SEARCH KEYWORD -- CYBER SECURITY



  Is Facebook becoming Tencent like?

Recently there is news that Facebook is developing a Reader application which is to compete with Flipboard and Pulse. This reminds me a few movements of Facebook in the past few months. First they built a copy of Snapchat named Poke which failed badly at last. Then they launched a new feature on Instagram named Video on Instagram which allows users to shoot and share short videos up to 15 seconds. This feature is to compete with Vine from Twitter. It seems Instagram wins over Vine on this. You c...

   Facebook,Tencent,Copy     2013-06-24 01:17:27

  Want to install 64 bit OS on VirtualBox?

By default, VirtualBox only allows to install 32 bit OS on it. But sometimes, 64 bit OS is wanted for specific uses such as running platform specific tests. To allow installing 64 bit OS on VirtualBox. Below information is needed. Here is the official documentation about 64 bit OS: VirtualBox supports 64-bit guest operating systems, even on 32-bit host operating systems, provided that the following conditions are met: You need a 64-bit processor with hardware virtualization support (see the ...

   VirtualBox,64 bit,hardware virtualization,Ubuntu     2014-11-08 03:52:07

  SIEM Big Data Visualization [04] : Data Transmission Latency SIEM Log Analysis Dashboard

This article will introduce the Data Transmission Latency Log Analysis Dashboard developed for SIEM big data analytics. This is part of the SIEM big data visualization project, if you are interested about other dashboard plug in, you can check below links: SIEM Big Data Visualization [01] : Dashboard for Monitoring Scam Events in Critical Infrastructure SIEM Big Data Visualization [02] : Dashboard for Summarizing SG National Cyber Threats in Critical Infrastructure SIEM Big Data Visualization [...

       2024-11-03 20:49:18

  Remove browse button from input type=file

In Web 2.0 era, many websites will ask the user to upload their avatar when creating their profile. In HTML, the input control we should use is input="file". This is a file control provided by the browser vendor and it should be ran in a sandbox for security consideration. Browsers don't provide ways to choose file from local and upload to the remote server without the input="file" control.  There is one annoying part about the input="file", which is a default button named "Choose File" or...

   file,html,browse,remove browse button     2015-07-12 05:17:51

  Developing an eCommerce Website? Here are 4 Things to Keep in Mind

  When it comes to Web development, it is a complicated process. There is a plethora of facets to assess, from performance to user experience. As far as building an eCommerce site is concerned, it is quite a challenging task. Most of the users tend to visit the website in order to gather information about and purchase products. For this reason, a Web Application Development Company tries its best to make this process intuitive and effortless. Besides considering usability, there are some po...

       2015-12-22 05:28:33

  Java Interview Questions

Currently there are many articles online which summarize the list of Java interview questions. Some cover lots of basic questions and some cover some specific questions in specific area such as multithreading. In this post, we will not cover the really basic questions, we will cover something different. For basic question, you can read Java Interview Questions。 Basic What is primitive data type? How many primitive data types in Java? What are they? -- A primitive type is prede...

   JAVA,SECURITY,INTERVIEW,CAREER,MULTITHREADING,QUESTION,JAVA INTERVIEW,JAVA CORE     2019-01-21 07:07:08

  Things to Look for in Microsoft .NET Framework 4.7

The .NET Framework 4.7 is the updated version of the .NET Framework 4.6.2.  It can run along with earlier versions of the .NET Framework. On installation it appears as an update for Microsoft Windows under the Installed Updates item in Control Panel. The improvements in the.NET Framework 4.7 includes: High DPI support for Windows Forms applications on Windows 10 Touch support for WPF applications on Windows 10 Enhanced cryptography support Performance improvements .NET Framework Documenta...

   ASP.NET, ASP.NET FRAMEWORK     2017-07-18 05:55:20

  Why should we drop or reduce use of MD5?

MD5 is a frequently used one-way hash algorithm, it is commonly used in following situations: Check data integrity. We take hash of the data stored in two different places and compare them. If the hash results are the same, then there is no need to check the actual data. This utilizes the collision-resistant feature. Two different data block will have little chance that their hash values will be the same. Many data service providers use such technique to check repeated data to avoild repeating...

   MD5,Vulnerability,attack     2012-09-29 04:47:49

  SIEM Big Data Visualization : Dashboard for Monitoring Scam Events in Critical Infrastructure

Project Design Purpose: In a Security Information and Event Management (SIEM) system, effective monitoring and visualization of scam events is crucial to detecting and responding to cyberattacks. Cybercriminals often use deceptive methods to exploit individuals or organizations, aiming to steal sensitive information, financial assets, or disrupt operations. This project seeks to develop a web plugin dashboard to help cybersecurity researchers and managers better understand the scope and impact ...

       2024-10-05 20:47:09

  How IoT is Challenging The World of "Smart" Cars

Smart cars have long been the subject of optimism in the auto industry, with their suites of advanced driver assistance and road safety features. Handy as they are, however, their convenient systems come with a substantially higher price tag. For now, however, many car owners are opting into a cheaper, more modular way to enhance their driving experience: a network of IoT devices. This makes it so that even pre-loved cars can enjoy the same features as smart cars. While IoT remains small at the...

   HARDWARE,IOT,CAR     2020-03-09 07:42:26