SEARCH KEYWORD -- Web security



  An experience on fixing HTTP 406 Not Acceptable error

This post is about an experience of mine on fixing a HTTP 406 Not Acceptable error seen on one of my page. Just got back from a business trip and opened my computer as usual to start to monitor my website statistics. But when I opened the page on showing real time page views, it shows nothing but zero. So I pressed F12 to bring up the developer tool to check on what's going on. The logic of loading the real time page view is backed by AJAX call. In the developer tool console, I see that the rAJA...

   PHP,AJAX,HTML,HTTP 406,CONTENT-TYPE     2019-03-30 04:09:10

  Generate certificate in Java -- Store certificate in KeyStore

In previous post, we have explained how to create a certificate chain in Java. After generating the chain, we need to store it somewhere so that it can be used later when we are doing the actual SSL communication, either in a key store or trust store. This post will show you how to store the private key and its associated certificate chain in a keystore file. There are different types of keystore in Java, in this post, we will choose the JKS to demonstrate how to store the certificate chain. Whe...

   Java,Certificate chain,Keystore     2014-08-20 03:56:39

  Why Outsourcing .Net Services is a Growing Trend?

IT companies are focusing more on .net for application development. This is because; the .net platform empowers developers with a wide range of tools and libraries to create diverse applications in an easy and efficient manner. The dot net framework allows users i.e. developers, to design and develop applications that can interact with web services and a range of online devices. .Net programming language is richer than others in many contexts. It has several objects oriented features like proper...

   dot net services, outsourcing, .net, framework     2014-10-23 22:30:43

  Evolution mail configuration with Hotmail on Ubuntu

Evolution mail now is the default Email client on Ubuntu. When we configure this mail client with Hotmail. The steps should be followed.   Step 1: Open Evolution mail through Applications->Internet->Evolution mail    Step 2: Goto Edit->Preferences   Step 3 : Click Add button or double click on the added mail account.   Step 4 : On the Identity tab, fill the Hotmail account you want to use.    Step 5 : On "Receiving email" Tab,      ...

   Ubuntu,Evolution mail,Hotmail,Configurat     2011-04-28 09:24:01

  Cybersecurity | The New Dangers That Lurk Online and Their Solutions

(Image source: Pexels) Data is one of the most important things to us. While robbers that steal valuables like laptops, phones, or money are still a threat, cybercrimes are also more dangerous than ever. That’s because your data is far more valuable than you might think. Companies benefit from users’ data by applying it for their indexing, marketing, and accumulation needs. They actively use this information to sell you more products. Have you ever visited Amazon and instantly got a ...

   DATA SECURITY,VPN     2020-04-23 06:47:37

  What does a contemporary web developer need to know?

The early ages of web era mainly consisted of webpages of text and links. At that time,Netscape was the still dominant of web browser market. As a web developer, you could develop web apps(or better to call web pages) easily with knowledge of HTML only. But with the evolution of web, new technologies came out, we can see more robust web apps around us everywhere. Today as a web developer, the ability to run and configure a web server and edit HTML to create some simple web pages has lost almost ...

   Web design,Advice     2013-12-20 06:31:51

  Difference between keystore and truststore

Security has become a vital concern in most of the online transactions nowadays. Lots of the world's most popular websites have adopted security protocols to transfer data, especially sensitive data. These security protocols including SSL/TLS which are using the private/public key exchange mechanism to establish secure connections.  The private/public key cryptography is a really important invention and it allows data to be transferred securely and solves the big problem of transferrin...

   KEYSTORE,TRUSTSTORE,SECURITY,SSL     2017-03-04 07:52:47

  Crash your Chrome with %%30%30

Have you ever wondered a simple string can crash one of the most sophisticated designed web browsers -- Chrome? There is a finding from Andris Atteka who found that a null string "%%30%30" appended to an URL can crash Chrome. For example, if you have below URL in your browser address bar or you mouse over below URL, Chrome will crash: http://www.pixelstech.net/%%30%30 When the browser crashed, it may show : Or on Windows, you will see : This bug has been reported to Google at Is...

   CRASH,SECURITY,CHROME,GOOGLE     2015-09-20 08:24:16

  Leveraging Dedicated Server Hosting for Data Analytics Firms

In the age of data-driven decision making, data analytics firms require powerful and reliable computing resources to extract insights from massive data sets. A dedicated server is a type of server that is solely allocated to a single user or organization. In this article, we will explore the benefits of using a dedicated server for data analytics firms. Enhanced Performance A dedicated server offers enhanced performance that cannot be matched by other types of servers. Here are some of the benef...

   HOSTING SERVICE     2023-05-12 04:18:56

  Chrome to block mixed content downloads in version 86

Google has announced its plan to block mixed content downloads in Chrome in February 2020 and now the day to block mixed content downloads is coming soon as we are nearing October when Chrome 86 is supposed to be released. What is mixed content downloads? According to Google, it is non-HTTPS downloads started on secure pages. For example, if you access a page called https://example.com/download, and in this page, there is a download link to http://download.example.com/something, ...

   CHROME,MIXED CONTENT DOWNLOADS     2020-09-18 21:10:53