Search Results

Search found 8253 results on 331 pages for 'secure coding'.

Page 141/331 | < Previous Page | 137 138 139 140 141 142 143 144 145 146 147 148  | Next Page >

  • Partner Webcast – Oracle Weblogic 12c for New Projects - 07 Nov 2013

    - by Roxana Babiciu
    Fast-growing organizations need to stay agile in the face of changing customer, business or market requirements.Oracle WebLogic Server 12c is the industry's best application server platform that allows you to quickly develop and deploy reliable, secure, scalable and manageable enterprise Java EE applications. WebLogic Server Java EE applications are based on standardized, modular components. WebLogic Server provides a complete set of services for those modules and handles many details of application behavior automatically, without requiring programming.New project applications are created by Java programmers, Web designers, and application assemblers. Programmers and designers create modules that implement the business and presentation logic for the application. Application assemblers assemble the modules into applications that are ready to deploy on WebLogic Server. Build and run high-performance enterprise applications and services with Oracle WebLogic Server 12c, available in three editions to meet the needs of traditional and cloud IT environments. Join us, in this webcast, as we will show you how WebLogic Server 12c helps you building and deploying enterprise Java EE applications with support for new features for lowering cost of operations, improving performance, enhancing scalability. Read more here

    Read the article

  • Managing client passwords [closed]

    - by C.Johns
    I am just starting up a small website development business and one of the issues I am having is remembering passwords and account information for clients hosting, cpanel, ftp accounts etc. I was wondering what is the most suitable system / industry standard for controlling such information? Pretty marginal on the close there... I read the FAQ and I felt list this could be a common issue for webmasters, its defiantly not a coding questions so stackoverflow is out of the question and its not a broad question its focused on one particular aspect of being a webmaster.

    Read the article

  • Where can I hire a trustworthy professional PHP programmer?

    - by JJ22
    I wrote a php application for my website that really needs to work well and be as secure as possible. I'm a novice php programmer, so while my application seems to work well, there may be inefficiencies or security vulnerabilities. I feel that I should have someone look over my code before making the application publicly available, but I'm hesitant to just post it online because it handles some rather sensitive things. Where can I find a competent, trustworthy, and relatively inexpensive php programmer who would be willing to review a few thousand lies of well-commented easy-to-read php code? Thank you!

    Read the article

  • Why don't we store the syntax tree instead of the source code?

    - by Calmarius
    We have a lot of programming languages. Every language is parsed and syntax checked before translated into code so an abstract syntax tree is built. We have this abstract syntax tree, why don't we store this syntax tree instead of the source code (or next to the source code)? By using an AST instead of the source code. Every programmer in a team can serialize this tree to any language, they want (with the appropriate context free grammar) and parse back to AST when they finished. So this would eliminate the debate about the coding style questions (where to put the { and }, where to put whitespace, indentation, etc.) What are the pros and cons of this approach?

    Read the article

  • What should I know before starting my first consulting project?

    - by bo4sho
    I just got a job for a small project. I have all the relevant skills and knowledge to complete the project, but I am concerned about getting screwed over because this is my first time working on a consultant basis. We have already agreed on an hourly wage that I'm happy with, so that's not an issue. I'm just worried that since this is my first time working on my own, I'm going to make some mistakes that could be easily avoided if I had someone give me advice beforehand. This is what I already know to do/not do: -Get everything in writing -Limit the scope of the project. Once I start the actually coding, all features should be frozen. -Make sure to communicate constantly with my client. In addition he wants an max hourly cap. What is a good way to come up with one? What else do I need to know?

    Read the article

  • How to Build Business Links With SEO Value

    In order to create order and plan in the site and make it more identifiable by a business community around, SEO link building requires membership strategies that aid it in its automatic operations by following a universal hub with potential links. The starting point is to obtain a link with the national or regional authority of commerce through its website. This will give the site a licensed look and due to its frequent interaction with the government body it will be a confidence boost for other links. This will also help market it as a recognized site that is secure to communicate with.

