Quantcast
Channel: Ade – peekay
Browsing all 11 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Struts2 external redirect

For one of my S2 apps I needed to redirect to an external site. If you Google on how to do this, you’ll see examples in the form of: <result name=”foo”...

View Article



Image may be NSFW.
Clik here to view.

Google Suggest vs. Privacy

Since Google launched Chrome yesterday, much have been said on the blogosphere about its privacy implications. The issue is Google can log your search keystrokes as you type, even prior you hitting...

View Article

Image may be NSFW.
Clik here to view.

iPhone SDK Regular Expressions

If you’re programming the iPhone, sooner or later you’ll need regular expressions (regex).  By default OS X includes the ICU, an open source Unicode library which has extensive regex capabilities. The...

View Article

Image may be NSFW.
Clik here to view.

Security Compliance

Having served on a national information security standards working group, I’m keenly aware that compliance is a major driver — if not the primary driver — for security initiatives today. Compliance...

View Article

Image may be NSFW.
Clik here to view.

Chinks in the Armor

Defense-in-depth is a cornerstone of any information security strategy.   Corporate networks are routinely segmented into various zones such as “public”, “DMZ”, “extranet” and “intranet” to contain...

View Article


Image may be NSFW.
Clik here to view.

Security issues with Google Docs

[Update 11/13: Please see my follow-up to these issues.] [Update 3/26: I'm now in contact with Google Security.] [Update 3/28: I'm aware of Google's official response to the issues raised in this blog....

View Article

Image may be NSFW.
Clik here to view.

Update to Google Docs security issues

Back in March I wrote about a few security issues with Google Docs while keeping some details private. Google Security and the Google Docs product management team engaged me immediately after the...

View Article

Image may be NSFW.
Clik here to view.

PGP Online Store Customer Data Exposure

A PGP Online Store vulnerability could have allowed hackers to harvest PGP Corporation‘s customer data. Exposed data included each customer’s full contact info (name, physical address, email address,...

View Article


Image may be NSFW.
Clik here to view.

Incorrect time setting could leak iOS 5 album pictures

I always get a bit antsy about hacking researching vulnerabilities when I travel, and this time is no exception.  Often I notice “glitches” or abnormalities which I want to investigate, but since I’m...

View Article


Image may be NSFW.
Clik here to view.

More fun with a locked iPhone 4

Perusing the private address book and making live video calls — all from a locked iPhone 4. Last time we explored how an incorrect time setting could expose your pictures on a locked iPhone.  Today...

View Article

Image may be NSFW.
Clik here to view.

OpenCV OSX Python 3 bindings

Adrian Rosebrock has a good walkthrough on how to Install OpenCV 3.0 and Python 2.7+ on OSX.  However if you want to use Python 3, the OpenCV Python bindings don’t get installed correctly, if at all....

View Article
Browsing all 11 articles
Browse latest View live




Latest Images