Search Results

Search found 20283 results on 812 pages for 'security context'.

Page 441/812 | < Previous Page | 437 438 439 440 441 442 443 444 445 446 447 448  | Next Page >

  • Mozilla étend son programme de recherche de failles à ses applications web, 3000 $ offerts pour un bogue "extraordinaire"

    Le programme de Mozilla récompensant les découvertes de failles de sécurité étendu aux applications web, 3000$ offerts pour un bug "extraordinaire" Maj du 16/12/10 C'est une nouvelle qui va faire plaisir aux petits génies de la sécurité informatique : Mozilla vient d'agrandir son programme Security Bug Bounty. Jusqu'à maintenant, 3000 dollars étaient promis à quiconque dénicherait et rapporterait des failles critiques dans Firefox. Mais la Fondation va plus loin : ses applications web sont désormais concernées par cette mesure : "Nous voulons encourager la découverte de problèmes de sécurité au sein de nos web applications, dans le but de pr...

    Read the article

  • Multiple vulnerabilities in libexif

    - by Umang_D
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-2812 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 6.4 libexif Solaris 11 11/11 SRU 12.4 CVE-2012-2813 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 6.4 CVE-2012-2814 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 7.5 CVE-2012-2836 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 6.4 CVE-2012-2837 Numeric Errors vulnerability 5.0 CVE-2012-2840 Numeric Errors vulnerability 7.5 CVE-2012-2841 Numeric Errors vulnerability 7.5 CVE-2012-2845 Numeric Errors vulnerability 6.4 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Why do we need private variables?

    - by rak
    Why do we need private variables in classes in the context of programming? Every book on programming I've read says this is a private variable, this is how you define it but stops there. The wording of these explanations always seemed to me like we really have a crisis of trust in our profession. The explanations always sounded like other programmers are out to mess up our code. Yet, there are many programming languages that do not have private variables. What do private variables help prevent? How do you decide if a particular of properties should be private or not? If by default every field SHOULD be private then why are there public data members in a class? Under what circumstances should a variable be made public?

    Read the article

  • Without using a pre-built physics engine, how can I implement 3-D collision detection from scratch?

    - by Andy Harglesis
    I want to tackle some basic 3-D collision detection and was wondering how engines handle this and give you a pretty interface and make it so easy ... I want to do it all myself, however. 2-D collision detection is extremely simple and can be done multiple ways that even beginner programmers could think up: 1.When the pixels touch; 2.when a rectangle range is exceeded; 3.when a pixel object is detected near another one in a pixel-based rendering engine. But 3-D is different with one dimension, but complex in many more so ... what are the general, basic understanding/examples on how 3-D collision detection can be implemented? Think two shaded, OpenGL cubes that are moved next to each other with a simple OpenGL rendering context and keyboard events.

    Read the article

  • Should I keep separate client codebases and databases for a software-as-a-service application?

    - by John
    My question is about the architecture of my application. I have a Rails application where companies can administrate all things related to their clients. Companies would buy a subscription and their users can access the application online. Hopefully I will get multiple companies subscribing to my application/service. What should I do with my code and database? Seperate app code base and database per company One app code base but seperate database per company One app code base and one database The decision involves security (e.g. a user from company X should not see any data from company Y) performance (let's suppose it becomes successful, it should have a good performance) and scalability (again, if successful, it should have a good performance but also easy for me to handle all the companies, code changes, etc). For the sake of maintainability, I tend to opt for the one code base, but for the database I really don't know. What do you think is the best option?

    Read the article

  • Navigation for ASP.NET Web Forms project published on codeplex

    Navigation for ASP.NET Web Forms manages movement and data passing between aspx Pages in a unit testable manner. There is no Client-side logic, so it works in all browsers, and no Server-side cache, so it works with the browser back button.Features include loosely coupled Pages, typed data passing, empty code-behinds, context-sensitive bread crumb trail, ASP.NET Data binding integration, automatic ASP.NET Ajax history navigation and many more.The source code, binaries and comprehensive documentation...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Generating SQL Server Test Data with Visual Studio 2010

    As a database developer or tester sometimes you need to have production like data in your environment for your development or testing, but you cannot have the production data because of security and privacy issues. So how you can generate test data or replicate similar data as in production for your development or test environment? Join SQL Backup’s 35,000+ customers to compress and strengthen your backups "SQL Backup will be a REAL boost to any DBA lucky enough to use it." Jonathan Allen. Download a free trial now.

