Search Results

Search found 16163 results on 647 pages for 'advanced security'.

Page 386/647 | < Previous Page | 382 383 384 385 386 387 388 389 390 391 392 393  | Next Page >

  • Get the Google Analytics page views for a directory [closed]

    - by Michael Morisy
    I have a blog network set up with the following schema: Blogs: example.com/blog-1/ example.com/blog-2/ example.com/blog-3/ Posts: example.com/blog-1/great-post.html example.com/blog-1/cool-post.html example.com/blog-1/alright-post.html example.com/blog-2/awesome-post.html example.com/blog-2/interesting-post.html example.com/blog-2/dull-post.html example.com/blog-3/another-post.html example.com/blog-3/favorite-post.html I'm trying to get active page views in Google Analytics for each blog, so all example.com/blog-1/*. To this, I created an advanced segment in Analytics: Page starts with /blog-1/ This works, but it also pulls in any page on my site that links to that blog. Any suggestions to just get pages with those blogs.

    Read the article

  • Looking for a simple CMS with WYSIWYG and image gallery

    - by abeger
    I'm building a new site that consists entirely of: 8-10 pages of static content that rarely changes (like once every few months or once every year) An image gallery Since I don't plan to be the primary maintainer of the site, I'd like to use a CMS with some security and a WYSIWYG editor so non-web-savvy people can tweak the site when necessary. I started out using Drupal, but started wondering if it was overkill. So, two questions: 1) is it overkill? 2) What CMS would you recommend for a project this simple?

    Read the article

  • "Clear Text Credential Access Enabled" field

    - by Dave
    Searching for answers about the "Clear Text Credential Access Enabled" field, I found a question on an oracle forum that was my exactly what I was trying to find out. Thinking that my answer would soon be found, I happily click on the link only to find zero replies. All hope was lost. I am posting the question here, hoping that someone on this site will know the answer. Can somebody please explain the usage of "Clear Text Credential Access Enabled" checkbox under "-Security-Advanced tab for Weblogic 11g? What is the difference if we set or unset this flag? If I dont set this flag I get an exception like "Access to sensitive attribute in clear text is not allowed due to the setting of ClearTextCredentialAccessEnabled attribute in SecurityConfigurationMBean" when I try to set a value for the "Credential" field. But what should be the value for "Credential" field if I dont set the "Clear Text Credential Access Enabled"flag?

    Read the article

  • php joomla session lifetime settings

    - by jtanmay
    I have searched through the google and also joomla forums but didn't got what exactly I was looking for. My main purpose is to set the joomla session live for ever. Many forums says its not good to keep a higher value (security issues) but I don't want to consider that right now. My question is : What if I set the session lifetime value to "0" (Zero), will the session be active for ever? or the user will NOT be able to login completely? Thanks, Tanmay

    Read the article

  • SOAP vs REST (differences)

    - by Abdulaziz
    I have read articles about the differences between SOAP and REST as a web service communication protocol, but I think that the biggest advantage for REST over SOAP are : REST is more dynamic, no need for creating and updating UDDI. REST is not restricted to XML format. REST web services can send plain text, JSON, and also XML. But SOAP is more standardized (Ex; security). So, am I correct in these points? Thanks

    Read the article

  • load and execute assembly from arbitary directory

    - by bitbonk
    How can I load, reflect on and then instanciate types of an assembly that is in an arbitary directory on the system using Assembly.Load or similar without having to modify any security settings for the runtime on the machine. The user should be able to specify the name and location at runtime.

    Read the article

  • Business Units vs Teams in CRM 2011

    - by GuruJ
    I've been told a few times that Business Units in CRM 2011 are "tricky" and shouldn't be set up lightly since they have irreversible consequences for a CRM 2011 implementation. On the other hand, teams in CRM 2011 seem much more flexible in managing record security. For what reason would I still choose to set up Business Units in CRM 2011? What can I do with Business Units that I can't with Teams (and vice versa)?

    Read the article

  • Knowing the user name in a Page

    - by ctacke
    Let's assume the following: I have an IIS web site set up IIS is configured to use Digest authentication I'm running an ASP.NET page The page has a code-behing assembly that overrides Page_Load When a user navigates to that page, I get a security prompt for the username and password. If the username and password are invalid (i.e. incorrect password) is there a way for the called page, in Page_Load to know, or does IIS handle this and return the 401 before the ASP.NET engine ever gets around to resolving the actual Page class that will get executed?

