Search Results

Search found 5864 results on 235 pages for 'secure gateway'.

Page 118/235 | < Previous Page | 114 115 116 117 118 119 120 121 122 123 124 125  | Next Page >

  • June 2013 Virtualization Newsletter is Here!

    - by Chris Kawalek
    The June Edition of the Oracle Virtualization Newsletter is now available! In this issue, you'll learn about: Announcing Oracle Secure Global Desktop 5.0 Dell Announces New Infrastructure Offering with Oracle Linux, Oracle VM, and Oracle Enterprise Manager, Optimized to Run on Dell x86 Systems Oracle VM Continues to Expand Partner Ecosystem with Cisco and NetApp  Get Ready for Oracle OpenWorld 2013 And much more! Head on over and read the newsletter. You can also subscribe and have it automatically appear in your inbox each time a new edition is released! -Chris 

    Read the article

  • Failed GRUB after 10.04 to 12.04 upgrade in system with LVM

    - by Vagelis L
    I am using Ubuntu Server as a SMB server at work and two days ago I have tried to upgrade it to 12.04. After reboot, I got this grub_xput missing grub rescue> and all attempts to start from this prompt failed (missing components, although grub directory is normally set as prefix). My system sits and boots on an LVM (soft raid-5). I have read almost all posts in many forums, tried grub rescue, boot-repair, ubuntu-secure-remix with boot-repair but without positive result. This is the log of my last (and best so far) attempt to fix this system. Any suggestions? Please help.

    Read the article

  • Does setting document.domain via script interfere with Google Analytics?

    - by Seth Petry-Johnson
    I have a site, www.example.com, that displays some secure content from forms.example.com in iframes. To enable cross-frame navigation, pages on both sites use JavaScript to set the document.domain to just "example.com". I am using Google Analytics on www.example.com, but the GA site is not showing any data. It indicates that the tracking code is found (the status icon is a green checkmark), but no data is reported. The GA profile lists the website as "www.example.com". Is this a supported scenario? Is my script interfering with the GA code in some way?

    Read the article

  • GPG Workflow in 11.04

    - by Ross Bearman
    At work we handle the transfer of small bits of sensitive data with GPG, usually posted on a secure internal website. Until Firefox 4 was released, we used FireGPG for inline decryption; however the IPC libraries that it relied upon were no longer present in FF4, making it unusable and it will no longer install in FF5. Currently I'm manually pasting the GPG blocks into a text file, then using the Nautilus context-menu plugin or the command line to decrypt the contents of the file. When we're handling large amount of these small files throughout the day this starts to become a real chore. I've looked around but can't seem to find much information on useful GPG clients in Ubuntu. A client that allowed me to paste in a GPG block and instantly decrypt it, and also paste in plaintext and easily encrypt it for multiple recipients would be ideal. So my question is does this exist? I can't seem to find anything about this with obvious searches on Google, so hopefully someone here can help, or offer an alternative workflow.

    Read the article

  • DIY Wirelessly Charged LED Lanterns

    - by Jason Fitzpatrick
    Earlier this year we shared a clever project that turned LEDs, batteries, and PVC into mini, waterproof, and virtually indestructible lanterns. This remake of the project makes the units rechargeable. Our favorite part about this project–the upgrade to an older project and the introduction of wireless charging aside–is the fact that the maker behind it is 15 years old. It’s great to see younger people taking an interest in tinkering! Wirelessly Charged Indestructible Lantern [via Hacked Gadgets] HTG Explains: What Is Two-Factor Authentication and Should I Be Using It? HTG Explains: What Is Windows RT and What Does It Mean To Me? HTG Explains: How Windows 8′s Secure Boot Feature Works & What It Means for Linux

    Read the article

  • AutoVue for Agile Sessions at the Oracle Value Chain Summit 2013

    - by Pam Petropoulos
    At the upcoming Oracle Value Chain Summit, which takes place February 4 - 6, 2013 in San Francisco, CA, AutoVue Enterprise Visualization solutions will be covered in a variety of sessions within the Agile PLM solution area. Attend the following sessions during the Product Deep Dives & Demos Track, and discover the latest AutoVue for Agile capabilities, including how to streamline business processes, such as change management by creating ECRs directly from within CAD designs. Visual Decision Making to Optimize New Product Development and Introduction Date: Tuesday, February 5 Time: 12:45 pm to 1:30 pm Seeing the Forest: Next Generation Visualization Date: Wednesday, February 6 Time: 3:15 pm to 4:00 pm Next-Generation CAD Data Management: MCAD, ECAD, and Software Configuration Management Date: Wednesday, February 6 Time: 11:15 am to 12:00 pm Keep an eye on this blog for forthcoming details about each of these sessions. Don’t miss this opportunity to mingle with other AutoVue for Agile customers and meet one on one with the AutoVue product management and development team. Register now for the early bird rate of $195 and secure your spot at the Summit. Click here to register and learn more.