    Read the article

  • Is there a phrase or word to describe an algorithim or program is complete in that given any value for its arguments there is a defined outcome?

    - by Mrk Mnl
    Is there a phrase or word to describe an algorithim or programme is complete in that given any value for its arguments there is a defined outcome? i.e. all the ramifications have been considered whatever the context? A simple example would be the below function: function returns string get_item_type(int type_no) { if(type_no < 10) return "hockey stick" else if (type_no < 20) return "bulldozer" else return "unknown" } (excuse the dismal pseudo code) No matter what number is supplied all possibiblites are catered for. My question is: is there a word to fill the blank here: "get_item_type() is ______ complete" ? (The answer is not Turing Complete - that is something quite different - but I annoyingly always think of something as "Turing Complete" when I am thinking of the above).

    Read the article

  • Development methodology for single web developer?

    - by CaseTA
    I'm a web developer who mostly works with the LAMP stack when it comes to my own projects. Most of the time I just start coding on a project and fixing bugs and adding features as I go along. Often I'll try to use an existing solution such as Wordpress or Drupal. Now that I'm thinking of creating my own web application with businesses as the target group, I feel there's a need for proper analysis and design. Something lightweight for a one person project and still solid enough to handle requirements, user interfaces, security, etc. If you could recommend methodologies and literature I would be grateful.

    Read the article

  • Is there a way to sync my laptop's Ubuntu install with a jumpdrive Ubuntu install?

    - by trezy
    So I'm doing a fresh install of Ubuntu on my laptop right now. I also have a jumpdrive with Ubuntu installed on it with a persistent setup. What I would like is to be able to plug the jumpdrive into my laptop and have the installs sync certain data. I don't want docs and such to sync of course, but I would like some software to sync with installs and updates, mostly security and recovery stuff. Here's an example of what I would like to happen: I already have TestDisk installed on my jumpdrive but I haven't booted the drive in a while. I plug it in to my laptop where TestDisk has been updated and Wireshark has been installed. I would like the jumpdrive to check to see what has changed on the laptop install (in this case TestDisk has updated and Wireshark has been installed) and make those changes to the jumpdrive. Is there any kind of software to do that?

    Read the article

  • Tables and Views for Auditing SQL Server Logins

    I have been tasked with auditing security on my SQL Server. However, this needs to be a somewhat automated process as I don't want to have to rely on taking screenshots every month to satisfy our auditors. What tables and/or views should I be using and what's the best way to extract the information out of them? Too many SQL Servers to keep up with?Download a free trial of SQL Response to monitor your SQL Servers in just one intuitive interface."The monitoringin SQL Response is excellent." Mike Towery.

    Read the article

  • Which language unifies OOP, both RPC call and Message passing a la Smalltalk, and more ...

    - by user310291
    I hate software editors who pretend to know better what you need and choose for you. Java and c# pretend multiple inheritance is dangerous. That I agree I often use Interface but in some cases I may need multiple inheritance : why not let me choose ? Also today you have to choose between RPC call à la Java and Message passing à la Objective C. Again can't I choose when one or the other is more practical ? So is there any language on earth which will free me from what I want to choose to use dependending on MY context and MY own judgement ?

    Read the article

  • How can you procedurally place objects in a non-gridded game?

    - by nickbadal
    This is a follow-up question to this question. I mistakenly worded the question, but got a good answer before I could correct myself, so I didn't want to delete it. Sorry! Now that I know that it is possible, I'd like to implement procedural world generation, but I don't want it to look gridded or blocky, where everything is obviously placed on an integer grid. I know that you can do this in gridded worlds by inputting a square's x and y into a noise function, or similar, but how can I generate a more natural looking object placement using procedural methods? This is in the context of an adventure game, if it matters.

    Read the article

  • Retrieve the coordinates of the *occluding* (closest/drawn) pixels during 3D overlap, using OpenGL?

