- Core IT
- Business & Money
- Personal Tech
Member since: August 2011
Areas of Interest:
- There is a good white paper about defeating script injection attacks that you might find interesting/useful, although it is a few years old now.
1 week 3 days ago
- There are a few benign ways to do it without causing any harm. One thing you can do is redirect all his traffic to a cat website, which judging by your avatar should make it clear that you are the puppet master pulling his strings. This site will walk you through it step by step, along with some other fun things you can do.
1 week 5 days ago
- StillADotcommer answers Re: Why is broadband access and speed in the US so bad compared to other countries?Part of the answer is that AT&T spent $17,430,000 on lobbying politicians in 2012 to help make sure they don't have to provide decent broadband services due to "socialist" regulations.
5 weeks 3 days ago
- A few basic steps can help prevent a lot of issues: Do code reviews so that there everything changed is double checked and looked at with a fresh set of eyes. Don't allow escape characters. Use parameterized statements so that data is filtered prior to being sent to the database.
6 weeks 2 days ago
- You could use Microsoft Process Monitor. It may be overkill for your needs, but it's worth checking out. Here is the link to the description and download.
7 weeks 5 days ago
- This week Andrew Auernheimer was sentence to 41 months (!) in prison for exposing an AT&T security flaw.
8 weeks 5 days ago
- I assume you saw a piece about the ring Google showed at the RSA conference. The way I understand it, Google is using the ring to authenticate the USB token in a USB dongle, so the actual token isn't wearable in this example.
9 weeks 4 days ago
- When I occasionally want to watch streaming video that is region locked I just use a VPN. It doesn't always work that well though - higher quality video often stutters and stops. A VPN can work, but don't expect it to always work perfectly. The other way to go is to use one of the DNS services like Tunlr or UnoDNS.
10 weeks 6 days ago
- Use a VPN for starters. There are a number of free VPN services out there, but you might want to consider paying for additional privacy and less ads. This should do a pretty good job of keeping you out of the crosshairs of your ISP by making it pretty much impossible for them to see that you are using something like BitTorrent.
11 weeks 4 days ago
- Most people thing of keyloggers as malicious software, but don't forget about hardware keyloggers that can be plugged into a USB port. Obviously these are easy to detect on a laptop, but on a desktop they could potentially go unnoticed for months.
12 weeks 2 days ago
- At my office, we have two people with management oversight, and they have very different approaches. One is pretty easy-going, assigns tasks and expects them done on time.
12 weeks 6 days ago
- What I would like to know is how you are finding SMP PREEMPT? Are you using terminal emulator to access Linux command line shell, or is this displayed on the version of Android your phone is running (you didn't mention Android, but it must be)?
13 weeks 6 days ago
- How difficult would it be to port an existing Android app to BlackBerry 10? It seems like the BlackBerry Market, er BlackBerry World rather, could be easier for a developer to get traction in than it is on Google Play considering the much smaller number of applications available in BlackBerry World.
14 weeks 4 days ago
- It's very easy, but not particularly obvious. Click on the drop down arrow on the top right of your post box (to the right of your name at the top of your post). Choose "Lock this post". This will keep the person you share with from resharing it.
14 weeks 6 days ago
- Colorado has started using a portal that adds additional levels of encryption to cloud based email to meet both HIPAA and CJIS standards. The state partnered with a company called Zix Corp (which I had never heard of before) to set it up.
16 weeks 5 days ago
- I'm not sure I entirely follow your question. Did you actually mean convert PDF to triples? You can import triples using RDF, but I'm not sure about PDFs. Maybe this will provide a little guidance.
17 weeks 3 days ago
- I suggest you talk to your employer, assuming that you would like to continue and progress there, and ask what would be of most use to them. Or just look around and see what is being used most heavily. In general, and I am biased towards mobile app development so this may well not be appropriate for you, I would say Java and C++.
17 weeks 6 days ago
- I've read quite a lot about Eric Schmidt's visit to North Korea, from the US State Dept. calling it "unhelpful" to John McCain referring to Eric Schmidt and Gov. Bill Richardson as "useful idiots." I'm not so sure. I don't want to support repressive governments, but how much harm could the trip cause?
18 weeks 4 days ago
- You might need a repeater with all of the concrete and steel. A repeater is cheap, effective, and will help you avoid dead zones that are common in commercial structures with steel/concrete construction.
19 weeks 2 days ago
- In addition to places like IT World, I check two sites every day _ Naked Security and ThreatPost. They are both run by companies that sell security/anti-virus products, Sophos and Kaspersky respectively, but they also have a lot of up to date information and they don't just shill for their own products.
19 weeks 6 days ago
- Why not develop a simple Android app? It should satisfy the open source requirement, give you some practical experience, and be relatively straightforward. There are lots of resources available to help you through it both on-line and in print.
20 weeks 2 days ago
- I would be surprised if it is more than 5 for personal use, with a dedicated password perhaps for each really important thing such as bank accounts or email, and reused passwords for things like forums. Work is a different matter, depending on what you do you might have a lot, like Dave (300!), or literally zero.
21 weeks 2 days ago
- There is a thread on xda developers on this topic with a couple of different options. You might want to give it a read and see what they found worked best. SMS Backup & Restore seemed to get some love. http://forum.xda-developers.com/showthread.php?t=1607311
22 weeks 6 days ago
- Have you implemented any special data security measures to protect high value data stored in the cloud? What is most effective?
24 weeks 6 days ago
- We are working on a website for someone who wants to embed a video that autoplays on the landing page. I'm trying to discourage him from going down that road because, one, I hate it when I visit a website and there is suddenly audio playing, especially when I am listening to music, and two, I suspect other people feel the same way.
30 weeks 2 days ago
- 1 of 2
Follow other ITworld members or sign in with your Facebook account in order to view your friends' activity.