Search Results

Search found 15415 results on 617 pages for 'security groups'.

Page 297/617 | < Previous Page | 293 294 295 296 297 298 299 300 301 302 303 304  | Next Page >

  • CVE-2014-4020 Numeric Errors vulnerability in Wireshark

    - by Ritwik Ghoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2014-4020 Numeric Errors vulnerability 4.3 Wireshark Solaris 11.2 11.2.1.5.0 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • European SharePoint Conference - SP2013 workshop for developers with me

    - by Sahil Malik
    SharePoint 2010 Training: more information I’m delighted to be a part of the European SharePoint Conference, Feb 4-7 2013, in Copenhagen, Denmark.I will be conducting a full day workshop on SharePoint 2013 for Developers. You can register for the conference here. Here is the outline (willing to adjust it based on popular demand of course) SharePoint 2013 IntroductionClient Side Technologies, and Security Read full article ....

    Read the article

  • CVE-2012-1714 TList 6 ActiveX control remote code execution vulnerability in Hyperion Financial Management

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-1714 Remote code execution vulnerability 10 TList 6 ActiveX control Hyperion Financial Management 11.1.1.4 Contact Support Hyperion Financial Management 11.1.2.1.104 Microsoft Windows (32-bit) Microsoft Windows (64-bit) This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • The Hybrid Cloud: Having your Cake

    With a hybrid cloud, can you get the freedom and flexibility of a public cloud with the security and bandwidth of a private cloud? Robert Sheldon explains all the ins and outs. Free ebook "TortoiseSVN and Subversion Cookbook - Oracle Edition"Use these recipes to work better, faster, and do things you never knew you could do with SVN. If you're new to source control, this book provides a concise guide to getting the most out of Subversion. Download it for free.

    Read the article

  • Près de 10% des extensions Chrome seraient potentiellement malveillantes, d'après une étude

    Près de 10% des extensions Chrome seraient potentiellement malveillantes, d'après une étude Selon une étude réalisée par des chercheurs en sécurité et présentée hier lors de l'Usenix Security Symposium à San Diego (Californie), près de 10% des extensions du navigateur Google Chrome sont utilisées pour la fraude en affiliation et le vol de données. De plus, la plupart du temps, leurs actions sont indétectables par l'utilisateur. « Après avoir installé l'extension, l'utilisateur ne constate...

    Read the article

  • ideas on multiplayer games which include lots of collaboration?

    - by user494461
    For my master thesis I wanted to design a small multiplayer game which includes more than one player(maybe 5), has 2-3 players collaborating at a time to achieve some task. The most important thing is realistic simulation of the movable objects in the scene which more than one player should simultaneously interact with. I would also prefer large virtual environments (VEs) like mmogs where groups of players are interacting in different areas of the VE. tasks for players should include 2-3 players touching movable objects at same time. e,g, a very basic task can be users lifting a cube together and pushing it through a hole I am not new to designing virtual environments with openGL, but have never designed games before and rarely play other than few of my favorite ones like Fifa. I wanted some ideas on what kind of games should I look at which should help me with ideas for my tasks for the users to gain points and win in games? any current indie games which might inspire me?

    Read the article

  • Grouping IP Addresses based on ranges [on hold]

    - by mustard
    Say I have 5 different categories based on IP Address ranges for monitoring user base. What is the best way to categorize a list of input IP addresses into one of the 5 categories depending on which range it falls into? Would sorting using a segment tree structure be efficient? Specifically - I'm looking to see if there are more efficient ways to sort IP addresses into groups or ranges than using a segment sort. Example: I have a list of IP address ranges per country from http://dev.maxmind.com/geoip/legacy/geolite/ I am trying to group incoming user requests on a website per country for demographic analysis. My current approach is to use a segment tree structure for the IP address ranges and use lookups based on the structure to identify which range a given ip address belongs to. I would like to know if there is a better way of accomplishing this.

    Read the article

  • Include latest searches in search engines index

    - by drcelus
    My websites generally include a page with the (user input) latest searches. I know it's not a good security practice to allow this since you can find undesired content. On the other hand it boosts the number of pages indexed since every new search can provide a link on google and people can find you with related keywords that you are not using on your web page. What is the rationale behinf including or excludingthis results in search engines index ?

    Read the article

  • July 7th - Java 7th launch

    - by alexismp
    Java 7 is around the corner and Oracle is hosting a multi-city launch event on July 7th called "Java 7, Moving Java Forward". This event will be held simultaneously in Oracle HQ (Redwood Shores, CA), in Sao Paulo, Brazil and in London UK to celebrate to almost-ready version 7 of Java, the first one in five years! In addition to the live event and the ability for you to attend in person if you're in one of those cities, many Java User Groups are planning Java 7 meetings on the same day or soon after, so check your favorite JUG's upcoming meetings. Chances are there's a Java 7 event nearby. Tori has all the details for this launch event over on the OTN blog. Register directly here.

    Read the article

  • Which of these courses are the hardest and why?

