Search Content

Displaying 1 - 20 of 258

… Security Assessment Has your site been hacked? Are you concerned that it might be? Freelock's Security Assessment can set your mind at ease, or chart a …

… Security Updates Submitted by John Locke on Wed, 07/27/2011 - … can to stay out of trouble. We've all become accustomed to security updates on our computers. Today every operating …

… A security reminder Submitted by John Locke on Thu, 05/30/2013 … on the site fell into malicious hands. According to the security team's announcement , the attack was not a result of … on the server. Drupal has long had one of the best security track records among open source CMSs. The security …

… Submitted by John Locke on Tue, 10/25/2005 - 02:01 Voice Over IP (VoIP) is becoming a main part of the small … human visitor and to prevent automated spam submissions. … Voice Over IP (VoIP) is becoming a main part of the small …

… Security Statement Submitted by John Locke on Mon, 11/16/2009 … authentication, monitoring, auditing, and encryption. Security measures have been built into the design, …

… Data Security Resources Submitted by John Locke on Mon, 05/24/2004 … FX, Joe Grand, and Tim Mullen, Syngress 2003 Web Security, Privacy, and Commerce , by Simson Garfinkel and …

… Bluetooth Security issues Submitted by John Locke on Thu, 12/02/2004 - … read. Wired 12.12: They've Got Your Number … Bluetooth Security issues …

… Guest Post: Drupal Security Notes Submitted by John Maher on Wed, 08/22/2012 - … for Drupal covers main areas of attention in regards to security for any Drupal web administrator. 1. Upgrade to …

… which professional photographers and printers need for print production. The GIMP is now pretty much equivalent to … in general is a weak area for Linux and The GIMP. Print publisher Good equivalents, not quite mature InDesign, …

… Security Security is a cornerstone of what we do. All of our ongoing …

… security notices come out... well, whenever whichever feed you subscribe to bothers to announce something. Today's … another supply chain attack. ... that's from a WordFence blog post outlining a security vulnerability they've … another supply chain attack. ... that's from a WordFence blog post outlining a security vulnerability they've …

… Windows v Linux security: the real facts Submitted by John Locke on Fri, … on these days, here's a report comparing the relative security of Linux vs. Windows, based on an analysis of the … data that supports them. Excellent read. Windows v Linux security: the real facts | The Register Add new comment You …

… A Balancing Act? Openess and Security on Campus: Syllabus Submitted by John Locke on Wed, 04/07/2004 - 18:45 A Balancing Act? Openess and Security on Campus: Syllabus Add new comment You must have …

… Cyber/Physical security reflections, from an MIT Enterprise Forum talk … come up with something more secure than a 9-digit social security number? The Equifax hack is a problem of their own …

… Website Security Audit Our data-driven and interconnected world has … the safety of your organization’s data is a website security audit. Protecting a Company’s Data A website is an …

… Website Security Check Your organization has been around for a long … around for a long time... are you worried about expanded security threats? We understand the anxiety that comes with …

… Serious flaws in bluetooth security lead to disclosure of personal data Submitted by … on Tue, 02/10/2004 - 00:52 Serious flaws in bluetooth security lead to disclosure of personal data . Bluetooth turns out to have a number of security flaws that allow people within range to access your …

… my code instead of what's expected? (This is left as an exercise for the reader...) This has now happened twice to … addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> … my code instead of what's expected? (This is left as an exercise for the reader...) This has now happened twice to …

… 13:12 New versions of Drupal core dropped today, to fix a file handling issue. After assessing the patches, statements, … flaw takes two things: The ability to upload a malicious file with "PHAR" encoding embedded -- note this could masquerade as an otherwise innocent file such as a graphics file The ability to pass a file path …

… files for security reasons. Switching between trunk and a tag So far so good. We have the basics of an application set … Simple. Just check it out: cd public_html/dojo git tag # shows you a list of available tags git checkout … with your changes. Also note that when you check out a tag, you don't necessarily get a tracking branch, so don't …