Search Results

Search found 12926 results on 518 pages for 'security risks'.

Page 261/518 | < Previous Page | 257 258 259 260 261 262 263 264 265 266 267 268  | Next Page >

  • CVE-2011-0216 Denial of Service (DoS) vulnerability in libxml2

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-0216 Numeric Errors vulnerability 9.3 libxml2 Solaris 11 Contact Support Solaris 10 SPARC: 125731-07 X86: 125732-07 Solaris 9 Contact Support This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Do Not Do This When You Build a Website

    More and more people are becoming comfortable purchasing online due to the increased security present on the Internet today. Everybody understands the phrase, "Google it," when you ask somebody where they found that new bracelet they are wearing.

    Read the article

  • SecureAsia@Tokyo 2012??????????

    - by user762552
    ?????????????facebook?????????????????????···??????????SecureAsia@Tokyo 2012???????????????????????????????????????????????????????1.??????????????(DAY2:7?18?11:15-12:00)???????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????(1) ???????????(2)????????????????????????????????????????????????????????????????????????????????????????????????????????????(7?12-13?)???????????7?12???????????????????????????????????????????????????????????????Oracle Database Firewall?????????????????????????:2.????????????????????????????????·???????(???????????????????)???Howard A.Schmidt?????·??????????????????????????????????????????????????????????????????????????(?????????????)?????????????????????????????????????????????? ?????(????????????????)?????????? 3.ISLA???????????????????????????????ISC2??????????????Information Security Leadership Achievement(ISLA)????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????(???????????????????)??????????????????????????????????????????···??????????????????????????

    Read the article

  • ???????/?????!!?????? ~OracleDatabase????~

    - by Yusuke.Yamamoto
    ????? ??:2011/08/24 ??:??????/?? Oracle Database ?????????????????????????????????????????? ????????????????Oracle Database ???????????:Oracle Advanced Security/ ????????????????????????????? ????????? ????????????????? http://otndnld.oracle.co.jp/ondemand/otn-seminar/movie/Ango_08240930.wmv http://www.oracle.com/technetwork/jp/ondemand/db-basic/20100824-encryption-251749-ja.pdf

    Read the article

  • ??·???????

    - by ???02
    ??·???????????????????????????????????IT????????????????????????·????????????????????????????????????????????????????????????????????????????????????ID???????????????·??????????????????????????????????????????????????????????????????????????????????????????????? ???????????·???????????????????????????ID??·??????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????ID??·????????????????????????????ID????????????ID?????????????????????????????????·??????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????Oracle Database Security???????????????????????????????????????????????????4?????????????????????4??????????????????????????????·??????????????Database Firewall???????????? ??????·??????????????? Database Firewall ??????????ID??·?????? ???????????????ID????????????????????????????? ID???????????ID?????????ID???????????????????????(????·?????)??????(??????????)ID?? ?????????????Identity Management???????????Oracle Direct ???????·???????????????????????????????????????? ????????????????????????????????? ????????????????????? ?????????????????????????????????????? Oracle Direct

    Read the article

  • ?????????

    - by ???02
    ??·???????????????????????????????????IT????????????????????????·????????????????????????????????????????????????????????????????????????????????????ID???????????????·??????????????????????????????????????????????????????????????????????????????????????????????? ???????????·???????????????????????????ID??·??????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????ID??·????????????????????????????ID????????????ID?????????????????????????????????·??????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????Oracle Database Security???????????????????????????????????????????????????4?????????????????????4??????????????????????????????·??????????????Database Firewall???????????? ??????·??????????????? Database Firewall ??????????ID??·?????? ???????????????ID????????????????????????????? ID???????????ID?????????ID???????????????????????(????·?????)??????(??????????)ID?? ?????????????Identity Management???????????Oracle Direct ???????·???????????????????????????????????????? ????????????????????????????????? ????????????????????? ?????????????????????????????????????? Oracle Direct

    Read the article

  • ?Pick-Up????????????Web??????????Oracle WebLogic Server 11g?Microsoft .NET WCF 4.0????? |WebLogic Channel|??????

    - by ???02
    ???????????????????????????????WebLogic Server?Microsoft .NET?????????????????????WS-*???Oracle??????(Oracle JDeveloper 11g?Oracle WebLogic Server??)??????????Web?????????????Microsoft??????(Visual Studio.NET 2010?Microsoft.NET 4.0 Framework?Windows Communication Foundation 4.0??)?????Web?????????????????????????????????????????????????·????????????????·?????????????????????????·??????????????????????????????????¦Oracle JDeveloper 11g¦Oracle WebLogic Server 11g¦Java API for XML Web Services(JAX-WS)2.0(JSR-224)¦Java Platform, Enterprise Edition(Java EE)¦Microsoft Visual Studio 2010¦Microsoft.NET 4.0¦Windows Communication Foundation(WCF)4.0¦WS-Security¦WS-SecurityPolicy¦WS-Profile¦X.509 Token Profile¦?????????????¦X.509???????¦XML¦C#?????

    Read the article

  • Developing online invoicing and inventory application.