    Read the article

  • Gone in 60 Seconds: An Insecure Database is an Easy Target

    - by Troy Kitch
    According to the recent Verizon Data Breach Investigations Report, 98% of breached data originates from database servers and nearly half are compromised in less than a minute! Almost all victims are not even aware of a breach until a third party notifies them and nearly all breaches could have been avoided through the use of basic controls. Join us for this November 28th webcast to learn more about the evolving threats to databases that have resulted in over 1 billion stolen records. Also, hear how organizations can mitigate risks by adopting a defense-in-depth strategy that focuses on basic controls to secure data at the source - the database. There's no turning back the clock on stolen data, but you can put in place controls to ensure your organization won't be the next headline. Note, this webcast will be recorded for on-demand access after November 28th. 

    Read the article

  • Database in the cloud?

    - by Jlouro
    Some of my recent clients are asking for remote connections to the office server, for standalone work, etc, in winForm applications. Since the concept of the web is remote connection to a server both of data and resources, it should be possible to place both of this in cloud and have the winForm apps connect to it as if web Apps. As any one tested this, is working like this? Is it fast enough? Is it secure? What is the best cloud host for this type of work ?

    Read the article

  • Changed profiles; lost Ubuntu; how do I get it back?

    - by Tim
    Installed Ubuntu-secure-remix 12.10 in a dual boot with Windows 8 on an HP laptop. A first-time Linux user, I was exploring settings when I changed profiles (not sure what I changed it to). Now the Linux boots into what I believe is the shell. I can still log in (that is, I am already a user - so that's still there). Due possibly to using rEFInd, I cannot figure how to run Ubuntu in recovery mode. How can I get Ubuntu back up and running again? Thanks in advance.

    Read the article

  • Need suggestions on what you regard as &ldquo;security&rdquo;

    - by John Breakwell
    I’m currently writing a large piece on MSMQ security and wanted to check I was covering the right areas. I have some doubts as I’ve seen the occasional MSMQ forum question where a poster has used the word “security” in different contexts to what I was expecting. So here are the areas I plan to cover: Message security encryption on the wire (SSL and IPSEC) encryption of the message (MSMQ encryption) encryption of the payload (data encryption) signing and authentication Queue security SIDs and ACLs Discoverability Cross-forest issues Storage security NTFS permissions unencrypted data Service security Ports and Firewalls DOS attacks Hardened mode (HTTP only) RPC secure channel requirement authenticated RPC requirement Active Directory object permissions Setup Administrator requirements What else would you want to see?

    Read the article

  • How to Use The US Windows 8 Store From Another Country

    - by Taylor Gibb
    Have you ever searched for an app only to find that its not available in your country? Luckily for us there is a work around for the Windows Store. How to use the US Windows Store from Another Country Press the Win + X keyboard combination, or right click in the bottom left hand corner of your screen to open the WinX menu, then launch the Control Panel. Now change the Control Panel’s view to the Small icons view. Then head into the Region settings. When the Region settings open you will need to switch over to the Location tab. Here you will be able to see the location that the Windows Store, as well as other applications , is using. You can change it by simply selecting United States from the drop down. That’s all there is to it. Secure Yourself by Using Two-Step Verification on These 16 Web Services How to Fix a Stuck Pixel on an LCD Monitor How to Factory Reset Your Android Phone or Tablet When It Won’t Boot

    Read the article

  • Optimum Number of Parallel Processes

    - by System Down
    I just finished coding a (basic) ray tracer in C# for fun and for the learning experience. Now I want to further that learning experience. It seems to me that ray tracing is a prime candidate for parallel processing, which is something I have very little experience in. My question is this: how do I know the optimum number of concurrent processes to run? My first instinct tells me: it depends on how many cores my processor has, but like I said I'm new to this and I may be neglecting something.

    Read the article

  • Need private personal access to ~three PHP pages

    - by Roger
    I would like secure access to the text output by three PHP scripts (the text output is JavaScript and html) . The security level is much less then financial data but important none-the-less. I have considered purchasing AND studying https and SSL certificates. Hostgator charges an extra $2/month for a private ip plus $50+ anually for a certificate. This is more then I want to spend for this project (time + money). Is there a simpler solution that is: less expensive easier to implement. I'm open to different approaches.

    Read the article

  • Ask The Readers: How Do You Find Your Next Game?

