Microsoft has been known as a company that changes its direction, and more importantly changes the user interfaces and names of their products continuously. Their search website Bing just doesn’t gain much attention, Windows Vista was one of their biggest failures (aside from Microsoft Bob) and now they try to change the way people interact with computers via the new Metro interface. What’s the problem? I’ll explain my view about it.
At the start of 2012 Apple released a new service called iTunes Match. This service which costs $24.99 a year analyzes your music library. If a song is a available in the iTunes Store, it will be available through iCloud for free, using a high-quality 256kbps AAC format. All other songs will be copied to your iCloud account in their original form. The purpose of iTunes Match is making your music available to all devices that are associated to your iTunes Store account, and can therefore be streamed or downloaded to those devices. At the beginning it was only available in the US. But because I live in Europe and don’t have a valid US Credit Card I couldn’t use it until it was released in European countries a month ago. I mostly use my US iTunes account using iTunes Credit coupons, but I had to use my EU account for iTunes Match.
When I was reading the NY Times yesterday I’ve read this interesting article about a security officer of a company who has managed to connect to video conferencing equipment in boardrooms and was therefore able to control the camera and hear what is going on in these rooms (http://www.nytimes.com/2012/01/23/technology/flaws-in-videoconferencing-systems-put-boardrooms-at-risk.html).
In theory he could eavesdrop on conversations that where happening in these boardrooms. Companies who utilize video conferencing solutions around the globe suddenly start to realize that they might be at risk. I’ll try by best explaining the vulnerability and possible solutions.
CSRF, also known as Cross-Site Request Forgery is a trick which is commonly targeted to web forms. This is often used by (spam)bots but also by individuals who might try to break into your application.
At these times your visitors have all kinds of different screen resolutions and also resize their browser window. Resolutions vary between 1280×1024, 1680×1050, 1920×1200, 2560×1440 and all make a huge difference. And then there’s the difference between people who have their browser window maximized, while others resize it so they can fit other windows on the screen as well. There’s a relatively easy way to make it fit the window properly.
This guide will demonstrate how to deploy DKIM on Debian-based Linux distributions. Other distributions work similar, except some do not use the scripts in init.d. The configuration of DKIM will be the same. I will discuss HOW to deploy it, not WHY to deploy it as I assume you’ve already decided to do so.
Imagine that your company’s network owns the IPv4 range 184.108.40.206 – 220.127.116.11. The Reverse Lookup zone would be 60.50.40.in-addr.arpa, covering this entire network. Your primary nameserver is ns.acme.com. Your zone would look something like this:
60.50.40.in-addr.arpa ns.acme.com. support.acme.com. ( 20111202001 4h 1h 1w 1h ) @ IN NS ns.acme.com. 1 IN PTR www.acme.com.
But now you want to delegate the range 18.104.22.168 – 22.214.171.124 to the nameserver coyote.acme.com. Since it also resides in the same reverse zone, you cannot delegate this entire zone, as this would just move your entire network to the control of coyote.acme com, something you might not want to achieve with delegation.
In this short tutorial I will show you some ways to protect a (login) web form against the most common types of attacks, making it much safer.
I will use PHP as the server-side programming language, but any other language will provide similar features.
Since PHP version 5 has been released, it has been improved with Object-Oriented Programming, using classes. It’s one of the most used features in system programming languages like C++ and can now be used in PHP.
In this article I assume you know the following in advance:
– You know what variables are and how to assign values to them in PHP.
– You know what a function is and how it works.
Before I start, I want to tell a bit about functions.