SEARCH KEYWORD -- Security camera
Huawei phone with HarmonyOS installed is becoming real
In past few days, there is a photo of a Huawei phone with HarmonyOS installed appearing on the web. This is an engineering testing phone circulating inside Huawei according to the source. This is the first time that a real phone with Huawei's own operating system HarmonyOS installed is being seen on the web. This indicates that it will not be that far for general public to be able to access the new Huawei self developed OS. From the photo, there are a few indications: This phone sample s...
8 very useful and free web security testing tools
With more pervasive of web applications, web security threats are becoming increasingly prominent. Hackers gain web server control by exploiting web server vulnerabilities and SQL injection vulnerabilities, then they may tamper with web content, or steal important internal data, the more serious is to inject malicious code into web pages to affect visitors of websites. Attention is gradually warming up to Web Application Security. Here we recommend eight very useful and free web security testing...
Website, security,Web security,Attack 2012-07-22 10:59:09
Never ever touch a programmer
This is a technical license plate block example. We don't know whether it is working or not, however, the idea is very good. When you drive through some of the junctions, the camera captures the license number and convert it into text with OCR, and then insert them into the database. Therefore, this license plate on the car becomes a SQL injection. This picture tells us -- never trust user input.Author : 陈皓 Source : http://coolshell.cn/articles/6639.html#more-6639...
Programmer,SQL injection 2012-04-21 01:19:48
Building Security onto Your Mobile Application
Analysts state that more than 75% of the mobile applications will fail the basic security tests in 2015 – Gartner Research. Enterprises that follow the Bring Your Own Device (BYOD) approach and facilitate mobile computing to their employees are susceptible to security threats and other vulnerabilities, unless they implement stringent security measures. In the development or deployment of mobile applications, a business can be severely impacted both financially and otherwise, if they are to...
Web Application Development Company, iPhone App Development Company 2015-08-21 07:22:32
10 stupid things smartphone users usually do
What are the things you like doing with your smartphones? Making phone calls? Playing games? Taking photos? Today we will not discuss what we should do with our smartphones, instead we will summarize 10 stupid things smartphone users usually do. 1. Taking photos of food and share them Please. The only time people want to stare at food is when we see the menu before ordering. 2. Sending SMS to solve dispute You will miss the two key components in communication : content and tone. 3. Holding mobil...
Smartphone,Stupid 2013-05-28 12:49:05
Samsung will release 10.1 inch Windows RT Tablet
Today, Samsung not only announced Galaxy Note â…¡, first Windows Phone 8 device Ativ S and camera EK-GC100 Galaxy equipped with Android 4.1 system, but also announced a Windows RT Tablet PC Samsung Ativ Tab.The 10.1-inch Samsung Ativ Tab has a resolution of 1366 x 768,1.5 GHz dual-core processor, 2G RAM, a 32/64G storage space, support for microSD memory expansion. Other configurations as well as the standard Wi-Fi and Bluetooth 4.0, support for USB 2.0, uHDMI and NFC.In addition, the table...
Jelly Bean distribution reaches 0.8% in all Android distributions
Jelly Bean (Android 4.1) is a surprise Google I/O conference bringing to us. After three weeks, Google official statistics said Jelly Bean distribution had reached 0.8% in all Android distributions.The latest Android ecosystem data shows Jelly Bean has a very good start, HSPA+ version of Galaxy Nexus can upgrade the system to Android 4.1(Jelly Bean) began in early July. The Ice Cream Sandwich system distribution rose to 15.8% from 10.9%, it became the second largest system version followin...
Jelly Bean,Distribution,Share 2012-08-03 15:11:27
How to check whether a web page can be loaded in iframe
Sometimes you may want to load other website's page in your own website's iframe, but due to some security concerns, other website may have security configurations which prevent you from loading their pages into your iframe. In this case, if you try to load them, you would see a blank page or a text message telling that it's prohibited. Fortunately, you can detect this before you actually decide to load it. To prevent a page from being loaded by an iframe from other site, the response ...
HTTP,HTML,IFRAME,SECURITY,X-FRAME-OPTIONS,CONTENT-SECURITY-POLICY 2018-07-27 22:36:02
iPhone App Development: What’s New For Developers In iOS 11
A curiosity ends with the introduction of iOS 11 on 5th of June 2017. It is the next-generation version of iOS. This update takes the best and most advanced operating system and turns it up to 11. But with iOS 11 was released to the public on 19 September 2017 and since then, there have been two distinct updates to iOS 11.02 which fixed the earpiece noise during phone calls; and the major iOS 11.1. iOS 10 was an operating system update that largely ignored the iPad, but Apple made up for it in ...
How to prevent next HeartBleed bug?
How to ensure the security of open source projects is a concern for many open source users including individual users and companies. But it's not an easy task to ensure the security of open source projects. Because everyone can see the source code, there is much higher possibility that a bug may be found by someone. Once a bug is disclosed, people may exploit it and do evil things, this may cause loss of money either for individuals or companies, some of the bugs may even have big impact to the...
Open source,HeartBleed,Security 2014-04-24 09:07:05
RECENT
- How Artificial Intelligence Is Helping Fight Environmental Challenges
- How to Deal with Accusations of Negligence as a Business
- Google's Business Operations in China Amid Antitrust Scrutiny
- Deploying DeepSeek-R1 Locally with a Custom RAG Knowledge Data Base
- Balancing Convenience and Security in the Digital World
- My AI Learning Journey: Exploring the Future of Technology
- Power Grid Simulation System 02 : FDI Power Outage Attack Case Study
- Be Careful When Using Cursor to Help Build Application
- Calculating Token Count for Claude API Using Go: A Step-by-Step Guide
- Understanding Cursor and WindSurf's Code Indexing Logic
- more>>