Search Results

Search found 4187 results on 168 pages for 'secure erase'.

Page 78/168 | < Previous Page | 74 75 76 77 78 79 80 81 82 83 84 85  | Next Page >

  • LazyTruth Puts Fact Checks Email Forwards Right in Your Inbox

    - by Jason Fitzpatrick
    If you get a lot of forwards from well meaning relatives and want to instantly and effortlessly verify their content, LazyTruth is a Chrome extension that fact-checks forwarded emails in Gmail. It’s a rather novel concept: install LazyTruth and anytime you get a forwarded email you’re one click away from instant fact checking. LazyTruth checks keywords in the email against FactCheck.org and Politifiact (Snopes.com missing seems like a big oversight, hopefully they’ll be adding it soon). LazyTruth is currently Gmail/Chrome only. Hit up the link below to grab a copy. LazyTruth [via O'Reilly Radar] How To Delete, Move, or Rename Locked Files in Windows HTG Explains: Why Screen Savers Are No Longer Necessary 6 Ways Windows 8 Is More Secure Than Windows 7

    Read the article

  • How to get CEdit to scroll properly?

    - by CSharperWithJava
    I have a CEdit control that's used to display a diagnostics output. Sometimes the data overflows the screen size, so naturally I set the Vertical Scroll property to true (MFC dialog editor). But then, when I tried to scroll the text that was in the window before isn't cleared and the new text is written over it. The result is a big mess of everything I have scrolled past. I've looked for a draw background property or something similar that will erase everything in the window while scrolling (before redrawing the new data). Any suggestions?

    Read the article

  • BCS with Visual Studio 2010

    - by Sahil Malik
    Ad:: SharePoint 2007 Training in .NET 3.5 technologies (more information). BCS or Business Connectivity services is a new and much improved, and much much enhanced version of what used to be BDC in SharePoint 2007. It allows external data to be surfaced inside of SharePoint. But compared to BDC, it comes with much richer a) Presentation options – in both server and client. b) Tooling support – In SharePoint designer and Visual Studio c) Connectivity options – in conjunction with the secure store service. In my newest article on BCS, I talk about BCS in SharePoint 2010 with Visual Studio 2010. Hope you like it. There is also a whole chapter (Chapter #9) devoted to BCS in my book. Comment on the article ....

    Read the article

  • Why doesn't the command do-release-upgrade doesn't require sudo?

    - by Dr_Bunsen
    I was wondering why the command do-release-upgrade doesn't require sudo? I mean, it does significantly change your system, so I would have guessed it requires sudo. This is from ubuntu self, but it isn't that helpful. I just want to know how this is secure for the integrity for my system, if every user can access this command. Thanks in advance. [EDIT]: I used a new terminal window, thus no sudo that wasn't expired yet, and I used the command do-release-upgrade NOT sudo do-release-upgrade.So even with unexpired sudo I should be unable to upgrade. [EDIT 2]:

    Read the article

  • Slow Motion Egg Destruction [Video]

    - by Jason Fitzpatrick
    We’ve said it before and we’ll say it again: everything is better in slow motion. In this instance it’s twenty two eggs made interesting by meeting their demise in a variety of ways. Of all the egg smashes in the video, we’re particularly fond of the tennis racket segment. Have a cool slow-mo video to share? Throw a link in the comments! Slo-As-A-Mofo-Sho – Egg Destruction [via Boing Boing] How To Delete, Move, or Rename Locked Files in Windows HTG Explains: Why Screen Savers Are No Longer Necessary 6 Ways Windows 8 Is More Secure Than Windows 7

    Read the article

  • Clone a div that contains "customized" jQueryUI datePicker

    - by Enrique
    I have a div that contains 3 fields You can see the image here http://imgur.com/A3tbd.jpg I'm cloning this div with this plugin http://sroucheray.org/blog/demos/jquery-dynamic-form/ My problems are: It doesn't clone correctly datePicker. I'm using validate form plugin, but I guess this plugin is not prepared to validate cloned elements Is there any easy code, other plugin or some functions I should use for doing this sequence? Verify user has filled the 3 fields of the actual div If so, clone the div and create a new set of 3 fields. Also, clone datePicker correctly If user clicks the delete button, erase last div (last 3 fields) When form submitted, post all fields correctly Thanks,

    Read the article

  • in asp.net linking two webpages and one of them has emails which an user can select who they want to

    - by user305112
    I have two pages in the first page i have a button called emails. when the user clicks on the email button it will take them to the emails pages and there i have 12 checkboxes and a OK button. the user can select as many checkboxes as they want. the checkboxes have peoples email in them. after they select it they click on the OK button and which will take them to the page1.aspx where they will fill rest of the information out and when they clicked on the emails button and came back to the page1 it will not erase any of their information. I have redirected the page to emails and back to page1 but i don't know how to save the checked emails from the emails page and clicking OK and taking back to the page1 so the other information on that page is already there not been erased.