    - by DSL Client
    Which of these courses are the hardest and why? What should I watch out for? Probability and Statistics for Computer Science Introduction to Software Engineering Data Structures and Algorithms Operating Systems Introduction to Theoretical Computer Science System Hardware Advanced Program Design with C++ Information Systems Security Computer Architecture Databases Web Programming Computer Graphics Digital System Design

    Read the article

  • CVE-2011-5035 Denial of service (DoS) vulnerability in Oracle Virtual Desktop Infrastructure (VDI)

    - by RitwikGhoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-5035 Denial of service (DoS) vulnerability 5.0 Apache Tomcat VDI 3.3 Linux Solaris VDI 3.2 Solaris This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Sharing Code - Online and Offline

    Today's guest blog post comes from Matthias B?chner, Software Engineer at digital security company, Gemalto . Here he discusses their Device Administration Service, and their recent port to...

    Read the article

  • CVE-2011-4576 Information Disclosure vulnerability in OpenSSL

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2011-4576 Information Disclosure vulnerability 5.0 OpenSSL Solaris 10 SPARC: 147707-03 X86: 146672-04 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Is it possible to change the group list shown on the application launcher?

    - by Grobbendonk
    I just installed Unity, on Ubuntu 10.10, to try it out. I've tried fiddling with a few things, but I can't work out how the applications are grouped and listed. I mean - if I click on the Applications in the launcher, we get the list of applications installed, with the option to narrow the selection by group. i.e. |Search box|All applications|Accessories|Games|Internet|Media|Office|System| My question is where that list is generated - my machine is mostly for work, so the games have been uninstalled (and I get a "there are no games on this box" message, which is nice), and there's a stack of other stuff I'd like to see under a new group of "work" or something. Obviously, a logical follow-up - how does unity know how to classify the applications into those groups? Is it the info in the .desktop links to them?

    Read the article

  • Microsoft peint un tableau sombre pour les utilisateurs de Windows XP, le taux d'infection de l'OS serait de 6 fois supérieur à celui de Windows 8

    Microsoft peint un tableau sombre pour les utilisateurs de Windows XP le taux d'infection de l'OS serait de 6 fois supérieur à celui de Windows 8Microsoft brandit une nouvelle fois la carte de la sécurité pour inciter les utilisateurs à abandonner Windows XP.Le célèbre système d'exploitation vieux de douze ans et qui ne bénéficiera plus d'aucune mise à jour de sécurité à partir du 8 avril 2014, a été au centre du dernier rapport de sécurité de Microsoft (Security Intelligence Report - SIRv15).Les...

    Read the article

  • Microsoft Releases June Patch Targeting 34 Flaws

    Microsoft today released 10 fixes in its June security update, with three deemed "critical" and seven considered "important" to patch....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • I know of three ways in which SRP helps reduce coupling. Are there even more? [closed]

    - by user1483278
    I'd like to figure all the possible ways SRP helps us reduce coupling. Thus far I can think of three: 1) If class A has more than one responsibility, these responsibilities become coupled and as such changes to one of these responsibilities may require changes to other of A's responsibilities. 2) Related functionality usually needs to be changed for the same reason and by grouping it togerther in a single class, the changes can be made in as few places as possible ( at best changes only need be made to the class which groups together these functionalities) 3) Assuming class A performs two tasks ( thus may change for two reasons ), then number of classes utilising A will be greater than if A performed just a single task ( reason being that some classes will need A to perform first task, other will need A for second task, and still others will utilise it for both tasks ).This also means that when A breaks, the number of classes ( utilising A ) being impaired will be greater than if A performed just a single task. Can SRP also help reduce coupling in any other way, not described above? Thank you

    Read the article

  • What exercises counter the back pain of sitting at a computer for 15 hours a day? [on hold]

    - by Sam
    I work up to 15 hours a day (not everyday :)) programming. When I do this I get a very sore lower back. I don't want to spend $1000 on a special chair like Joel Spolsky says. I'm sure I'm not alone here. Has anybody encountered this and found an exercise/other method to combat it? Maybe somebody with more physical education than me about opposing muscle groups or something. PS (not working fifteen hours a day isn't an answer, it's how I work best) and it's not off topic as programming is about more than code - it's a verb.

    Read the article

  • ACL tool for audit of Ubuntu production servers

    - by migrator
    In my production environment, I have close to 10 Ubuntu 12.04 Servers and I want to get the list of users from them. I am looking for some kind of script or tool (non-gui) to get the same. Yes, I can get the list from /etc/passwd and /etc/groups files but it would be good to have a tool or script to do this due to the following reasons. I have right now 10 systems in Ubuntu and 30 systems in Windows 2003. I am recommending my organization and IT to move all the systems to Ubuntu except the one running MS SQL server We do not have good Ubuntu admins with us and they should not mess up with the system if I give some manual commands I also need to find out date of creation of user, group, password standards like strength, expiry etc Please help me as I want to automate the process and get the list on weekly basis from IT team. Thanks in advance.

    Read the article

< Previous Page | 293 294 295 296 297 298 299 300 301 302 303 304  | Next Page >