    Read the article

  • Ways to prevent client seeing my code

    - by James Eggers
    I've got a bit of a strange problem.. Basically, I'm building a fairly complex (un-compiled, interpreted) program in Python. I've been working on most of this code for other purposes for a few months, and therefore don't want my client to be able to simple copy and paste it and then try and sell it (it's worth a fair amount). The other problem is that I need the script to run on a server that my client is paying for. Is there any way I can secure a particular folder on the machine from root access, make it so only one particular can access the directory? The OS is Ubuntu.

    Read the article

  • Which database to use for quickly and pygtk

    - by usher
    I'm writing application using quickly Pygtk and glade. this application should have database connection (such as MySQL) for reading and writing data from the local or outsourcing machine \ server. However, in my machine there is MySQL installed, but when releasing the app it sould be installed on another ubuntu machine, which may not have mysql and moreover not the same database with the required database name and structure.... So my questions are: Is it a good choice using mysql as database 1.2 If not what is? Is it posible to embeding mysql or other database program during the installation from ubuntu software center? 2.2 If it's posible: hwo(any tutorial?) Where to store secure data outside the mysql (or whatever) for conecting the database every time a user launch the application

    Read the article

  • Is executing SQL through a WebService a really bad idea?

    - by Kyle
    Typically when creating a simple tool or something that has to use a database, I go through the fairly long process of first creating a webservice that connects to a database then creating methods on this webservice that do all the type of queries I need.. methods like List<Users> GetUsers() { ... } User GetUserByID(int id) { ... } //More Get/Update/Add/Delete methods Is it terrible design to simply make the webservice as secure as I can (not quite sure the way to do something like this yet) and just make a couple methods like this SqlDataReader RunQuery(string sql) { ... } void RunNonQuery(string sql) { ... } I would sorta be like exposing my database to the internet I suppose, which sounds bad but I'm not sure. I just feel like I waste so much time running everything through this webservice, there has to be a quicker yet safe way that doesn't involve my application connecting directly to the database (the application can't connect directly to database because the database isn't open to any connections but localhost, and where the appliction resides the standard sql ports are blocked anyway) Especially when I just need to run a few simple queries

    Read the article

  • 6 Alternatives to iGoogle For Personalized Homepages

    - by Chris Hoffman
    iGoogle has less than a year to go before it’s shut down for good on November 1, 2013. While Google seems to think that iGoogle isn’t necessary anymore, there are other services waiting to take its place. Google says that “with modern apps that run on platforms like Chrome and Android, the need for iGoogle has eroded over time.” If you disagree, try one of the services below. How To Delete, Move, or Rename Locked Files in Windows HTG Explains: Why Screen Savers Are No Longer Necessary 6 Ways Windows 8 Is More Secure Than Windows 7

    Read the article

  • C2C - Customer 2 Cloud Program

    - by Hartmut Wiese
    What´s in it for partners? A special Webinar for EMEA partners The Blog Entry is referring to this EMEA CRM Community blog entry here. The new Oracle Customer 2 Cloud (C2C) Program offers sizeable CX Cloud business opportunities for our partners into their existing Siebel, Peoplesoft or Oracle eBusiness Suite customers installed base, leveraging financial incentives that allow customers switching part of their On Premises solutions' maintenance fees against Cloud subscriptions from the market leading provider of CX Cloud business solutions. Look at this introduction video to have a first feeling about the C2C program and then join us on Tuesday June 10th at 9am CET (8am UK) to find out how you and your customers can benefit from this program to secure existing Siebel, Peoplesoft or Oracle eBusiness Suite accounts while generating new business opportunities. Register here! added by Hartmut Wiese: JD Edwards is not explicitly mentioned for this program but I also did not found a remark that it is not included.

    Read the article

  • Alternatives to OAuth?

    - by sdolgy
    The Web industry is shifting / has shifted towards using OAuth when extending API services to external consumers & developers. There is some elegance in simple....and well, the 3-step OAuth process isn't too bad ... i just find it is the best of a bad bunch of options. Are there alternatives out there that could be better, and more secure? The security reference is derived from the following URLs: http://www.infoq.com/news/2010/09/oauth2-bad-for-web http://hueniverse.com/2010/09/oauth-2-0-without-signatures-is-bad-for-the-web/

    Read the article

  • Trying to boot from USB on Asus q200e-bhi3t45 just brings me to grub menu

    - by Krash Kharma
    It's been a struggle every time I've tried to change my OS on this machine. I honestly don't even know how it works whenever it does. I've somehow managed to get Windows 7, Windows 8, Mint 14, Ubuntu 12.04, and 12.10 to work at random times but it's always after struggling with it and googling for random chance fixes and suddenly something clicks and it loads from usb, but 99% of the time, every time I try to boot from USB to install a distro (in this case, I'm trying to get ubuntu-12.04.2-desktop-amd64.iso to work) my pc just comes up with a grub menu ("Minimal bash-like blahblahblah - grub ") I don't know why it works when it works. Right now I've tried everything from with/without Fast Boot in BIOS, with/without CSM, with/without secure boot, to changing BOOTx64.EFI to bootx64.efi to downloading a new bootx64.efi to copying it to every folder on the usb.... It makes no sense to me. Sorry if this has been asked before but I can't find anything

    Read the article

  • Advice on triple/quadruple-booting?