    - by Jason Fitzpatrick
    Once upon a time the only place for new video game information was down at the arcade. These days there’s a news source and niche for everyone and every kind of game; where and how do you find your next video game conquest? Word of mouth? App recommendations? Critical reviews? This week we’re interested in lining ourselves up for a little summer fun: tell us all about your tips, tricks, and techniques for finding the real gems in the pile of games that comes out every year. Sound off in the comments and then check back in on Friday for the What You Said roundup. HTG Explains: What Is Two-Factor Authentication and Should I Be Using It? HTG Explains: What Is Windows RT and What Does It Mean To Me? HTG Explains: How Windows 8′s Secure Boot Feature Works & What It Means for Linux

    Read the article

  • What steps should be taken to ensure that an open source database gets ready for production?

    - by I_like_traffic_lights
    I am considering using GridSQL in a production environment. However, I do have some indications that it is not ready. One is that it got excluded by the offering of EnterpriseDB a while ago, and the forums seem to report a few wrong results and relatively severe bugs. The alternatives to GridSQL, however cost around 100.000$ to buy, so I was thinking to utilize some of this money to ensure that GridSQL gets ready for production. At the same time, I could risk spending 50.000$ and months of work on the development of GridSQL, just to discover that the design was flawed and that a complete rewrite is needed. Then I would have to buy the commercial alternatives to GridSQL and the existence of my startup would be at risk. Question What steps would you take to ensure that there is as little risk as possible that the worst case scenario described above would happen? It is unrealistic that I could do much testing nor code review/coding myself (I am also not the best developer), so please describe where to find the guys that would need to do the work.

    Read the article

  • Visual Studio 2010: Extension Manager

    - by Natasa Gavrilovic
    If you still didn’t explore Extension Manager under Tools in Visual Studio 2010 now it’s the time!   VS2010 can be expended to include add-ons you wish to have. The Extension Manager list is pretty extensive, where most of them are ‘still work in progress’ tools but, at least, it is worth trying.   Listed below are top ranked ones that should help to enhance your coding experience:   ·         Productivity Power Tools – set of small gadgets: Auto Brace Completion, Quick Access, Column Guides, Align Assignments, Triple Click etc. ·         PowerCommands  ·         Visual Studio Web Standards Update –newly released update for support HTML5 and CSS3 ·         MVC Scaffolding - scaffold elements from entities ·         NuGet Package Manager – automated package manager tool   Online the Extension manager is locaated ats Visual Studio Gallery.   Another good place is CodePlex. It is open source software website focusing on .NET that contains more than 20 000 add-ons tagged in more than 20 different categories.   Feel free to add a comment how your VS is ‘customized’ and what will be your recommendation.   N.

    Read the article

  • C/C++ canonicaliser?

    - by A T
    Are there any C/C++ automated canonicallisers? - Something like astyle but which makes your code more concise, rather than formats it? For example, to go from: float foo() { float a; float b; a = 9455.34; b = 3543.8; return a*b; } int main(void) { float b; b = foo(); return 0; } To: float foo(); // Automated prototype creation int main(void) { float b = foo(); return 0; } float foo() { return 9455.34*3543.8; } (this is my coding style FYI: to reduce the lines-of-code without sacrificing readability)

    Read the article

  • Hitachi Data Systems definition of cloud

    - by llaszews
    1. Ability to rapidly provision and de-provision a service. (aka: provisioning) 2. A consumption model where users pay for what they use. (aka: chargeback and showback) 3. The agility to flexibly scale - 'flex up' or 'flex down' - the services without extensive pre-planning. (aka: elasticity) 4. Secure, direct connection to the cloud without having to recode applications (aka: internet-based) 5. Multi-tenancy capabilitites that segregate and protect the data. (as it says multi-tenancy) Happen to be I have been talking about 4 of the 5. Did not mention connection to internet as assumed this.

    Read the article

  • Team Explorer Everywhere 2010 now Free..!

    - by Ravi
    Yes, now more ways to get connected to TFS 2010. Up until now, if you have to connect to TFS 2010 from other platforms - be it Linux, Mac, Solaris etc., you had to purchase a CAL (Client Access License) or a 90-day free trial of the Team Explorer Everywhere 2010. You don't have to do that anymore. Microsoft has made it free and released an update with Team Explorer Everywhere with SP1. Here's the download link - http://www.microsoft.com/download/en/details.aspx?id=25125 Have fun coding..!

    Read the article

  • Where can I get a definition of how the code is laid out in VB.NET 2010?

