SEARCH KEYWORD -- Password



  Simple Strategies to Boost Your Android Phone Security

Android is one of the safest operating systems for smartphones and tablets if used correctly. Unfortunately, only a third of Android users use the latest version, and older versions are far more vulnerable than newer ones. Not to mention that many manufacturers take their time when it comes to downloading the latest security patches. A news blog Android Authority ranked the fastest manufacturers in downloading system updates. Here are the results: LG - 78 days Motorola - 88 days HTC - 95 days S...

   ANDROID,DATA SECURITY     2019-02-19 07:36:46

  5 Things You Can Do to Protect Your Data

The average cost of a data breach is $148 per record. Records include everything from personal addresses to birthdates to even more sensitive data, like Social Security Numbers and business files. Each year, these hacks cumulatively cost billions of dollars to companies and individual users. Nonetheless, like many other criminals, hackers tend to prey on easy targets. By following these essential steps, you’ll be able to ensure your data is always kept safe. 1) Use a File Encryption Servic...

   DATA SECURITY     2019-08-20 08:35:54

  Why should we drop or reduce use of MD5?

MD5 is a frequently used one-way hash algorithm, it is commonly used in following situations: Check data integrity. We take hash of the data stored in two different places and compare them. If the hash results are the same, then there is no need to check the actual data. This utilizes the collision-resistant feature. Two different data block will have little chance that their hash values will be the same. Many data service providers use such technique to check repeated data to avoild repeating...

   MD5,Vulnerability,attack     2012-09-29 04:47:49

  How to install Oracle database on Linux using response file

There are two ways to install Oracle database on Linux :1). Using GUI; 2). Using response file. In this post, the method for using response file will be introduced. To install Oracle, please first get the Oracle database installation file ready. It can be downloaded from Oracle OTN. You need to have an Oracle account before you can download them. And there are three major components of the Oracle database installation : 1). The installation itself; 2). The network configuration; 3). Database cre...

   LINUX,HOW TO,ORACLE DATABASE     2017-06-03 04:15:49

  PHP Apache MySQL Set-up Note

With the emergence of WAMP, LAMP, PHP developers are liberated from the tedious work of setting up PHP environment. Since PHP, Apache and MySQL are so tightly bundled, WAMP and LAMP provide a setp solution for setting up a PHP environment which includes the programming programming environment, server and database. But for a PHP who wants to learn more, you have to try to set the PHP environment yourself by installing PHP, Apache and MySQL manually and configuring them. Below is a simple note on ...

   PHP,Apache,MySQL     2014-04-07 01:56:43

  Mozilla releases a web identity system : Persona

Now almost every website requires the user to register, there are many benefits of registration for a website, such as retaining users, accommodating discussions, providing customized content and so on.But there is too much trouble if each site requires registration, right?Of course, users can also have their own way, for those less important sites, for example, using a unified user name, password and email so that you only need to remember one account. Then, we also see some advanced methods em...

   Mozilla,Persona,Security,ID     2012-09-28 12:02:25

  Tips to Keep in Mind When Adding Devices to WiFi

When it comes to powerful tools, it is hard to beat the Internet. We can use it to access a huge variety of news, information, entertainment, products and more. When the Internet first became a thing, people pretty much had to be sitting at their computers to use it. But now, thanks to the advent of a wireless network known as WiFi, you can connect to the Internet through your smartphones, streaming devices, laptops and more from anywhere in the house. If you are in the market for some new tech...

   ROUTER,TIPS,WIFI     2021-10-01 08:19:19

  Remote execute command in Java example

Frequently there is a need to logon to a remote system and run some commands or programs to get the output, many software can serve this purpose such as putty and gitshell.These software usually provide secure access to the remote system. But have you ever wondered what to do if you need to run commands on many different systems at the same time and get all these results back at a single place? Especially in big data era, many tasks may run on different distributed systems and you want o have a ...

   JSch, Example, Distributed system, SSH2     2014-12-12 03:20:19

  8 powerful Chrome extensions

Chrome is a powerful browser, one reason why it's so powerful is that it has abundant extensions. There are various extensions in Chrome Web Store. They can meet all kinds of needs you have and they are very easy to install as well. Here we share with you 8 powerful extensions on Chrome. All of them can be downloaded from Chrome Web Store Holmes A bookmark search tool, if you have lots of bookmarks and you even don't know where they are. Hplmes can help you find them in real time by matching tit...

   Chrome,extension     2013-07-31 01:24:18

  OpenLDAP Proxy -- slapd.conf

In the introductory post of OpenLDAP proxy, we mentioned that slapd.conf is the configuration file which tells the slapd service what to do.  Apart from this, there is a dynamic way of configuring slapd where the configurations are stored in LDIF database. In the future, LDIF database will be the one for configuring slapd, the old style of slapd.conf is deprecated. The slapd.conf can be converted to LDIF style using the slapdtest command. slapdtest -f /etc/ldap/slapd.conf -F /etc...

   OPENLDAP,OPENLDAP PROXY,SLAPD,SLAPD.CONF     2017-10-29 04:01:39