Search Content

Displaying 1 - 20 of 258

… a Drupal or WordPress site. We can also assess any other PHP-based open source CMS, as long as the original source … a Drupal or WordPress site. We can also assess any other PHP-based open source CMS, as long as the original source …

… Security Updates Submitted by John Locke on Wed, 07/27/2011 - … can to stay out of trouble. We've all become accustomed to security updates on our computers. Today every operating …

… A security reminder Submitted by John Locke on Thu, 05/30/2013 … on the site fell into malicious hands. According to the security team's announcement , the attack was not a result of … on the server. Drupal has long had one of the best security track records among open source CMSs. The security …

… Submitted by John Locke on Tue, 10/25/2005 - 02:01 Voice Over IP (VoIP) is becoming a main part of the small … human visitor and to prevent automated spam submissions. … Voice Over IP (VoIP) is becoming a main part of the small …

… data is unavoidable, measures have been taken to limit login access to the servers hosting such data, and sensitive … data is unavoidable, measures have been taken to limit login access to the servers hosting such data, and sensitive …

… Data Security Resources Submitted by John Locke on Mon, 05/24/2004 … FX, Joe Grand, and Tim Mullen, Syngress 2003 Web Security, Privacy, and Commerce , by Simson Garfinkel and …

… "bluesnarfing," the practice of sniffing out your address book or calendar, making calls with your phone, and other … "bluesnarfing," the practice of sniffing out your address book or calendar, making calls with your phone, and other …

… module, but is now built in as functionality in Drupal 7. Login Rate-Limiting Drupal 7 now incorporates brute force login protection. Defaults are rate limiting for five failed …

… by the way. We still need to install a router that gives voice traffic priority, to keep the voice quality high even when somebody is sending a large …

… Security Security is a cornerstone of what we do. All of our ongoing …

… but rather because of a trademark infringement issue. The WP Vulnerability Database shows it had a back door in it … but rather because of a trademark infringement issue. The WP Vulnerability Database shows it had a back door in it …

… Windows v Linux security: the real facts Submitted by John Locke on Fri, … on these days, here's a report comparing the relative security of Linux vs. Windows, based on an analysis of the … data that supports them. Excellent read. Windows v Linux security: the real facts | The Register Add new comment You …

… A Balancing Act? Openess and Security on Campus: Syllabus Submitted by John Locke on Wed, 04/07/2004 - 18:45 A Balancing Act? Openess and Security on Campus: Syllabus Add new comment You must have …

… Compared to many of our peers, we are. We use one-time login links instead of passwords, require SSH keys for access … Compared to many of our peers, we are. We use one-time login links instead of passwords, require SSH keys for access …

… Website Security Audit Our data-driven and interconnected world has … the safety of your organization’s data is a website security audit. Protecting a Company’s Data A website is an …

… yourself from getting hacked is through awareness and education. Learn about the types of vulnerabilities that your …

… Serious flaws in bluetooth security lead to disclosure of personal data Submitted by … on Tue, 02/10/2004 - 00:52 Serious flaws in bluetooth security lead to disclosure of personal data . Bluetooth turns out to have a number of security flaws that allow people within range to access your …

… cheese. WordPress core has a reasonably competent security team watching over it. But the > 54,000 plugins available in the WP repository? You're on your own. The security team might handle working with a plugin author if they get … seriously. Compared to WordPress, the Drupal security team covers not just Drupal core, but also thousands of …

… I never check this symlink into the Dojo git config--I just manage it in the main project. But regardless … file from the submodule path. I set a constant in a config file that I keep outside version control (though I keep a model config file in the project root to track any changes to the …