    - by professorfish
    I am currently running Windows 7 Home Premium x64 on my laptop. I would like to install more than one Linux distro, IN ADDITION TO Windows 7. How do I go about this, what do I need to be careful and aware of, is it possible? The specific distros I might eventually install: Definitely: Ubuntu (is it a good idea to install the Linux-Secure-Remix version?) Almost definitely: OpenSUSE Probably: Zorin Possibly: Arch Possibly: Fedora Possibly: FreeBSD Computer details: Successfully used WUBI for Ubuntu in the past Recently reinstalled Windows using the RECOVERY partition Windows 7 Home Premium x64 model: ASUS K53U series AMD Brazos Dual Core E450 1.65 GHz 750GB hard drive, currently partitioned into C: (300GB total, 246 GB free), D: (373GB - total, 167 GB free), and RECOVERY (the rest of the space, I think) 4GB RAM Can I be sure that GRUB will work, if WUBI has worked? In short, how do I go about triple- or quadruple-booting Windows 7, Ubuntu and other distros? What do I need to be aware of? How do I set up the partition structure? Thank you in advance

    Read the article

  • htaccess allow default page

    - by Jan De Laet
    Having a problem with my .htaccess. I have this to secure all my documents: Order Deny,Allow Deny from all Allow from 127.0.0.1 <FilesMatch "\.(htm|html|css|js|php)$"> Order Allow,Deny Allow from all Allow from 127.0.0.1 </FilesMatch> Now everything works fine, but only my default page www.mysite.com doesn't work and gives me the notification: You don't have permission to access / on this server. what is normal accroding to my coding. But how can you fix this? If there stands www.example.com/index.php it works but if you surf to www.example.com I get this message.

    Read the article

  • https (SSL) instead of http

    - by user1332729
    I am building myself a new website, out of privacy and security concerns I am contemplating trying to make it https only. It will be mobile-friendly using media queries but I am concerned--especially for mobile users--about the increased bandwidth. How much will doing so increase my bandwidth or slow load times? For pages where I'm not transferring sensitive information, should I leave external links (to a jQuery library, or a web font for instance) in http? Simply put, I have read articles saying the entire web would be more secure if everything was SSL but my actual knowledge of implementation is limited to payment gateways and log-in pages and such. I apologize for the open-ended nature of the question but anything, even just simple answers to the specific questions is welcomed.

    Read the article

  • Unable to boot to Ubuntu

    - by nsk
    Just got a new laptop and removed Windows 8 and installed 13.10 using LiveUSB. Initially it was booting to "No boot media" but I was able to resolve it with boot-repair. I realized some of the items I need isn't supported on 13.10, so attempted to install 13.04 instead. Now without LiveUSB, the laptop just boots to "No boot media" but boot repair doesn't seem to be fixing it. Tried going back to 13.10, but no dice. After boot repair it says "Please do not forget to make your BIOS boot on sda1/EFI/ubuntu/grubx64.efi file!". GParted shows sda1 has the boot flag. Using Toshiba Satellite P50. Secure Boot disabled. UEFI enabled. Any help would be highly appreciated. http://paste.ubuntu.com/6366556/

    Read the article

  • How Can I Disable Windows 7's Aero Performance Warnings?

    - by Jason Fitzpatrick
    You know your computer isn’t cutting edge, but there’s no need for Windows 7 to constantly remind you. Read on to see how you can disable its constant nagging to adjust your color scheme to improve performance. Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-drive grouping of Q&A web sites. Secure Yourself by Using Two-Step Verification on These 16 Web Services How to Fix a Stuck Pixel on an LCD Monitor How to Factory Reset Your Android Phone or Tablet When It Won’t Boot