    - by RPK
    My clients are using a desktop version of my inventory solution that I developed using .NET. I want to make an online version so that data is available centrally and clients can work from any location. I searched using Google to find similar tools and found few. I want to know what type of security considerations to take while designing such an application? Some clients can't afford dedicated server cost. What if I use shared hosting only? What are the risks of shared hosting?

    Read the article

  • Is it possible to tweak TStringField to work like TWideStringField in Delphi?

    - by mjustin
    We want to use Unicode with Delphi 2009 and Interbase, and found that to switch the character encoding from WIN1252 to UNICODE_FSS we first have to replace all instances of TStringField with TWideStringField in all datamodules. For around 60 datamodules, we can not simply do this over one weekend. I can see only two options for a migration strategy: find a workaround which allows to use the existing TStringField fields without triggering the 'expected: TWideStringField' error or remove all persistent fields to avoid the string type conflict As far as I know the field types for persistent database fields are registered in some kind of class registry. Could we use this to make Delphi believe that a TStringField is ok for a Interbase character column with UNICODE_FSS encoding? Or can we use a commercial dbExpress driver which work with TStringField in both cases? See also my related question: http://stackoverflow.com/questions/2302670/delphi-dbexpress-and-interbase-unicode-migration-steps-and-risks

    Read the article

  • Linux bash: when to use egrep instead of grep?

    - by Michael Mao
    Hi all : I am preparing for a Linux terminal assessment now, I tried to Google and found most resources are referring to the basic "grep" rather than the more powerful "egrep" -- well, that is at least what the professor said in lecture. I am always working with small samples so performance tuning is a thing too far away. So basically I'd like to know are there any areas where I must switch to egrep to do it in a better way? Is it safe to work with basic "grep" as for now? will there be potential risks? Sorry about my limited knowledge on Linux shell commands, the man page looks like a maze to me and honestly I haven't put much time in understanding all the features both command provide.

    Read the article

  • Should I use Google Web Toolkit for my new webapp?

    - by balint.miklos
    I would like to create a database backed interactive AJAX webapp which has a custom (specific kind of events, editing) calendaring system. This would involve quite a lot of JavaScript and AJAX, and I thought about Google Web Toolkit for the interface and Ruby on Rails for server side. Is Google Web Toolkit reliable and good? What hidden risks might be if I choose Google Web Toolkit? Can one easily combine it with Ruby on Rails on server side? Or should I try to use directly a JavaScript library like jQuery? I have no experience in web development except some HTML, but I am an experienced programmer (c++, java, c#), and I would like to use only free tools for this project.

    Read the article

  • Url encode and routing?

    - by Curtis White
    I'm using custom routing in a web forms context. I have some titles (part of my custom route) that have say a question mark character. When I URL encode this text ("Question?") and then pass into my route, I get an HTTP ERROR CODE 400. Apparently, the URL encoded text is somehow confusing the routing manager. Can someone provide context and explanation for this? Beyond that, I'm thinking I don't need to URL encode these route data but merely strip out the problem characters. Are there any security risks to not using URL decode/encode? And what are the problem characters? A list would be useful. Thanks!

    Read the article

  • Prevent password leakage while using sql* loader

    - by Jai
    I have shell script calling Sql*loader utility which inturn uses username/password as arguments. This details cannot be stored on server in any form due to security related policies. i got 2 approaches to handle this situation, 1. create hidden parameter file with login details and limit the access to owner. again the implication is i cannot store login data in any format on server 2. Create the user as OS authenticated and straight away login into sql without any userid/password I am not able to figure out risks involved in 2nd approach which u experienced folks could have come across. let me know if there is any other approach to handle password leakage issue

    Read the article

  • Absolute path of a file object

    - by Morgoth
    This has been discussed on StackOverflow before - I am trying to find a good way to find the absolute path of a file object, but I need it to be robust to os.chdir(), so cannot use f = file('test') os.path.abspath(f.name) Instead, I was wondering whether the following is a good solution - basically extending the file class so that on opening, the absolute path of the file is saved: class File(file): def __init__(self, filename, *args, **kwargs): self.abspath = os.path.abspath(filename) file.__init__(self, filename, *args, **kwargs) Then one can do f = File('test','rb') os.chdir('some_directory') f.abspath # absolute path can be accessed like this Are there any risks with doing this?

    Read the article

  • Dev efforts for different mobile platforms

    - by Juriy
    Hello guys, I'm in the middle of development of a client-server "socializing" that is supposed to run on several mobile devices. The project is pretty complex, involving networking, exchanging media, using geolocation services, and nice user UI. In terms of development efforts, technical risks and extensibility what is the best platform to start with? Taking into the account that the goal is go "live" as fast as possible with the mobile version. And second goal is to cover most users (but first is more important). iPhone (iPod iPad) Android BlackBerry Java ME, Symbian I realize that there are limitations on every platform, and there are different aspects to take into the account (for example iPhone has better developer's community then Android, J2ME runs in a terrible sandbox but covers most devices). Please share your pros and cons. I have the experience only with J2ME, unfortunately I can't evaluate other platforms.