    Read the article

  • Tempescope Displays Weather by Recreating It

    - by Jason Fitzpatrick
    Yesterday we showed you an umbrella stand that signals raining/clear skies by color, today we have something even more interesting: an ambient desktop weather station that recreates the outside weather. The Tempescope pulls down the current weather report from Weather Underground’s API and feeds it to an Arduino board which in turn controls the device. When it’s raining, it pumps water down to simulate rain in the chamber. When there is lightening, LEDs flash. When there is cloud cover, an ultrasonic generator creates a fine mist inside the cylinder. Finally, on sunny days the entire thing glows warmly. To say that we want one would be an understatement. Hit up the link below to read more about the project, the display modes, and to peek inside the device. Prototyping “Tempescope”, An Ambient Weather Display [via Hack A Day] How To Delete, Move, or Rename Locked Files in Windows HTG Explains: Why Screen Savers Are No Longer Necessary 6 Ways Windows 8 Is More Secure Than Windows 7

    Read the article

  • Maximum file size for iFrame in IE7

    - by Peter Turner
    I've got a "super secure" javascript downloader* that I wrote, and it usually works alright. But I noticed, while trying to download a 90 meg file with it on a client's machine that on IE7, it's getting hung up about 1/3rd of the way through. I've never tried to send a file that large through the iFrame and it works fine in other browsers. Is there a size restriction on files that IE7 can read in an iFrame? * It's really just a PHP line that sets header("location: http://someplace/downloadbigthing.exe"); after it does some logging and verification.

    Read the article

  • How to Configure/Install HotSpotShield?

    - by user7044
    How to Configure/Install HotSpotShield under Ubuntu 11.04; Are there any other OpenSource VPN thru which we can see sites like www.hulu.com which are restricted outside of USA especially thru ubuntu 11.04+. Let me put this way, I wanted surf web securely by having dedicated secure VPN and I want keep the server at a centralized place. I usually travel in and out of USA; Currently I would like to try out home grown solution or open source service. Refer (The below sites says about installation and configuration) http://www.kalvster.com/tools/vpn-ubuntu-hotspot-shield.html http://www.youtube.com/watch?v=Njp--ZOEUfA

    Read the article

  • Protect js code from being stolen

    - by Kaidul Islam Sazal
    I have developed an web app with jquery,html-css markup which would be an premium web app. So I have to ensure the security of the code from being stolen.But as all these are client side,so there is no 100% secure way to protect them.But I want to make them harder to steal.For this I did : I have disabled the right click button of mouse I have minified and obfuscated the code. I have used js code to add external js file and obfuscated the code so that none can understand the name of the external js file I have created a index.html file in the js folder so that none can get access the js folder Do you think all these are enough to make stealing harder? Or any suggestion/advice for me?

    Read the article

  • List of eCommerce sites that use end-to-end SSL?

    - by Jon Schneider
    My development team is considering implementing an eCommerce site using end-to-end SSL -- that is, every page on the site is accessed via an https:// URL -- rather than the more traditional "mixed mode" where most pages are accessed via http:// and only "secure" pages such as login and credit card entry are redirected to https://. Pros of doing such a "pure SSL" approach include avoidance of some session-hijacking attacks such as Firesheep; cons include performance considerations. My question is: Is anyone aware of a list of eCommerce websites (especially USA-based sites), or even specific websites, that use this end-to-end SSL approach? I'm especially interested in "regular" eCommerce sites rather than banks or other "financial" sites.