    - by ByteWorker
    I am just starting out learning Visual Basic 2010. I have books and videos. The books all seem to be written for people who have some programming experience, even the books that say they are for beginners. The videos were great until they started talking about variables. I got the basics of them but they started into complicated variables and I don’t see the need for them right away. Where can I go to see code for fairly intricate applications written out, with an over lay of definitions of which part of the code is a method as opposed to a class and so on? Also, I am working at a company that does not use SQL. So I need to use Access 2007 for all of my tables. Is there much of a difference to the coding?

    Read the article

  • No sound/audio after resuming from sleep

    - by hansvonaachen
    I've made a fresh UEFI install of Ubuntu 13.10 (64 bit) on a Lenovo Ideapad Z510 laptop with Intel i5 4200M processor. Ubuntu is the only OS installed on the computer, secure boot disabled. Everythings works fine (backlight issue fixed after editing rc.local file), the only minor trouble I have is resuming the laptop from "sleep" mode. If I close the lid and then wake the laptop opening it again, there is no audio/sound. I need to restart the computer (not even logging out helps). If I suspend the computer in a graphical way (not closing the lid): gearwheel in top right of the screen -- suspend and wake it up/turning on, audio works with no issues. Ideas how to fix this? Thanks!

    Read the article

  • Ask the Readers: How Do You Find Your Next Book?

    - by Jason Fitzpatrick
    It’s never been easier to find book reviews, recommendations, and comparisons; tools which are more necessary than ever thanks to the increasing number of new titles on the market. This week we want to hear all about your techniques for picking your next book. Whether you consult the New York Times best seller list, pore over Amazon book reviews, use a book suggestion engine, or just buy whatever the local book store has on the end-cap display that month, we want to hear about your system for finding new books. Sound off in the comments with your technique (bonus points for including links to any services or sites you use) and then check back on Friday for the What You Said roundup to see how your fellow readers fill their book bags. Secure Yourself by Using Two-Step Verification on These 16 Web Services How to Fix a Stuck Pixel on an LCD Monitor How to Factory Reset Your Android Phone or Tablet When It Won’t Boot

    Read the article

  • Continuing to code on large projects

    - by user3487347
    I am a hobbyist programmer, and I've started many medium - sized projects to work on just by myself. These include games, a raytracer, physics simulations etc. By the time these projects get to a certain size (around 5000 lines), I begin to slow down in adding features to the program. This is not because of a lack of ideas of what to implement in a program, but rather a struggle in how to go about it. In particular, I'm afraid of breaking what I already have working in order to implement a new feature. I've tried using version control like Git and Subversion, but these seem unnecessary when you are a one man team. I simply have a folder of "versions" of my program, one for each major change I make. How do I keep coding past this 5000 line mark? What about the 50000 line mark?

    Read the article

  • How to cope with "Hidden IT..." Who writes and maintains the ad-hoc software applications?

    - by matcauthon
    Bigger companies usually have the problem, that it is not possible to write all programs employees want (to save time and to optimize processes) due to a lack of staff and money. Then hidden programs will be created by some people having (at least some) coding experience (or by cheap students/interns...). Under some circumstances these applications will raise in importance and spread from one user to a whole department. Then there is the critical point: Who will maintain the application, add new features, ...? And this app is critical. It IS needed. But the intern has left the company. No one knows how it works. You only have a bunch of sources and some sort of documentation. How do you cope with these applications? Can you "forbid" them? Can you control them? Do you have to write all apps (not Excel macros or some minor stuff) in the IT department?

    Read the article

  • Safest way (i.e. HTTPS, POST, PGP) to send decryption keys through the web?

    - by theGreenCabbage
    I am in the final stages of development for my Revit plugin. This plugin is programmed in C#, and distributed via a DLL. One of the DLLs is an encrypted SQLite database (with proprietary data) that is in the form of a DLL. Currently, in development stages, the decryption key for the SQLite database is hardcoded in my main DLL (the program's DLL). For distribution, since DLLs are easily decompilable, I am in need of a new method to decrypt the DLL. My solution is to send our decryption keys from our servers securely to the host's computer. I was looking in POST, thinking it was more secure than GET, but upon research, it appears it's similarly insecure, only more "obscure" than GET. I also looked into HTTPS, but Hostgator requires extra money for HTTPS use. I am in need of some advice - are there any custom solutions I can do to implement this?

    Read the article

< Previous Page | 137 138 139 140 141 142 143 144 145 146 147 148  | Next Page >