    Read the article

  • ASP.NET - Manual authentication system

    - by Gal V
    Hello all, Wer'e developing an ASP.NET C# application, which will contain an authentication system that authenticates users in multiple levels (user, admin, super-admin, etc.). Our idea is NOT to use the built in ASP.NET forms authentication feature. Our plan is to create a whole 'new' system for it- based on the Session object, and SQL database contains users' info such as username & password. Is there any SERIOUS different between our idea to the Forms authentication feature? What security risks do we take? How do we solve them? Is this a good alternative for the forms authentication feature? Thanks in advance !

    Read the article

  • Why isn't UTF-8 allowed as the "ANSI" code page?

    - by dan04
    The Windows _setmbcp function allows any valid code page... (except UTF-7 and UTF-8, which are not supported) OK, not supporting UTF-7 makes sense: Characters have non-unique representations and that introduces complexity and security risks. But why not UTF-8? As I understand it, the "ANSI" versions of the Windows API functions convert their arguments to UTF-16, call the equivalent "W" function, and convert any strings in the output to "ANSI". This is what I've been doing manually. So why can't Windows do it for me?

    Read the article

  • Is it secure to use malloc?

    - by Felix Guerrero
    Somebody told me that allocating with malloc is not secure anymore, I'm not a C/C++ guru but I've made some stuff with malloc and C/C++. Does anyone know about what risks I'm into? Quoting him: [..] But indeed the weak point of C/C++ it is the security, and the Achilles' heel is indeed malloc and the abuse of pointers. C/C++ it is a well known insecure language. [..] There would be few apps in what I would not recommend to continue programming with C++."

    Read the article

  • folder structure for project documentation

    - by Qiulang
    Hi all, I saw some questions raised about the folder structure of source codes, but I never see the question about folder structure of project documentation. I googled it and still do not see many articles talk about. Here is one http://www.projectperfect.com.au/downloads/Info/info_project_folder_structure.pdf To quote some of its words: "There are two broad approaches: Organize by phase so that each top directory is a phase. For example, you might have directories for Feasibility, Business Analysis, Design etc. or whatever your phases are called. Organize by function so that the top directory level are functions. For example, Risks, Requirements, Scope, Change Control, Development. Most times a mix of both are used..." So any thought about it? I believe this is also an important issue!

    Read the article

  • CAD/CAM without C++

    - by zaladane
    Hello, Is it possible to do CAD/CAM software without having to use C++? My company developed their software with c/C++ but that was more than 10 years ago. Today,there is a lot of legacy code that switching would force us to get rid of but i was wondering what the actual risks are. We have a lot of mathematical algorithms for toolpath calculations, feature recognition and simulation and 3D Rendering and i was wondering if C# can handles all of that without great performance loss. Is it a utopia to rewrite such algorithms in c# or should that language only deal with UI. We are not talking about game development here (Halo 3 or Call Of Duty) so how much processing does CAD/CAM really need? Can anybody enlighten me on this matter? Most of my colleagues are hardcore C++ programmers and although i program in c++ i love .NET but i am having a hard time selling .NET to them other than basic UI. Does it make sense to consider switching to .NET in such a field, or is it just not a wise idea? Thank you

    Read the article

  • MySQL, Altering Table from Latin-1 to UTF-8

    - by brant
    I would like to rid new entries into my database of Latin-1 characters and just allow UTF-8. I plan to Alter table and make the following changes: Charset: latin1 - utf-8 Collation: latin1_swdish_ci - utf8_general_ci The table in question has 1 million rows. Is this a good idea? What are the risks of doing this? What happens to data that I try to input that is not in utf-8? What happens to data that has been previously entered that is not utf-8?

    Read the article

  • Class library modification / migration

    - by Clint
    I have 3 class libraries. A BBL, a DAL, and a DATA (about 15 datasets). Currently 4 [major] applications utilize the functionality in these DLL's. I'm rewriting one of those applications and I need to (1) Use some of the existing functionality in the libraries (2) Change some of it (3) Add new functionality (4) Add new datasets. I'm back and forth about the best way to do this, while keeping my risks at a minimum. Some thoughts.. 1) Use the existing projects and don't make any modifications, only additions 2) Make new libraries, bring over the code I can use, and make additions as needed 3) Implement partial classes in the existing projects Eventually all 4 applications will use the newest functionality, but it will be a slow migration; so the old code can't be depricated yet. Any thoughts?

    Read the article

  • Can Perforce remove a version entry (like ClearCase Destroy)?

    - by Tim
    I submitted a Changelist in Perforce, but I forgot to remove a couple of files from the list first. I want to undo those changes. I understand that Perforce allows me to "rollback" -- but that just submits another change to the file, cluttering my branch. This is a file I did not intend to change at all. When I go to integrate back into the baseline, this file shows up as needing to be integrated (even though it's the same as what's on the baseline). In Clearcase, I had the ability to simply issue a "destroy" command on the specific version of the file, nuking it from the repository, as if had never been (yes, I realize this is scary from a revision control perspective - I understand the risks). Is there an equivalent command in Perforce? Or am I trying to do something expressly forbidden?

    Read the article

< Previous Page | 257 258 259 260 261 262 263 264 265 266 267 268  | Next Page >