    Read the article

  • FigurePrint Brings Your Minecraft Creations to Life

    - by Jason Fitzpatrick
    If you love Minecraft so much you wish your finest creations could sit on your desk, FigurePrint is happy to oblige with a little 3D printing magic. Using their helper app you can export a section of your Minecraft world, big or small, upload it to their servers, and receive a full-color 3D printed model of it in the mail. The pricing is based on the size and complexity of model. Hit up the link to read more about their Minecraft printing services (as well as their Xbox Live avatar printing and World of War Craft printing). FigurePrint: Minecraft [via Wired] How To Delete, Move, or Rename Locked Files in Windows HTG Explains: Why Screen Savers Are No Longer Necessary 6 Ways Windows 8 Is More Secure Than Windows 7

    Read the article

  • Installed UBUNTU12.04 in Legacy, when changed to UEFI just runs the Terminal, not GUI

    - by jraulvc
    Well, I installed Ubuntu 12.04 in a Gateway NE 522 with Windows 8. First, I had to install it in Legacy mode, because in UEFI it would not run the bootable USB. In the Legacy mode it runs perfect. Once done that with help of the "Boot-Repair" I changed it to the UEFI and disabled the secure boot mode. GRUB runs fine but when I run ubuntu I get the following message: microcode: failed to load file amd-ucode/microcode_amd_fam16h.bin kvm: disabled by bios kvm: disabled by bios kvm: disabled by bios and then I just get access to the terminal. From there, I have already tried with reinstalling unity and gmd. When I try to install amd64-microcode the same error ocurrs ( microcode: failed to load file amd-ucode/microcode_amd_fam16h.bin ) by the "updating the microcode on all online processors..." phase of the installation. Can somebody tell me how can I recover the graphical interphase of ubuntu from the terminal? Thanks a lot

    Read the article

  • How to Access Your Router If You Forget the Password

    - by Chris Hoffman
    Routers protect their web interfaces, where you can configure their networking, parental control, and port forwarding settings, with a username and password. These default passwords can be changed to protect the router’s settings. If you’ve forgotten a router’s password – or if you acquired a used router and don’t know its password – there’s a way to reset the password. You may also be able to forward ports without knowing the password. Image Credit: tnarik on Flickr How to Access Your Router If You Forget the Password Secure Yourself by Using Two-Step Verification on These 16 Web Services How to Fix a Stuck Pixel on an LCD Monitor

    Read the article

  • How to learn what the industry standards/expectations are, particularly with security?

    - by Aerovistae
    For instance, I was making my first mobile web-application about a year ago, and half-way through, someone pointed me to jQuery Mobile. Obviously this induced a total revolution in my app. Rewrote everything. Now, if you're in the field long enough, maybe that seems like common knowledge, but I was totally new to it. But this set me wondering: there are so many libraries and extensions and frameworks. This seems particularly crucial in the category of security. I'm afraid I'm going to find myself doing something in a professional setting eventually (I'm still a student) and someone's going to walk over and be like, My god, you're trying to secure user data that way? Don't you know about the Gordon-Wokker crypto-magic-hash-algorithms library? Without it you may as well go plaintext. How do you know what the best ways are to maximize security? Especially if you're trying to develop something on your own...

    Read the article

  • Replacing text in NSTextFieldCell inside NSTableView

    - by earl.ct
    Whenever a user would type a number, my app would automatically prepend a currency sign before that number. For example, when the user types "1" in a text field, the text inside it becomes "$1.00". All is good when I use an NSNumberFormatter, an NSTextField, and its delegate method control:didFailToFormatString:errorDescription:. - (BOOL)control:(NSControl *)control didFailToFormatString:(NSString *)string errorDescription:(NSString *)error { if ([[control formatter] isKindOfClass:[NSNumberFormatter class]]) { NSNumberFormatter *formatter = [control formatter]; if ([formatter numberStyle] == NSNumberFormatterCurrencyStyle && ! [string hasPrefix:[formatter currencySymbol]]) { NSDecimalNumber *new = [NSDecimalNumber decimalNumberWithString:string]; if (new == [NSDecimalNumber notANumber]) { new = [NSDecimalNumber zero]; } [control setObjectValue:new]; } } return YES;} Now I would like to have this functionality when a user types a number in a cell inside an NSTableView. I tried using control:didFailToFormatString:errorDescription: but the cell would erase the text instead.

    Read the article

  • Forbes Article on Big Data and Java Embedded Technology

    - by hinkmond
    Whoa, cool! Forbes magazine has an online article about what I've been blogging about all this time: Big Data and Java Embedded Technology, tying it all together with a big bow, connecting small devices to the data center. See: Billions of Java Embedded Devices Here's a quote: By the end of the decade we could see tens of billions of new Internet-connected devices... with billions of Internet- connected devices generating Big Data, are the next big thing. ... That’s why Oracle has put together an ecosystem of solutions for this new, Big Data-oriented device-to-data center world: secure, powerful, and adaptable embedded Java for intelligent devices, integrated middleware... This is the next big thing. Java SE Embedded Technology is something to watch for in the new year. Start developing for it now to get a head-start... Hinkmond

    Read the article

  • What Is Disk Fragmentation and Do I Still Need to Defragment?