    - by Big Rich
    Hi, Sorry if the question is not worded well, I'm a new to both 3D and OpenGL. How could I go about obtaining the 3D coordinates of the occluding object, at the point where occlusion is happening (i.e. the 'intersection' of the object in front/closest to the screen)? Just to offer a [very] rudimentary, visual, example, if you were to form an index-finger cross, with your right hand closest to your face, I'd like to know the coordinates of the part of your right finger which obscures the other finger (obviously back within the OpenGL context - no jokers ;-) ). If there is a way to find out both about the occluder (hider) and the occluded (hidden) objects in OpenGL, then that would be of great use, also. Cheers Rich

    Read the article

  • Open a popup window from Silverlight

    - by Emanuele Bartolesi
    Silverlight has a method called HtmlPage.PopupWindow() that opens new web browser window with a specific page. You can find this method in the namespace System.Windows.Browser. If you haven’t in your project, add a reference to System.Windows.Browser. The method HtmlPage.PopupWindow() has three parameters: Uri – location to browse String – the target window HtmlPopupWindowOptions – a class with the window options (full list of properties http://msdn.microsoft.com/en-us/library/system.windows.browser.htmlpopupwindowoptions(v=vs.95).aspx) For a security reason of Silverlight the call to HtmlPage.PopupWindow() is allowed through any user input like a button, hyperlink, etc. The code is very simple: var options = new HtmlPopupWindowOptions {Left = 0, Top = 0, Width = 800, Height = 600}; if (HtmlPage.IsPopupWindowAllowed) HtmlPage.PopupWindow(new Uri("http://geekswithblogs.net/"), "new", options); The property IsPopupWindowAllowed is used to check whether the window is enabled to open popup.

    Read the article

  • Changing location after CommitAnimations

    - by Will Youmans
    I'm using the following code to move a UIImageView: shootImg.image = [UIImage imageNamed:@"Projectile Left 1.png"]; [UIView beginAnimations:nil context:nil]; shootImg.center = CGPointMake(shootImg.center.x+1000, shootImg.center.y); [UIView commitAnimations]; This works but what I want to do is after [UIView CommitAnimations]; I want to set the location of shootImg using CGPointMake. If I just put it after commitAnimations then the animation doesn't fully complete. Any suggestions? I'm not using any frameworks like cocos2d and if you need to see any more code just ask.

    Read the article

  • How list of references are represented in UML and does that break any DDD rules ?

    - by Rushino
    Hello, How a list of references are represented in UML ? Example : a Calendar contain a list of phases which contain a list of sequences which contain a list of assignations Calendar is root because phases and sequences and assignations only work in context of a calendar. But assignations must hold multiple references to groups of students. (Must work two sides) Would like to know if its possible to hold multiple references of an aggregate root (groups) inside another aggregate root (calendar) member ? Also how a list of references are represented in UML ? it is a simple relation ? Also does this break any rules in DDD domain ? Thanks.

    Read the article

  • Multiple vulnerabilities in Pidgin

    - by RitwikGhoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2010-4528 Improper Input Validation vulnerability 4.0 Pidgin Solaris 10 SPARC: 147992-02 X86: 147993-02 CVE-2011-1091 Denial of service(DOS) vulnerability 4.0 CVE-2011-2943 Denial of service(DOS) vulnerability 4.3 CVE-2011-3184 Resource Management Errors vulnerability 4.3 CVE-2011-3185 Improper Input Validation vulnerability 9.3 CVE-2011-4601 Improper Input Validation vulnerability 5.0 CVE-2011-4602 Improper Input Validation vulnerability 5.0 CVE-2011-4603 Improper Input Validation vulnerability 5.0 CVE-2011-4922 Information Exposure vulnerability 2.1 CVE-2011-4939 Permissions, Privileges, and Access Controls vulnerability 6.4 CVE-2012-1178 Resource Management Errors vulnerability 5.0 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Ubuntu 12.04 on Vm Player showing Wired Network Instead of Wireless Network

    - by Fak365
    I am new to Ubuntu, recently I installed ubuntu 12.04 in Vm Player (Virtual Machine) on my Dell laptop having windows 7 ultimate 32 bit for just to check the security of my wireless network and want to crack the WiFi (WPA-PSK) password but in ubuntu it does not show the wireless network it shows the 2 arrow sign as i have not connect the ethernet cable to my laptop and connected through WiFi on my main OS (windows 7) but it shows the wired network and internet is working but it does not show wifi connection. On windows 7 WiFi is connected and showing the WiFi connection and working correctly.But my main motive is to crack the WiFi password as it can't detect WiFi network so what to do? Please Help.!!thanks My Laptop Specification : Laptop : Dell Latitude D620 OS : Windows 7 Ultimate 32 bit Processor : Core Duo 2 T7200 @ 2Ghz Ram : 2 GB WiFi card : Intel Pro/Wireless 3945 ABG Virtual Machine : Vm Player V 5.0.1 If Need to Install Drivers Please Give Me Full Information how to install and which driver I should install. Thanks In Advance.