    Read the article

  • session fixation

    - by markiv
    Hi All, I am new to web development, and trying to get a hold on security issues. I went through this article on http://guides.rubyonrails.org/security.html these are some of the steps the author has mentioned how an attacker fixes session. 1. The attacker creates a valid session id: He loads the login page of the web application where he wants to fix the session, and takes the session id in the cookie from the response (see number 1 and 2 in the image). 2. He possibly maintains the session. Expiring sessions, for example every 20 minutes, greatly reduces the time-frame for attack. Therefore he accesses the web application from time to time in order to keep the session alive. 3. Now the attacker will force the user’s browser into using this session id (see number 3 in the image). As you may not change a cookie of another domain (because of the same origin policy), the attacker has to run a JavaScript from the domain of the target web application. Injecting the JavaScript code into the application by XSS accomplishes this attack. Here is an example: <script>?document.cookie="_session_id=16d5b78abb28e3d6206b60f22a03c8d9";?</script>. Read more about XSS and injection later on. 4. The attacker lures the victim to the infected page with the JavaScript code. By viewing the page, the victim’s browser will change the session id to the trap session id. 5. As the new trap session is unused, the web application will require the user to authenticate. 6. From now on, the victim and the attacker will co-use the web application with the same session: The session became valid and the victim didn’t notice the attack. I dont understand couple of points. i) why is user made to login in step5, since session is sent through. ii) I saw possible solutions on wiki, like user properties check and others why cant we just reset the session for the user whoever is login in when they enter username and password in step5? Thanks in advance Markiv

    Read the article

  • User permission check steps in CakePHP

    - by bancer
    I want to understand the sequence of steps how it is verified that a user has permission to particular application page ('Acl', 'Auth', 'Security' components are used). For example, a visitor clicks a link on another site that directs him to my application. What is the sequence of steps that my application does to verify that this user has access to the page? What controllers and methods are called?

    Read the article

  • Use Network Services for FDT

    - by WillDonohoe
    Hi everybody, I've recently started using FDT, for a while I was using FlashDevelop, it had a really handy feature in Compiler options where you can set UseNetworkServices to false which would stop the compiled swf from connecting to the internet and became very useful for running standalone flash apps without security warnings when loading in an external xml file etc. Does anybody know if FDT has a similar function? If there isn't a way, then no worries, I can compile the project in Flash Develop, however it would be best if I can do it from FDT. Cheers guys, Will

    Read the article

  • Remote desktop disabled until an user has logged on

    - by Magnetic_dud
    How do I prevent this? I thought it was due to my antivirus login protection (as can bee seen below) but I have now uninstalled it and the problem remains. Old question: Hi, i am using Rising Antivirus, free version. It has many advanced functionalities, including a "logon protection" that assures the protection of the password, or pre-logon protection. Unfortunately, that disables remote desktop connection until an user has logged on. (user log on, disconnect, then you can connect) I hate this behaviour, someone knows how to disable this function? (ok, i could create a limited user that autologons and then autodisconnects, but i don't like this approach)

    Read the article

  • Outlook 2010 Folder Structure Search

    - by SaUce
    I work at a helpdesk and today I received a call from a user who lost a folder in Outlook. When I connected to the user's PC, I discovered that the user has several hundreds of folders. She had the same name folder in several different locations. When we used Advanced Find we found the messages. It said that messages are located in folder X. The only problem was, we could not locate the folder X in the list. Does anyone know of any way to quickly and easily browse all the folders or look up a folder in Outlook 2010?

    Read the article

  • Can't delete profile

    - by generic_noob
    Hi All, I have a client machine (XP SP3) which used to be connected to a windows 2003 domain, but the server has since gone down due to a hard drive failure, however the profiles still remain in 'documents and settings'. I have a local admin account on the same machine (in the administrator's group), except when i try to remove the profiles manually from System Properties - Advanced - User Profiles - Settings, the delete button is disabled. Also, Windows prevents me from deleting or renaming the user's profile folder as well, due to a lock with ntuser.dat Any thoughts on this would be greatly appreciated, Cheers!

    Read the article

  • Best Java obfuscator ?

    - by Xinus
    I am developing a security software and want to obfuscate my java code so it will become impossible to reverse engineer. What is the most reliable java obfuscator ?

    Read the article

< Previous Page | 382 383 384 385 386 387 388 389 390 391 392 393  | Next Page >