Friday, June 20th, 2008
Apple has closed four security holes in the Windows version of its Safari browser with the release of version 3.1.2. The fixes include the browser's "Carpet Bomb" behaviour of placing downloaded files on the desktop by default and without asking the user's permission. In association with with Internet Explorer – ...
Posted in Coding, Internet, Privacy, Security, Software, Windows | No Comments
Friday, June 20th, 2008
It’s not rocket science, but any time we mingle and intertwine four or five different pieces of technology, there’s always the potential for a mess… or at least a misconfiguration or two along the way. Don’t know what 802.1X is? Check out the recent 802.1X technology primer.
If you’re planning to, ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Friday, June 20th, 2008
Tresys Technology has released a desktop virtualisation platform with a difference - it is designed from the ground up for organisations needing tight security, including military bodies.
Tresys, which has a track record of providing military systems, said its VM Fortress can cut costs for organisations which would like to implement ...
Posted in Coding, Hardware, Internet, Linux, Networking, Privacy, Security, Software | No Comments
Thursday, June 19th, 2008
Twitter is a fun Web 2.0 communications tool that allows users to deliver quick messages of 140 characters or less. The hastiness and ephemeral nature of these messages means that Twitter has become more than a communication tool — it's a source of angry, funny and awkward messages that would ...
Posted in General BS, Internet, Privacy, Software | No Comments
Wednesday, June 18th, 2008
"HTML forms (i.e. <form>) are one of the features in HTTP that allows users to send data to HTTP servers. An often overlooked feature is that due to the nature of HTTP, the web browser has no way of identifying between an HTTP server and one that is not an ...
Posted in Coding, Internet, Privacy, Security | No Comments