Search Content

Displaying 1 - 20 of 257

… changes and identify custom code Evaluation of a site's theme for security issues Identification of any known … changes and identify custom code Evaluation of a site's theme for security issues Identification of any known …

… Features Industry Business E-Commerce Publishing Retail Software Tourism Add new comment You must have JavaScript …

… A security reminder Submitted by John Locke on Thu, 05/30/2013 … on the site fell into malicious hands. According to the security team's announcement , the attack was not a result of … on the server. Drupal has long had one of the best security track records among open source CMSs. The security …

… VoIP Security Submitted by John Locke on Tue, 10/25/2005 - 02:01 … As phone networks converge with data networks, security becomes more of a concern. This group is assembling …

… Security Statement Submitted by John Locke on Mon, 11/16/2009 … authentication, monitoring, auditing, and encryption. Security measures have been built into the design, …

… Data Security Resources Submitted by John Locke on Mon, 05/24/2004 … FX, Joe Grand, and Tim Mullen, Syngress 2003 Web Security, Privacy, and Commerce , by Simson Garfinkel and …

… Bluetooth Security issues Submitted by John Locke on Thu, 12/02/2004 - … read. Wired 12.12: They've Got Your Number … Bluetooth Security issues …

… cookie flag, the httponly cookie flag can be set in php.ini on the server for another layer of security. In Debian or Ubuntu, edit the following file: /etc/php5/apache2/php.ini Red Hat or CentOS, edit the following file: /etc/php.ini Use the following values to enforce the httponly flag for …

… Security Bulletins, computers, and cars Submitted by John … Wed, 07/27/2005 - 00:00 It's been a bad week for computer security. Basically, if you use the Internet and have a …

… Security Security is a cornerstone of what we do. All of our ongoing …

… security notices come out... well, whenever whichever feed you subscribe to bothers to announce something. Today's … modules flagged with security bulletins. Of these 4, 3 of these were not fixed -- the module code was yanked from … another supply chain attack. ... that's from a WordFence blog post outlining a security vulnerability they've …

… Windows v Linux security: the real facts Submitted by John Locke on Fri, … on these days, here's a report comparing the relative security of Linux vs. Windows, based on an analysis of the … data that supports them. Excellent read. Windows v Linux security: the real facts | The Register Add new comment You …

… A Balancing Act? Openess and Security on Campus: Syllabus Submitted by John Locke on Wed, 04/07/2004 - 18:45 A Balancing Act? Openess and Security on Campus: Syllabus Add new comment You must have …

… Cyber/Physical security reflections, from an MIT Enterprise Forum talk … come up with something more secure than a 9-digit social security number? The Equifax hack is a problem of their own …

… Website Security Audit Our data-driven and interconnected world has … the safety of your organization’s data is a website security audit. Protecting a Company’s Data A website is an …

… Website Security Check Your organization has been around for a long … around for a long time... are you worried about expanded security threats? We understand the anxiety that comes with …

… Serious flaws in bluetooth security lead to disclosure of personal data Submitted by … on Tue, 02/10/2004 - 00:52 Serious flaws in bluetooth security lead to disclosure of personal data . Bluetooth turns out to have a number of security flaws that allow people within range to access your …

… Drupalgeddon2: Should I worry about critical security updates? Submitted by John Locke on Thu, 03/29/2018 … flaw in a web application, like yesterday's Drupal security vulnerability. And yet people still don't take … site, have this vulnerability patched, have reasonably secure hosting , and strong passwords, you're way better off …

… 13:12 New versions of Drupal core dropped today, to fix a file handling issue. After assessing the patches, statements, … flaw takes two things: The ability to upload a malicious file with "PHAR" encoding embedded -- note this could masquerade as an otherwise innocent file such as a graphics file The ability to pass a file path …

… files for security reasons. Switching between trunk and a tag So far so good. We have the basics of an application set … Simple. Just check it out: cd public_html/dojo git tag # shows you a list of available tags git checkout … with your changes. Also note that when you check out a tag, you don't necessarily get a tracking branch, so don't …