SEARCH KEYWORD -- Android security
Google's acquisition of Quickoffice threatens Microsoft
Windows has over 90% market share in desktop operating systems, even though now other OS such as Mac OS and Linux are saying they are more user friendly, more stable and safer than Windows, Windows still has a weapon MS Office which can defeat all of them. However, with the development of mobile network and cloud computing, Windows is now challenged by different competitors on mobile and cloud areas. Mobile and cloud are weak sides of Microsoft , but they are strength of Google.Google sudd...
Google,QuickOffice,Microsoft,MS Office 2012-06-07 11:40:10
NativeScript-Vue 1.0 Is Finally Out!
After a year of hard work and dedication, NativeScript-Vue 1.0 is finally available in the market. For those who are new to NativeScript- Vue, it is all about a plugin that simply allows one to build native iOS and Android apps with the help of Vue.js. NativeScript-Vue 1.0 is ready for use in production! And it may quite interest you to know that blending of NativeScript and Vue makes it even easier when it comes to building mobile apps. This launch comes with a shiny new website and extensive d...
JAVASCRIPT,HYBRID APP DEVELOPMENT,NATIVESCRIPT,VUE.JS,MOBILE APPLICATION 2018-02-26 00:14:03
WireGuard VPN: Setup WG_VPN client App on Android phone and connect to local WG_VPN server on VM
We will show the detail steps about how to setup the WireGuard VPN client on an Android phone/pad and configure the VPN client to connect a WG_VPN server in local network. The setup process contents three main steps: Install WireGuard and create a key-pair in WireGuard client. Add the Android client peer information in the WireGuard server’s config file. Config the Android WireGuard client to connect to the server. The test environment network configuration: Step 1. Install Wire...
8 very useful and free web security testing tools
With more pervasive of web applications, web security threats are becoming increasingly prominent. Hackers gain web server control by exploiting web server vulnerabilities and SQL injection vulnerabilities, then they may tamper with web content, or steal important internal data, the more serious is to inject malicious code into web pages to affect visitors of websites. Attention is gradually warming up to Web Application Security. Here we recommend eight very useful and free web security testing...
Website, security,Web security,Attack 2012-07-22 10:59:09
Building Security onto Your Mobile Application
Analysts state that more than 75% of the mobile applications will fail the basic security tests in 2015 – Gartner Research. Enterprises that follow the Bring Your Own Device (BYOD) approach and facilitate mobile computing to their employees are susceptible to security threats and other vulnerabilities, unless they implement stringent security measures. In the development or deployment of mobile applications, a business can be severely impacted both financially and otherwise, if they are to...
Web Application Development Company, iPhone App Development Company 2015-08-21 07:22:32
Will tablet revolution really come soon?
The famous Silicon Valley entrepreneur and academic Vivek Wadhwa said a few months ago that tablet revolution would come only if the price dropped below $100. According to The Wall Street Journal, the 4th largest PC manufacturer Acer seems to be the first one to eat crab. It plans to promote $88 Android tablet Acer Iconia B1. Does this indicate that the tablet revolution is coming? According to a person who knows the Acer tablet project, Acer Iconia B1 configuration will be similar to those of ...
Acer,Tablet,Low price,Tablet revolution 2012-12-24 20:51:33
What's wrong with us in Mobile Era?
Every day when I surf the Internet, I find much news about new smartphones and Android, iOS apps. Also I can find many people use iPhones and other smartphones with Android OS. Apparently we are now in Mobile era. People can find tons of news that says how Mobile has changed our life, made our life simpler and how easy we can know the world with mobile technology. Yes, it's true, now we only need to press a button, we can know what happens in USA which is thousands kilometres away from us. We ca...
Mobile,Cold,Stay away,Smartphone 2012-01-07 12:10:35
How to check whether a web page can be loaded in iframe
Sometimes you may want to load other website's page in your own website's iframe, but due to some security concerns, other website may have security configurations which prevent you from loading their pages into your iframe. In this case, if you try to load them, you would see a blank page or a text message telling that it's prohibited. Fortunately, you can detect this before you actually decide to load it. To prevent a page from being loaded by an iframe from other site, the response ...
HTTP,HTML,IFRAME,SECURITY,X-FRAME-OPTIONS,CONTENT-SECURITY-POLICY 2018-07-27 22:36:02
How to prevent next HeartBleed bug?
How to ensure the security of open source projects is a concern for many open source users including individual users and companies. But it's not an easy task to ensure the security of open source projects. Because everyone can see the source code, there is much higher possibility that a bug may be found by someone. Once a bug is disclosed, people may exploit it and do evil things, this may cause loss of money either for individuals or companies, some of the bugs may even have big impact to the...
Open source,HeartBleed,Security 2014-04-24 09:07:05
Generate certificate in Java -- Certificate chain
In previous post, we have introduced the use of Certificate and how to generate self signed certificate using Java. In this post, we will show you how to generate a certificate chain. Sometimes we may only have a certificate request or we don't have a trusted certificate which can be used for business. Now we need to have a trusted CA to sign our certificate so that it can be used on SSL communications. To generate a certificate chain, we may first have our own certificate(A), then we may use ot...
Java,Certificate chain,Creation, Pure Java 2014-07-30 08:24:52
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>