News in the Category: Security Subscribe to the rss of this category.

Total posts: 1242 | Sort by Views | Sort by Hits

Microsoft Releases 4 'Critical' Bulletins for April's Security Update

Microsoft Certified Professional Magazine Online | Todays Top Picks, April 14, 2015
Views: 81 | Hits 1

Microsoft released today its monthly security patch with four bulletins rated "critical" and seven rated "important."...

Microsoft To Boost Office 365 Security with Advance E-Mail Threat Protection

Microsoft Certified Professional Magazine Online | Todays Top Picks, April 9, 2015
Views: 151 | Hits 1

New security tools for Office 365 that will protect e-mails from harmful links and phishing attacks was announced by Microsoft this week....

SSL now in public beta on MongoLab

MongoLab - MongoDB Hosting, April 8, 2015
Views: 93 | Hits

Our team at MongoLab is excited to announce the public beta of SSL-enabled* (Secure Sockets Layer) MongoDB connections on Dedicated deployments**. This feature adds an extra level of security by encry...

Organizations Being Hit by the 'Dyre Wolf' Trojan

Microsoft Certified Professional Magazine Online | Todays Top Picks, April 7, 2015
Views: 94 | Hits 6

According to a security report by IBM, an active attack campain is currently being used to steal millions from overseas enterprises....

Spring security in java

The Code Project Latest Articles, April 2, 2015
Views: 88 | Hits

In this article I'm going to tell a line about what is a Security in the application, what is Spring Security, and how to integrate Spring Security in your application....

Microsoft Unveils Windows 10 Security Features That Avoid Passwords

Microsoft Certified Professional Magazine Online | Todays Top Picks, March 17, 2015
Views: 111 | Hits 12

Microsoft today named two security features that will appear in Windows 10 that will diminish the importance of using passwords to ensure device security....

Intune Mobile Management Features Added to Office 365 Apps

Microsoft Certified Professional Magazine Online | Todays Top Picks, March 4, 2015
Views: 174 | Hits 1

Microsoft's layered security approach for mobile management was discussed during a Web broadcast this week....

OAuth is so insecure

Sahil Malik - blah.winsmarts.com, March 4, 2015
Views: 123 | Hits 14

SharePoint Training: more information Let me preface this by saying, the p...

MDM and Mobile platforms of choice

Sahil Malik - blah.winsmarts.com, March 2, 2015
Views: 102 | Hits 3

SharePoint Training: more information There are 3 main platforms (ignoring...

Adding security to our NoteKeeper JQuery Mobile App

The Code Project Latest Articles, February 27, 2015
Views: 195 | Hits 1

Provide functionality to Sign In and Sign Up to enable security for our NoteKeeper JQuery Mobile App....

ASP.NET Web Api: Understanding OWIN/Katana Authentication/Authorization Part I: Concepts

The Code Project Latest Articles, February 16, 2015
Views: 164 | Hits 71

Identity is fully compatible with the OWIN Authorization model, and when used in this manner, represents a very useful, ready-to go concrete implementation. But we can perhaps better understand the st...

Privacy Issues Discovered in Microsoft Outloook App for iOS and Android

Microsoft Certified Professional Magazine Online | Todays Top Picks, February 11, 2015
Views: 85 | Hits 2

Vulnerabilities in the newly released iOS and Android versions of Outlook have been discovered, with one causing the app to bypass custom Exchange ActiveSync security policies in organizations....

Microsoft February Patch Tuesday: 41 IE Flaws Fixed

Microsoft Certified Professional Magazine Online | Todays Top Picks, February 10, 2015
Views: 88 | Hits 1

This month's Microsoft security update has been released, packed with three "critical bulletins and six "important" items....

Health Insurance Anthem Discloses Massive Breach

Microsoft Certified Professional Magazine Online | Todays Top Picks, February 5, 2015
Views: 116 | Hits 3

Anthem alerted customers that its system had been compromised information, including names, addresses, birthdays and Social Security numbers of millions of its customers....

AppSec Dont Trust the Network

The Code Project Latest Articles, February 5, 2015
Views: 116 | Hits 4

Long gone are the days when networks could be relied upon to provide security for your organization, old theories about applications and databases, and servers being behind the firewall and therefore ...

Using Spring Security and create custom login dialog

The Code Project Latest Articles, February 1, 2015
Views: 202 | Hits 4

This is articule is about the spring security and how to create a custom jsp page to login with....

Security Update Support Ending for Windows Server 2003 in July

Microsoft Certified Professional Magazine Online | Todays Top Picks, January 27, 2015
Views: 94 | Hits

Windows Server 2003 lose security support when the product's lifecycle ends this summer....