    Read the article

  • Meet and Greet with IDM Executives at Oracle OpenWorld

    - by Tanu Sood
    Oracle’s Identity Management Team Invites You to Learn How to Secure The New Digital Experience Come see how the Oracle Identity Management platform can position your company to take advantage of the emerging business opportunities. Leverage Social Identities for web authentication Enable customers and employees to interact through their mobile devices Deploy Self Service User Provisioning for quick role changes based on business needs We look forward to seeing you there! Wednesday, October 3rd  3:30-4:30 PM  Meeting 4:30-5:30 PM  Cocktail Reception Four Seasons Hotel Yerba Buena Room 757 Market Street San Francisco, CA 94103 415.633.3000 http://www.fourseasons.com/sanfrancisco/   RSVP Now Copyright © 2012, Oracle and/or its affiliates.  All rights reserved. Contact Us | Legal Notices and Terms of Use | Privacy Statement

    Read the article

  • Partner Webcast – Oracle Weblogic 12c for New Projects - 07 Nov 2013

    - by Roxana Babiciu
    Fast-growing organizations need to stay agile in the face of changing customer, business or market requirements.Oracle WebLogic Server 12c is the industry's best application server platform that allows you to quickly develop and deploy reliable, secure, scalable and manageable enterprise Java EE applications. WebLogic Server Java EE applications are based on standardized, modular components. WebLogic Server provides a complete set of services for those modules and handles many details of application behavior automatically, without requiring programming.New project applications are created by Java programmers, Web designers, and application assemblers. Programmers and designers create modules that implement the business and presentation logic for the application. Application assemblers assemble the modules into applications that are ready to deploy on WebLogic Server. Build and run high-performance enterprise applications and services with Oracle WebLogic Server 12c, available in three editions to meet the needs of traditional and cloud IT environments. Join us, in this webcast, as we will show you how WebLogic Server 12c helps you building and deploying enterprise Java EE applications with support for new features for lowering cost of operations, improving performance, enhancing scalability. Read more here

    Read the article

  • Where can I hire a trustworthy professional PHP programmer?

    - by JJ22
    I wrote a php application for my website that really needs to work well and be as secure as possible. I'm a novice php programmer, so while my application seems to work well, there may be inefficiencies or security vulnerabilities. I feel that I should have someone look over my code before making the application publicly available, but I'm hesitant to just post it online because it handles some rather sensitive things. Where can I find a competent, trustworthy, and relatively inexpensive php programmer who would be willing to review a few thousand lies of well-commented easy-to-read php code? Thank you!

    Read the article

  • How to Build Business Links With SEO Value

    In order to create order and plan in the site and make it more identifiable by a business community around, SEO link building requires membership strategies that aid it in its automatic operations by following a universal hub with potential links. The starting point is to obtain a link with the national or regional authority of commerce through its website. This will give the site a licensed look and due to its frequent interaction with the government body it will be a confidence boost for other links. This will also help market it as a recognized site that is secure to communicate with.

    Read the article

  • Changed profiles; lost Ubuntu; how do I get it back?

    - by Tim
    Installed Ubuntu-secure-remix 12.10 in a dual boot with Windows 8 on an HP laptop. A first-time Linux user, I was exploring settings when I changed profiles (not sure what I changed it to). Now the Linux boots into what I believe is the shell. I can still log in (that is, I am already a user - so that's still there). Due possibly to using rEFInd, I cannot figure how to run Ubuntu in recovery mode. How can I get Ubuntu back up and running again? Thanks in advance.

    Read the article

  • Need suggestions on what you regard as &ldquo;security&rdquo;

    - by John Breakwell
    I’m currently writing a large piece on MSMQ security and wanted to check I was covering the right areas. I have some doubts as I’ve seen the occasional MSMQ forum question where a poster has used the word “security” in different contexts to what I was expecting. So here are the areas I plan to cover: Message security encryption on the wire (SSL and IPSEC) encryption of the message (MSMQ encryption) encryption of the payload (data encryption) signing and authentication Queue security SIDs and ACLs Discoverability Cross-forest issues Storage security NTFS permissions unencrypted data Service security Ports and Firewalls DOS attacks Hardened mode (HTTP only) RPC secure channel requirement authenticated RPC requirement Active Directory object permissions Setup Administrator requirements What else would you want to see?

    Read the article

  • Gone in 60 Seconds: An Insecure Database is an Easy Target

    - by Troy Kitch
    According to the recent Verizon Data Breach Investigations Report, 98% of breached data originates from database servers and nearly half are compromised in less than a minute! Almost all victims are not even aware of a breach until a third party notifies them and nearly all breaches could have been avoided through the use of basic controls. Join us for this November 28th webcast to learn more about the evolving threats to databases that have resulted in over 1 billion stolen records. Also, hear how organizations can mitigate risks by adopting a defense-in-depth strategy that focuses on basic controls to secure data at the source - the database. There's no turning back the clock on stolen data, but you can put in place controls to ensure your organization won't be the next headline. Note, this webcast will be recorded for on-demand access after November 28th. 

    Read the article

< Previous Page | 114 115 116 117 118 119 120 121 122 123 124 125  | Next Page >