submitted a sample (SHA1: fbe71968d4c5399c2906b56d9feadf19a35beb97, detected as TrojanDropper:Win32/Vundo.L). This trojan hijacks  the hosts “vk.com” and “vkontakte.ru” (both social networking sites in Russia)and redirects them to 92.38.209.252, but achieves this in an unusual way. A common  method used to hijack a website and redirect it to a site of the attacker’s choice is to add an entry in the Windows hosts file located in the %...

   Window,Software,Eye,Weired     2011-08-22 12:12:16


  User experience : Exception handling


Exception handling is the process of handling emergencies or unpredictable operational errors. The specific time of the occurrence of unexpected events and the actual consequences of the specific situation are difficult to predict. How to handle this unexpected crisis is also related to the user experience of your users. Let's first look at how some famous products deal with unexpected exception encountered by users:1. Goodyear tires can automatically expand when leaking.Tire blast is one of the...

   User experience,Exception handling     2013-04-06 05:05:04


  Address of a Java Object


In conventional java programming, you will never need address or location of a java object from memory. When you discuss about this in forums, the first question raised is why do you need to know the address of a java object? Its a valid question. But always, we reserve the right to experiment. Nothing is wrong in exploring uncharted areas.I thought of experimenting using a little known class from sun package. Unsafe is a class that belongs to sun.misc package. For some of you the package might ...

   Java,Object,Address,Memory,Start address     2011-09-29 11:17:46


  Microsoft will drop support of IE8, IE9 and IE10


Microsoft will push the last set of security updates for IE8, IE9 and IE10 next Tuesday(January 12). Thereafter that Microsoft will drop support of these three versions of IE. These are some other old products given up by Microsoft since Windows 7.  IE11 will be the only Internet Explorer supported and Edge will be another star advocated by Microsoft. The good news is you will not get annoying notification from Microsoft anymore to ask you to upgrade your IE. But the bad news users&nb...

   MICROSOFT,IE,NEWS     2016-01-09 07:55:44


  W3C Pronounces HTML5 Standard Complete, Changing Web Development Forever


As a gesture of highest level of endorsement, W3C – World Wide Web consortium has published its recommendation for HTML5. A follow-up to HTML4 - HTML5 underwent a continuous process of development all these years, and recently, the standard version was finalized after years spent on adding features, tweaking and iterating. The end user might not notice any changes, however chances are that your web browser already supports HTML5 features like vector graphics and (video) element – unless you...

   w3c compliance, html5, html5 compliance, browser compatibility, semantic web, responsive web design     2014-10-30 08:45:21


  PHP Security


1. IntroductionWriting PHP applications is pretty easy. Most people grasp the syntax rather quickly and will within short time be able to produce a script that works using tutorials, references, books, and help forum forums like the one we have here at PHP Freaks. The problem is that most people forget one of the most important aspects that one must consider when writing PHP applications. Many beginners forget the security aspect of PHP. Generally, your users are nice people, they will...

   PHP,Security,SQL Injection,XSS Cross sit     2011-10-01 02:25:31


  Generating CSR using Java


A CSR(Certificate Signing Request) is a kind of request generated by an application and is to be sent to a Certificate Authority to create a signed certificate which can be distributed. It usually contains certificate information such as subject name, public key info and signature info. In Java, keytool can be used to generate a certificate request with option -certreq.  But sometimes if an application wants to create a CSR programmatically, keytool will not do a favor, instead you should u...

   JAVA,SECURITY,CSR,CERTIFICATE REQUEST     2016-05-25 04:49:17


  How Do I Enable Remote Access To MySQL Database Server?


By default remote access to MySQL database server is disabled for security reasons. However, some time you need to provide remote access to database server from home or a web server. If you want to remotely access to the database server from the web server or home, follow this quick tutorial.MySQL Remote AccessYou need type the following commands which will allow remote connections.Step # 1: Login Using SSH (if server is outside your data center)First, login over ssh to remote MySQL database ser...

   MySQL,Remote access,Enable,Host or webdomain     2011-10-31 00:31:41


  Introduction to OAuth (in Plain English)


Last week we talked about giving away your passwords and how you should never do it.  When a website wants to use the services of another—such as Bitly posting to your Twitter stream—instead of asking you to share your password, they should use OAuth instead. OAuth is an authentication protocol that allows you to approve one application interacting with another on your behalf without giving away your password. This is a quick guide to illustrate, as simply as possible, how OAu...

   Security,OAuth,Permission,Partial access     2012-04-05 11:39:54