WebAPI Security Custom Authorization Filters

The Code Project Latest Articles, January 19, 2015
Views: 192 | Hits 34

Implementing custom security authorization using Web API Filters...

Using JSON Web Tokens with Katana and WebAPI

K. Scott Allen, January 15, 2015
Views: 586 | Hits 14

A common question Ive been getting is how to use tokens with ASP.NET, specifically JSON Web Tokens (JWT) with ASP.NET WebAPI where the OAuth server and the resource server are the same. In other words...

January Patch Tuesday: MS Releases 1 'Critical' Windows Fix

Microsoft Certified Professional Magazine Online | Todays Top Picks, January 13, 2015
Views: 118 | Hits 7

Microsoft released January's security update today, which includes one security bulletin rated "critical" and seven rated "important" to address a total of eight flaws....

Windows 8.1 Zero-Day Flaw Disclosed by Google

Microsoft Certified Professional Magazine Online | Todays Top Picks, January 6, 2015
Views: 107 | Hits 11

Information pertaining to a vulnerability in Windows 8.1 that could allow for a malicious application from bypassing security was released last week by Google....

PageObjects and Protractor

K. Scott Allen, January 6, 2015
Views: 120 | Hits 6

I’m a fan of the PageObject pattern when writing Protractor tests, because PageObjects make the test code more expressive and readable. When I sit down to write some Protractor tests, I usually ...

Example of a transform for unit testing something tricky

Rico Marianis Performance Tidbits, November 27, 2014
Views: 153 | Hits 7

There were some requests for an example of my unit testing strategy so made up this fragment and included some things that would make your testing annoying. This is the initial fragment.&nbs...

Developing secure web applications: XSS attack, the Confused Deputy and Over-Posting

The Code Project Latest Articles, November 24, 2014
Views: 302 | Hits 13

The reality is that securing applications is not as much fun as we would like it to be. Nobody comes and says "Wow! Thumbs up for securing my personal data!". However, security is undoubtedly import...

Query string encryption for ASP.NET

The Code Project Latest Articles, November 15, 2014
Views: 151 | Hits 20

Clear text query strings are a potential security threat for your web application. Thus, query strings should always be encrypted....

On Honesty

Peter Brombergs UnBlog, November 12, 2014
Views: 80 | Hits

Honesty refers to a facet of moral character and connotes positive and virtuous attributes such as integrity, truthfulness, and straightforwardness, including straightforwardness of conduct, along wit...

On Honesty

Peter Brombergs UnBlog, November 12, 2014
Views: 135 | Hits 1

Honesty refers to a facet of moral character and connotes positive and virtuous attributes such as integrity, truthfulness, and straightforwardness, including straightforwardness of conduct, along wit...

Survey: Security Threat Increase Predicted

Microsoft Certified Professional Magazine Online | Todays Top Picks, November 6, 2014
Views: 136 | Hits 3

The sophistication of attackers is outstripping chief information security officers' (CISOs) ability to fend them off and the number of threats has increased markedly....

MongoDB LDAP and Kerberos Authentication with Centrify

The MongoDB NoSQL Database Blog, November 4, 2014
Views: 129 | Hits 2

By Alex Komyagin at MongoDB with the help of Felderi Santiago at Centrify and Robertson Pimentel at CentrifyOverviewCentrify provides unified identity management solutions that result in single sign-o...

Azure: New Marketplace, Network Improvements, New Batch Service, Automation Service, more

ScottGus Blog, October 28, 2014
Views: 268 | Hits 1

Today we released a major set of updates to Microsoft Azure. Todays updates include: Marketplace: Announcing Azure Marketplace and partnerships with key technology partners Networking: Network Secur...

New Office 365 Manangement Controls Previewed at TechEd Europe

Microsoft Certified Professional Magazine Online | Todays Top Picks, October 28, 2014
Views: 256 | Hits 1

Microsoft showed off some management and security improvements to Office 365 today, including new device management (MDM) controls and data loss protection (DLP) features....

Why the "Tsu" social network may not be a good idea at all

Peter Brombergs UnBlog, October 27, 2014
Views: 99 | Hits 3

People on social media are usually pretty quick to jump on the ""latest new thing"", often without doing any real research. That's why when invited to join ""tsu"", I declined. Now I feel even...

Why the "Tsu" social network may not be a good idea at all

Peter Brombergs UnBlog, October 27, 2014
Views: 165 | Hits 9

People on social media are usually pretty quick to jump on the ""latest new thing"", often without doing any real research. That's why when invited to join ""tsu"", I declined. Now I feel even...

