SEARCH KEYWORD -- Android security



  Google's acquisition of Quickoffice threatens Microsoft

Windows has over 90% market share in desktop operating systems, even though now other OS such as Mac OS and Linux are saying they are more user friendly, more stable and safer than Windows, Windows still has a weapon MS Office which can defeat all of them. However, with the development of mobile network and cloud computing, Windows is now challenged by different competitors on mobile and cloud areas.  Mobile and cloud are weak sides of Microsoft , but they are strength of Google.Google sudd...

   Google,QuickOffice,Microsoft,MS Office     2012-06-07 11:40:10

  NativeScript-Vue 1.0 Is Finally Out!

After a year of hard work and dedication, NativeScript-Vue 1.0 is finally available in the market. For those who are new to NativeScript- Vue, it is all about a plugin that simply allows one to build native iOS and Android apps with the help of Vue.js. NativeScript-Vue 1.0 is ready for use in production! And it may quite interest you to know that blending of NativeScript and Vue makes it even easier when it comes to building mobile apps. This launch comes with a shiny new website and extensive d...

   JAVASCRIPT,HYBRID APP DEVELOPMENT,NATIVESCRIPT,VUE.JS,MOBILE APPLICATION     2018-02-26 00:14:03

  WireGuard VPN: Setup WG_VPN client App on Android phone and connect to local WG_VPN server on VM

We will show the detail steps about how to setup the WireGuard VPN client on an Android phone/pad and configure the VPN client to connect a WG_VPN server in local network. The setup process contents three main steps: Install WireGuard and create a key-pair in WireGuard client. Add the Android client peer information in the WireGuard server’s config file. Config the Android WireGuard client to connect to the server. The test environment network configuration:  Step 1. Install Wire...

   WIREGUARD,VPN,TUTORIAL     2020-10-24 08:46:42

  8 very useful and free web security testing tools

With more pervasive of web applications, web security threats are becoming increasingly prominent. Hackers gain web server control by exploiting web server vulnerabilities and SQL injection vulnerabilities, then they may tamper with web content, or steal important internal data, the more serious is to inject malicious code into web pages to affect visitors of websites. Attention is gradually warming up to Web Application Security. Here we recommend eight very useful and free web security testing...

   Website, security,Web security,Attack     2012-07-22 10:59:09

  Building Security onto Your Mobile Application

Analysts state that more than 75% of the mobile applications will fail the basic security tests in 2015 – Gartner Research. Enterprises that follow the Bring Your Own Device (BYOD) approach and facilitate mobile computing to their employees are susceptible to security threats and other vulnerabilities, unless they implement stringent security measures. In the development or deployment of mobile applications, a business can be severely impacted both financially and otherwise, if they are to...

   Web Application Development Company, iPhone App Development Company     2015-08-21 07:22:32

  Will tablet revolution really come soon?

The famous Silicon Valley entrepreneur and academic Vivek Wadhwa said a few months ago that tablet revolution would come only if the price dropped below $100. According to The Wall Street Journal, the 4th largest PC manufacturer Acer seems to be the first one to eat crab. It plans to promote $88 Android tablet Acer Iconia B1. Does this indicate that the tablet revolution is coming? According to a person who knows the Acer tablet project, Acer Iconia B1 configuration will be similar to those of ...

   Acer,Tablet,Low price,Tablet revolution     2012-12-24 20:51:33

  What's wrong with us in Mobile Era?

Every day when I surf the Internet, I find much news about new smartphones and Android, iOS apps. Also I can find many people use iPhones and other smartphones with Android OS. Apparently we are now in Mobile era. People can find tons of news that says how Mobile has changed our life, made our life simpler and how easy we can know the world with mobile technology. Yes, it's true, now we only need to press a button, we can know what happens in USA which is thousands kilometres away from us. We ca...

   Mobile,Cold,Stay away,Smartphone     2012-01-07 12:10:35

  How to check whether a web page can be loaded in iframe

Sometimes you may want to load other website's page in your own website's iframe, but due to some security concerns, other website may have security configurations which prevent you from loading their pages into your iframe. In this case, if you try to load them, you would see a blank page or a text message telling that it's prohibited. Fortunately, you can detect this before you actually decide to load it. To prevent a page from being loaded by an iframe from other site, the response ...

   HTTP,HTML,IFRAME,SECURITY,X-FRAME-OPTIONS,CONTENT-SECURITY-POLICY     2018-07-27 22:36:02

  How to prevent next HeartBleed bug?

How to ensure the security of open source projects is a concern for many open source users including individual users and companies. But it's not an easy task to ensure the security of open source projects. Because everyone can see the source code, there is much higher possibility that a bug may be found by someone. Once a bug is disclosed, people may exploit it and do evil things, this may cause loss of money either for individuals or companies, some of the bugs may even have big impact to the...

   Open source,HeartBleed,Security     2014-04-24 09:07:05

  Generate certificate in Java -- Certificate chain

In previous post, we have introduced the use of Certificate and how to generate self signed certificate using Java. In this post, we will show you how to generate a certificate chain. Sometimes we may only have a certificate request or we don't have a trusted certificate which can be used for business. Now we need to have a trusted CA to sign our certificate so that it can be used on SSL communications. To generate a certificate chain, we may first have our own certificate(A), then we may use ot...

   Java,Certificate chain,Creation, Pure Java     2014-07-30 08:24:52