    - by Jason Fitzpatrick
    Do modern computers still need the kind of routine defragmentation procedures that older computers called for? Read on to learn about fragmentation and what modern operating systems and file systems do to minimize performance impacts. Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-drive grouping of Q&A web sites. Secure Yourself by Using Two-Step Verification on These 16 Web Services How to Fix a Stuck Pixel on an LCD Monitor How to Factory Reset Your Android Phone or Tablet When It Won’t Boot

    Read the article

  • Custom Silent HTPC Uses Entire Case as a Heatsink

    - by Jason Fitzpatrick
    This silent media center PC dissipates heat in a rather clever way; the entire back of the case is one giant heatsink. Courtesy of computer enthusiast and tinker DeFex, the build isn’t just silent but quite eye catching too. He used a combination of one massive heatsink, custom brackets, acrylic, and bicycle spokes to create a sleek case that looks as much like a computer-inspired work of art as it does a media center computer. Hit up the link below to check out the build gallery and see how he mated the CPU to the heatsink-body with a custom milled aluminum bridge. Heatsink HTPC [via Hack A Day] Secure Yourself by Using Two-Step Verification on These 16 Web Services How to Fix a Stuck Pixel on an LCD Monitor How to Factory Reset Your Android Phone or Tablet When It Won’t Boot

    Read the article

  • Oracle WebCenter Quiz

    - by Michael Snow
    Quiz: How many of the following business necessities can you accomplish with Oracle WebCenter? a) Employee On-boarding b) Policies & Procedures c) Regulatory Compliance d) Sales Enablement Dashboards e) Secure Deal Collaboration f) Document & IP Management g) Accounts Payable h) Records Management i) Claims Processing j) Marketing and Brand Management k) Call Center & HelpDesk l) Contract Management m) Collaborative Content Contribution and Sharing Environment n) Enterprise Application, Desktop and Office integration o) Share Content Across Intranet And Extranets p) Combine Content In Composite Applications q) Subject Matter Expert Location r) Personalize Recommendations of Spaces, Documents, Wikis, Blogs, and Topics s) Collaborative Community Websites t) Marketing Driven Websites u) Strategic Web Experience Management v) Online Engagement Optimization w) Create Targeted Online Experiences x) Manage Interactive Social Experiences y) Optimize Multi-Channel Customer Experiences z) End-User Personalization & Syndication aa) ALL OF THE ABOVE!!!  (HINT: CHOOSE THIS ONE!!) bb) NONE OF THE ABOVE Learn More - Join us for a Webcast   Do More with Oracle WebCenter – Expand Beyond Content Management

    Read the article

  • Vintage Fan Home Movie Captures the Filming of Return of the Jedi

    - by Jason Fitzpatrick
    Back in 1982, Jeff Broz and a group of his friends heard the next Star Wars film was being shot out in the California desert so they did what any fan would do; they trekked out into the desert and crashed the set. In this 7 minute home video we’re treated to views of the set, actors at work, and other behind-the-scenes footage of the production of Return of the Jedi. It’s hard to imagine, given modern security practices and secrecy surrounding movies, that a bunch of kids could just walk onto a set and start filming these days. [via Neatorama] HTG Explains: What Is Windows RT and What Does It Mean To Me? HTG Explains: How Windows 8′s Secure Boot Feature Works & What It Means for Linux Hack Your Kindle for Easy Font Customization

    Read the article

  • JSF2 - Why does render response not rerender component setting?

