Today's Question:  What are you most afraid of as a programmer?        GIVE A SHOUT

SEARCH KEYWORD -- security



  Different types of keystore in Java -- PKCS12


PKCS12 is an active file format for storing cryptography objects as a single file. It can be used to store secret key, private key and certificate.It is a standardized format published by RSA Laboratories which means it can be used not only in Java but also in other libraries in C, C++ or C# etc. This file format is frequently used to import and export entries from or to other keystore types. Next we will explain the operations which can be performed on PKCS12 keystore. Create PKCS12 keystore Be...

   Java, PKCS12, keystore, tutorial     2015-01-04 21:08:49


  That “JavaScript not available” case


During some interesting discussions on Twitter yesterday I found that there is now more than ever a confusion about JavaScript dependence in web applications and web sites. This is a never ending story but it seems to me to flare up ever time our browsing technology leaps forward. I encountered this for the first time back in the days of DHTML. We pushed browsers to their limits with our lovely animated menus and 3D logos (something we of course learned not to do again, right?) and we were ...

   JavaScript,Security,Banned,Reason     2012-01-04 02:37:35


  What’s making Drupal gain momentum among government organizations?


Drupal has come up as a big splash in the world of Website development. Whether it’s an informative website or an e-commerce store, Drupal has been successfully utilized for meeting customized web requirements. It’s not surprising to find entrepreneurs, hailing from different business verticals, choosing Drupal for powering their websites. Joining this group of elite Drupal users are the representatives of government organizations. The noticeable popularity of Drupal has indeed made ...

   Drupal     2014-03-12 08:15:43


  Android Security


Android is an open source mobile platform that includes an operating system, middleware and applications. Android has revolutionized the mobile world in a big way. Android, which started as an alternative to Apple’s iOS, is now slowly eating into the market share of Apple and is of primary concern to the company. Let’s have a brief introduction about android and then look into the security concerns and vulnerabilities that need to be focused on. Android Introduction: Android was deve...

   Android security,Input validation     2013-04-16 12:19:37


  Crash your Chrome with %%30%30


Have you ever wondered a simple string can crash one of the most sophisticated designed web browsers -- Chrome? There is a finding from Andris Atteka who found that a null string "%%30%30" appended to an URL can crash Chrome. For example, if you have below URL in your browser address bar or you mouse over below URL, Chrome will crash: http://www.pixelstech.net/%%30%30 When the browser crashed, it may show : Or on Windows, you will see : This bug has been reported to Google at Is...

   CRASH,SECURITY,CHROME,GOOGLE     2015-09-20 08:24:16


  10 notorious computer virus


The history of computer virus is the same as computer history. With more and more powerful computers, virus also are smarter and harder to be detected and killed. They have big impact on data security and system usability. We introduce 10 notorious computer virus in the history. 1. Creeper In 1971, the Creeper virus, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies. Creeper infected DEC PDP-10 computers running the TENEX operating sy...

   Computer virus,History,Security     2013-07-16 21:09:22


  When a CA becomes untrustable


Information security has become a vital part of people's life, especially for those people who spend much time online. Tons of data are being transmitted over the internet every second. These data include user ids, passwords, credit card information etc and some of them are sensitive information which needs secure way to transmit. Hence different protocols have been developed including SSL/TLS to encrypt data transmitted over the internet. The core of these security protocols is the certifi...

   APPLE,SECURITY,GOOGLE,MOZILLA,NEWS,WOSIGN     2016-10-01 23:03:44


  Using public key authentication in SSH


SSH is a popular cryptographic network protocol for secure network service operation. It is frequently used in remote server login. For a system administrator or software developer, SSH is frequently used to access remote servers or development servers or testing servers etc.  To login with SSH, there are different authentication mechanisms : password, public key and interactive etc. If a remote server needs to be accessed frequently, password authentication may be too troublesome as p...

   LINUX,DEBUG,SSH,PUBLIC KEY     2016-09-10 05:55:46


  A new SSL 3.0 vulnerability named POODLE is released


Today a new SSL v3 security vulnerability is released by Google and it affects all products which is using SSL v3 protocol as this vulnerability is introduced by a design flaw. Google revealed details of the design flaw on Tuesday, and dubbed it POODLE – short for Padding Oracle On Downgraded Legacy Encryption. It is a blunder within the blueprints of SSL 3.0 rather than a software bug, so it affects any product following the protocol – from Google Chrome and Mozilla Firefox to Micro...

   SSL v3, vulnerability, Google, POODLE     2014-10-15 04:48:59


  Do IE developers feel guilty?


IE won the browser war before Chrome appeared with the help of anti-competitive practices. But with the appearance of more and more easy-to-use and fast browsers, people start to hate IE and leave IE. It seems IE is not a product of modern age. Do IE developers feel guilty about this? Everything is contextual. The browser that most people hate today is IE6, which, at the time was one of the best browsers on the planet (it didn't win the Browser Wars, Round One, by accident). It was built on "int...

   IE,History     2013-07-26 21:21:46