Latest | Active | Top in 24 hours | 7 Days | 30 Days | 365 Days | All Time
A serious vulnerability, CVE-2014-6271, being variably referred to as Shellshock or... more »
Find out about the new Bash vulnerability, Shellshock and how to make sure you aren't vulnerable.
Big Data is clumsy by default. It will be getting slower with time, there is nothing... more »
Remember Heartbleed? If you believe the hype today, Shellshock is in that league and... more »
A discussion on the pros and cons of cloud platforms and on-premise environments.
Just like the proof of the pudding is in the eating, the proof that the services that... more »
Consequently, even though my light scan found only 3000 results, this thing is... more »
In this post we'll have a look on how to configure your Spring Security when working... more »
The article describes the approach to generate the OTP and use it for the two factor authentication technique.
Security in the Internet of Things is a fairly common concern these days - you know,... more »
There have been a number of advances in technology that have improved comfort and... more »
This article represents top 4 security vulnerabilities related coding practice to... more »
Oh – why did the traffic go so nuts? Because the news headlines said there were 5... more »
In this post we are going to explore how to enable Java security manager for WSO2... more »
With the rapid proliferation of mobile devices entering the workplace, many more... more »
As The Wizard of Oz taught us, “There’s no place like home.” But for corporate data,... more »
This week on IT Rewind, everyone's favorite host discusses the release of the iPhone... more »
Most people use Google Authenticator to generate two-factor authentication (2FA)... more »
Mobile application has transformed our action of interacting with the mobile and... more »
Security is the most aimed phenomenon in any operating system these days be that a... more »
End users are going to love having Android apps on their Chromebooks, but IT might... more »
This blog post details how you can use Spring Session and Spring Security to provide... more »
A Comprehensive List Of 30+ Most Popular Web Application Testing Tools with Download... more »
Nobody knows quite exactly where IoT is going to take us. All we know is, it's going... more »
Show more links
Advertising - Terms of Service - Privacy - © 1997-2014, DZone, Inc.