Struts2 external redirect
For one of my S2 apps I needed to redirect to an external site. If you Google on how to do this, you’ll see examples in the form of: <result name=”foo”...
View ArticleGoogle Suggest vs. Privacy
Since Google launched Chrome yesterday, much have been said on the blogosphere about its privacy implications. The issue is Google can log your search keystrokes as you type, even prior you hitting...
View ArticleiPhone SDK Regular Expressions
If you’re programming the iPhone, sooner or later you’ll need regular expressions (regex). By default OS X includes the ICU, an open source Unicode library which has extensive regex capabilities. The...
View ArticleSecurity Compliance
Having served on a national information security standards working group, I’m keenly aware that compliance is a major driver — if not the primary driver — for security initiatives today. Compliance...
View ArticleChinks in the Armor
Defense-in-depth is a cornerstone of any information security strategy. Corporate networks are routinely segmented into various zones such as “public”, “DMZ”, “extranet” and “intranet” to contain...
View ArticleSecurity issues with Google Docs
[Update 11/13: Please see my follow-up to these issues.] [Update 3/26: I'm now in contact with Google Security.] [Update 3/28: I'm aware of Google's official response to the issues raised in this blog....
View ArticleUpdate to Google Docs security issues
Back in March I wrote about a few security issues with Google Docs while keeping some details private. Google Security and the Google Docs product management team engaged me immediately after the...
View ArticlePGP Online Store Customer Data Exposure
A PGP Online Store vulnerability could have allowed hackers to harvest PGP Corporation‘s customer data. Exposed data included each customer’s full contact info (name, physical address, email address,...
View ArticleIncorrect time setting could leak iOS 5 album pictures
I always get a bit antsy about hacking researching vulnerabilities when I travel, and this time is no exception. Often I notice “glitches” or abnormalities which I want to investigate, but since I’m...
View ArticleMore fun with a locked iPhone 4
Perusing the private address book and making live video calls — all from a locked iPhone 4. Last time we explored how an incorrect time setting could expose your pictures on a locked iPhone. Today...
View ArticleOpenCV OSX Python 3 bindings
Adrian Rosebrock has a good walkthrough on how to Install OpenCV 3.0 and Python 2.7+ on OSX. However if you want to use Python 3, the OpenCV Python bindings don’t get installed correctly, if at all....
View Article
More Pages to Explore .....