    Read the article

  • Developing gnome shell extensions with eclipse as a IDE

    - by GAP
    I would like to know whether any body has used Eclipse JavaScript support for developing gnome-exensions. Actually aiming here for the context support which is available in eclipse. And i though if i could add all the java scripts that a extension is inheriting (base scrips) in to a user library, then i could included it as a dependency in my extension project. Have any once done this already ? Does all the methods that are used in a exentions exist in the base scripts ? In what directories does the base scripts exist ? So far i tried adding the scripts in the following directory but still i have error when i try to look at the journal gnome extension code. /usr/share/gnome-shell/js /usr/share/gjs-1.0 Thanks

    Read the article

  • The life saver HttpContext.Current.Items["ParameterName"]

    - by MoezMousavi
    I got stocked passing parameter to one master page for some reasons, seems the page lifecycle and dynamic loading of the master pages has got some issues with defining public properties in the masterpage within my project. It did not set my values and as a result, properties became useless. A collegue just mentioned using HttpContext. have a look what  MSDN saying "Encapsulates all HTTP-specific information about an individual HTTP request" http://msdn.microsoft.com/en-us/library/system.web.httpcontext.aspx HttpContext.Current.Items["ParameterName"] Also, Page.Items could do the same thing. Page.Items, "Gets a list of objects stored in the page context" http://msdn.microsoft.com/en-us/library/system.web.ui.page.items.aspx as your master page and content page are rendered as a single document anyway.

    Read the article

  • Is there a ppa or repository where we can update LibreOffice to version 3.6?

    - by josircg
    On http://www.libreoffice.org/download/ there is only RPM version - when great majority of Desktop Linux users are using systems based on APT... ppa:libreoffice/ppa seems to be very outdated with version 3.5 It's frustating to see several fixes on Windows version and Ubuntu versions so outdated... People generally reply as: we don't update due to security/stability reasons, etc example 1 example 2 why don't you compile yourself ? For those easy answers, I generally reply: let me decide which version to use at my own risk. I just want to try a newer version and I trust on LibreOffice devs. I understand that update a core lib is very dangerous but Libreoffice is an user application and it don't just break the whole system. Why don't I compile ? Because I am a regular user and don't have time to learn it. I would love to have this time but unfortunately, I don't have. Red Hat/Fedora guys have the same concerns but they update their LibreOffices...

    Read the article

  • How secure is KeePassX?

    - by Uli
    I have hundreds of passwords, since I use a different random one for each website/service. They are all generated & stored with KeePassX, which can be synced to different computers and my android phone via dropbox (or ubuntuone). I know the database of KeePassX is secure (at least with a good passphrase). But what about when I am copying the password into the clipboard (where it is stored for 5 seconds)? Can any program running in user-space access the clipboard and store the password? If so, how big of a security risk is this?

    Read the article

  • SQL Injection: How it Works and How to Thwart it

    This is an extract from the book Tribal SQL. In this article, Kevin Feasel explains SQL injection attacks, how to defend against them, and how to keep your Chief Information Security Officer from appearing on the nightly news. NEW! The DBA Team in The Girl with the Backup TattooPina colada in the disk drives! How could any DBA do such a thing? And can the DBA Team undo the damage? Find out in Part 2 of their new series, 5 Worst Days in a DBA’s Life. Read the new article now.

    Read the article

  • What are the Characteristics of a Software "Center of Excellence" (CoE)?

    - by Randy
    Recently a new director of my department came in and expressed his wish that we become a "center of excellence". I expected that since he is my first boss who actually has a programming background that there would be some description of this. However, it was left at that. As I reflected on this over the last few days, I am coming up empty on what a CoE actually means beyond just "being effective" at delivering the product. Here are the main items I am struggling with: Is this just a term that is thrown around by management types? What qualities make a group of software developers and testers excellent? How do you measure excellence in this context?

    Read the article

< Previous Page | 437 438 439 440 441 442 443 444 445 446 447 448  | Next Page >