Windows 10's ID Management and Security Controls

Microsoft Certified Professional Magazine Online | Todays Top Picks, October 23, 2014
Views: 256 | Hits 2

Microsoft outlined some of the new security features making its way to the company's next OS....

The Mindset of the Enterprise DBA: Delegating Work

Simple Talk, October 17, 2014
Views: 155 | Hits 2

A lot of the routine jobs demanded of a DBA can be automated, but a tougher prospect is to automate these jobs in a way that the requestor rather than the DBA can actually set of the job running them...

MongoDB Management Service Re-imagined: The Easiest Way to Run MongoDB

The MongoDB NoSQL Database Blog, October 14, 2014
Views: 288 | Hits 7

Discuss on Hacker NewsWe consistently hear that getting started with MongoDB is easy, but scaling to large configurations that include replication and sharding can be challenging. With MMS, it is now ...

Sharding Pitfalls Part II: Running a Sharded Cluster

The MongoDB NoSQL Database Blog, October 8, 2014
Views: 394 | Hits 2

By Adam Comerford, Senior Solutions EngineerIn Part I we discussed important considerations when picking a shard key. In this post we will go through some recommendations when running a sharded cluste...

Authentication, Authorization and OWIN - Who Moved My Cheese?

The Code Project Latest Articles, October 6, 2014
Views: 434 | Hits 13

With the introduction of OWIN-based security and Identity management in ASP.NET 4.5, the configuration of authentication and authorization have changed a bit for web forms developers. In this article,...

Acunetix WVS Audit Your Website Security

The Code Project Latest Articles, September 29, 2014
Views: 601 | Hits 5

Acunetix WVS audits your website security by running a host of tests. It then provides a concise report of issues it found. Not only does it do this, but it also suggests changes you need to make to f...

Using Blogger.com Blogs On Windows Live Writer in 2014

Run Tings Proper, September 24, 2014
Views: 189 | Hits

Ive just tried to pick up my blogging again and tried to get in a million different ways but ultimately kept seeing the error message The username or password is incorrect. Please try again. Heres how...

Using Blogger.com Blogs On Windows Live Writer in 2014

Run Tings Proper, September 24, 2014
Views: 824 | Hits 4

Ive just tried to pick up my blogging again and tried to get in a million different ways but ultimately kept seeing the error message The username or password is incorrect. Please try again. Heres how...

CacheAdapter 3.2 Released

Glavs Blog, September 23, 2014
Views: 738 | Hits 3

I am pleased to announce that my 'Glav.CacheAdapter' package has recently been updated to 3.2 (we skipped 3.1 for a few reasons). Note: For those not familiar with what this package does, you can loo...

Custom firewalls for your MongoDB deployment(s)

MongoLab - MongoDB Hosting, September 23, 2014
Views: 703 | Hits 1

MongoLab runs all of its hosted MongoDB deployments with authorization enabled, which means that username / password authentication is required before your database can be accessed. For lower-level ne...

A storm of fail

More Whidbey stuff, September 23, 2014
Views: 695 | Hits 2

Its OK to not know something. It really is, if youre willing to admit it, and have a reasonably accurate idea about your own level of competence. Unfortunately, thanks to the Dunning-Kruger effect, we...

Web Application Security Vulnerabilities

The Code Project Latest Articles, September 17, 2014
Views: 863 | Hits 5

Common security vulnerabilities in web applications and how to prevent them....

Web Security: Unvalidated Redirects

The Code Project Latest Articles, September 15, 2014
Views: 916 | Hits 6

Web security: unvalidated redirects...

Microsoft's September Patch: IE Zero-Day Flaw Gets Fix

Microsoft Certified Professional Magazine Online | Todays Top Picks, September 9, 2014
Views: 863 | Hits

Microsoft's monthly Security Update was released on Tuesday with one bulletin item rated "critical" and three "important" items....

Security Tidbits: Insecure Direct Object References

The Code Project Latest Articles, August 26, 2014
Views: 722 | Hits 2

Web security tip about insecure direct object references in URL request...

Security Insights: Insecure Direct Object Reference

The Code Project Latest Articles, August 20, 2014
Views: 677 | Hits 2

1st web security tip in the series...

Setting up Java Applications to Communicate with MongoDB, Kerberos and SSL

The MongoDB NoSQL Database Blog, August 19, 2014
Views: 484 | Hits 1

By Alex Komyagin, Technical Services Engineer at MongoDBSetting up Kerberos authentication and SSL encryption in a MongoDB Java application is not as simple as other languages. In this post, Im going ...