    - by fekete-kamosh
    From the tutorial: "If the request is a postback and errors were encountered during the apply request values phase, process validations phase, or update model values phase, the original page is rendered during Render response phase" (http://java.sun.com/javaee/5/docs/tutorial/doc/bnaqq.html) Does it mean that if view is restored in "Restore View" phase and then any apply request/validation/update model phase fails and skips to "Render response" that Render response only passes restored view without any changes to client? Managed Bean: package cz.test; import javax.faces.bean.ManagedBean; import javax.faces.bean.RequestScoped; @ManagedBean @RequestScoped public class TesterBean { // Simple DataStore (in real world EJB) private static String storedSomeValue = null; private String someValue; public TesterBean() { } public String storeValue() { storedSomeValue = someValue; return "index"; } public String eraseValue() { storedSomeValue = null; return "index"; } public String getSomeValue() { someValue = storedSomeValue; return someValue; } public void setSomeValue(String someValue) { this.someValue = someValue; } } Composite component: <?xml version='1.0' encoding='ISO-8859-1' ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xmlns:h="http://java.sun.com/jsf/html" xmlns:f="http://java.sun.com/jsf/core" xmlns:composite="http://java.sun.com/jsf/composite" xmlns:c="http://java.sun.com/jsp/jstl/core"> <!-- INTERFACE --> <composite:interface> <composite:attribute name="currentBehaviour" type="java.lang.String" required="true"/> <composite:attribute name="fieldValue" required="true"/> </composite:interface> <!-- IMPLEMENTATION --> <composite:implementation> <h:panelGrid columns="3"> <c:choose> <c:when test="#{cc.attrs.currentBehaviour == 'READONLY'}" > <h:outputText id="fieldValue" value="#{cc.attrs.fieldValue}"> </h:outputText> </c:when> <c:when test="#{cc.attrs.currentBehaviour == 'MANDATORY'}" > <h:inputText id="fieldValue" value="#{cc.attrs.fieldValue}" required="true"> <f:attribute name="requiredMessage" value="Field is mandatory"/> <c:if test="#{empty cc.attrs.fieldValue}"> <f:attribute name="style" value="background-color: yellow;"/> </c:if> </h:inputText>&nbsp;* </c:when> <c:when test="#{cc.attrs.currentBehaviour == 'OPTIONAL'}" > <h:inputText id="fieldValue" value="#{cc.attrs.fieldValue}"> </h:inputText> </c:when> </c:choose> <h:message for="fieldValue" style="color:red;" /> </h:panelGrid> </composite:implementation> Page: <?xml version='1.0' encoding='UTF-8' ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xmlns:h="http://java.sun.com/jsf/html" xmlns:ez="http://java.sun.com/jsf/composite/components"> <h:head> <title>Testing page</title> </h:head> <h:body> <h:form> <h:outputText value="Some value:"/> <ez:field-component currentBehaviour="MANDATORY" fieldValue="#{testerBean.someValue}"/> <h:commandButton value="Store" action="#{testerBean.storeValue}"/> <h:commandButton value="Erase" action="#{testerBean.eraseValue}" immediate="true"/> </h:form> <br/><br/> <b>Why is field's background color not set to yellow?</b> <ol> <li>NOTICE: Field has yellow background color (mandatory field with no value)</li> <li>Fill in any value (eg. "Hello") and press Store</li> <li>NOTICE: Yellow background disappeared (as mandatory field has value)</li> <li>Clear text in the field and press Store</li> <li><b>QUESTION: Why is field's background color not set to yellow?</b></li> <li>Press Erase</li> <li>NOTICE: Field has yellow background color (mandatory field with no value)</li> </ol> </h:body>

    Read the article

  • How to price code reviews to encourage good behavior?

    - by Chris Clark
    I work for a company that has a hosted .net internet application with many clients. Those clients often want to write customizations for our application. We have APIs to hook into the app, but the customizations themselves are written in .net. This is a shared, secure hosting environment and we have to code review these customizations before we can deploy them in our datacenter to ensure that they don't degrade performance, crash our servers, or open any security vulnerabilities. We charge for these code reviews. The current pricing model is simply a function of the number of lines of code. I think this is a bad idea for a variety of reasons, but primarily because, if we are interested in verifying that the code works as expected, we should be incentivizing good, readable code, not compaction. I would like to propose a pricing model that incorporates some, or all of the following as inputs: Lines of code Cyclomatic complexity Avg function length # of functions Are there any other metrics I should incorporate, or other ideas for how we can reasonably create pricing for code reviews that encourages safe and understandable code?

    Read the article

  • How to make Chrome/Chromium remember passwords in the gnome seahorse keyring?

    - by berkes
    Is it possible to make chrome or chromium (as that comes default in the repos) to use the Gnome seahorse as password vault? I have not found a way to do this for Firefox either, but maybe a solution for Firefox will lead to a solution for Chrome. FYI: Epiphany is properly integrated into Gnome by default, and does use the default password vault. It would be great to at least have all passwords in a single, actually secure, place, instead of laying around in my home-dir. Even better would be if somehow they could re-use eachothers passwords, but that depends on the implementation of this integration, i guess.

    Read the article

< Previous Page | 74 75 76 77 78 79 80 81 82 83 84 85  | Next Page >