Search Content

Displaying 1 - 20 of 257

… of further actions, if necessary. This is a "white box" assessment -- we are looking behind the scenes for … of further actions, if necessary. This is a "white box" assessment -- we are looking behind the scenes for …

… addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> …

… password of complete gibberish with no patterns, and then store it in a secure password manager program like KeePass. … for each site, and use a secure password manager to store your passwords. Site owners If your site is important … password of complete gibberish with no patterns, and then store it in a secure password manager program like KeePass. …

… a main part of the small business infrastructure. As phone networks converge with data networks, security becomes more of a concern. This group is … a main part of the small business infrastructure. As phone networks converge with data networks, security becomes more …

… shall not be construed in any way as providing business, legal or other advice, or warranting as fail proof, the … shall not be construed in any way as providing business, legal or other advice, or warranting as fail proof, the …

… Data Security Resources Submitted by John Locke on Mon, 05/24/2004 … FX, Joe Grand, and Tim Mullen, Syngress 2003 Web Security, Privacy, and Commerce , by Simson Garfinkel and …

… Bluetooth Security issues Submitted by John Locke on Thu, 12/02/2004 - … read. Wired 12.12: They've Got Your Number … Bluetooth Security issues …

… is part of general security no matter what application or software is in use. Make use of logwatch or other automated log alert software to be on top of any trending patterns in logs from … is part of general security no matter what application or software is in use. Make use of logwatch or other automated …

… addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> …

… Security Security is a cornerstone of what we do. All of our ongoing …

… Another Wednesday, another round of security updates Submitted by John Locke on Wed, 12/20/2017 - 16:10 Drupal security updates generally come out on Wednesdays, to try to streamline everybody's time. WordPress security notices come out... well, whenever whichever feed …

… Windows v Linux security: the real facts Submitted by John Locke on Fri, … on these days, here's a report comparing the relative security of Linux vs. Windows, based on an analysis of the … data that supports them. Excellent read. Windows v Linux security: the real facts | The Register Add new comment You …

… A Balancing Act? Openess and Security on Campus: Syllabus Submitted by John Locke on Wed, 04/07/2004 - 18:45 A Balancing Act? Openess and Security on Campus: Syllabus Add new comment You must have …

… addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> …

… to make sure that those that have access can access the pages they are supposed to. It also includes removing those …

… Hackers can use these methods to extract website or user information and do damage to the site. The best way to …

… events and contacts. Secure hosting environments Add new comment You must have JavaScript enabled to use this form. … me when new comments are posted All comments Replies to my comment Comment About text formats Filtered HTML Web page …

… You're on your own. The security team might handle working with a plugin author if they get notified about a … You're on your own. The security team might handle working with a plugin author if they get notified about a …

… monitoring and fixing vulnerabilities. Reply Add new comment You must have JavaScript enabled to use this form. … not be shown publicly. Homepage Subject Notify me when new comments are posted All comments Replies to my comment Comment About text formats Filtered HTML Web page …

… public_html/dojo/dojo ... Then in whatever template or file bootstraps your application, add a dojo.moduleUrl path … project when using git submodule git submodule creates a file called .gitmodules where it stores the path and remote … To create a Dojo build, you usually first create a "Layer" file, and drop it in utils/buildscripts/profiles. Instead of …