Search Content

Displaying 1 - 20 of 257

… changes and identify custom code Evaluation of a site's theme for security issues Identification of any known … changes and identify custom code Evaluation of a site's theme for security issues Identification of any known …

… rolling out those changes. For most of our clients on a support plan, we maintain a test copy of their site primarily … rolling out those changes. For most of our clients on a support plan, we maintain a test copy of their site primarily …

… A security reminder Submitted by John Locke on Thu, 05/30/2013 … on the site fell into malicious hands. According to the security team's announcement , the attack was not a result of … on the server. Drupal has long had one of the best security track records among open source CMSs. The security

… VoIP Security Submitted by John Locke on Tue, 10/25/2005 - 02:01 … As phone networks converge with data networks, security becomes more of a concern. This group is assembling …

Security Statement Submitted by John Locke on Mon, 11/16/2009 … authentication, monitoring, auditing, and encryption. Security measures have been built into the design, …

… ,” by Christophe Devine, Passphrase FAQ at Vanish.org Software Keyring , open source encrypted password storage for Palm OS Jpilot , open source PIM software for Linux Oubliette , open source encrypted password …

… Bluetooth Security issues Submitted by John Locke on Thu, 12/02/2004 - … read. Wired 12.12: They've Got Your Number … Bluetooth Security issues …

… Guest Post: Drupal Security Notes Submitted by John Maher on Wed, 08/22/2012 - … for Drupal covers main areas of attention in regards to security for any Drupal web administrator. 1. Upgrade to …

Security Bulletins, computers, and cars Submitted by John … Wed, 07/27/2005 - 00:00 It's been a bad week for computer security. Basically, if you use the Internet and have a …

Security Security is a cornerstone of what we do. All of our ongoing …

… Another Wednesday, another round of security updates Submitted by John Locke on Wed, 12/20/2017 - 16:10 Drupal security updates generally come out on Wednesdays, to try to streamline everybody's time. WordPress security notices come out... well, whenever whichever feed …

… Windows v Linux security: the real facts Submitted by John Locke on Fri, … on these days, here's a report comparing the relative security of Linux vs. Windows, based on an analysis of the … data that supports them. Excellent read. Windows v Linux security: the real facts | The Register Add new comment You …

… A Balancing Act? Openess and Security on Campus: Syllabus Submitted by John Locke on Wed, 04/07/2004 - 18:45 A Balancing Act? Openess and Security on Campus: Syllabus Add new comment You must have …

… Cyber/Physical security reflections, from an MIT Enterprise Forum talk … come up with something more secure than a 9-digit social security number? The Equifax hack is a problem of their own …

… Website Security Audit Our data-driven and interconnected world has … the safety of your organization’s data is a website security audit. Protecting a Company’s Data A website is an …

… Website Security Check Your organization has been around for a long … around for a long time... are you worried about expanded security threats? We understand the anxiety that comes with …

… Serious flaws in bluetooth security lead to disclosure of personal data Submitted by … on Tue, 02/10/2004 - 00:52 Serious flaws in bluetooth security lead to disclosure of personal data . Bluetooth turns out to have a number of security flaws that allow people within range to access your …

… Drupalgeddon2: Should I worry about critical security updates? Submitted by John Locke on Thu, 03/29/2018 … flaw in a web application, like yesterday's Drupal security vulnerability. And yet people still don't take … site, have this vulnerability patched, have reasonably secure hosting , and strong passwords, you're way better off …

… could masquerade as an otherwise innocent file such as a graphics file The ability to pass a file path including the … could masquerade as an otherwise innocent file such as a graphics file The ability to pass a file path including the …

… files for security reasons. Switching between trunk and a tag So far so good. We have the basics of an application set … Simple. Just check it out: cd public_html/dojo git tag # shows you a list of available tags git checkout … with your changes. Also note that when you check out a tag, you don't necessarily get a tracking branch, so don't …