| Tuesday July 29th 2014

Feedburner

Subscribe by email:

We promise not to spam/sell you.


Search Amazon deals:

‘best practices’ Archives

We are “digitizing” the way high school students take tests. What could possibly go wrong?

We are “digitizing” the way high school students take tests. What could possibly go wrong?

“Wait a sec,” the Edutron Systems rep interrupted, cutting off the principal of River City High, “your students still use pencils and paper to take exams!?” The rep insincerely chuckled, adding “don’t tell me you’re still using slide rules to teach arithmetic!” As shifty as the sales rep was, he [...]

HOWTO: Reboot Your Linux Server The Easy Way

If you have ever had a hard drive fail on a remote server you may remember the feeling you had after trying to issue command like: # reboot bash: /sbin/reboot: Input/output error # shutdown -r now bash: /sbin/shutdown: Input/output error Obviously, there is a problem with your drive. These commands are failing because the kernel is unable to [...]

GUIDs are Great

GUIDs are Great

Whenever someone says they’re going to use a GUID for something, I make it a point to always respond, “No!  Don’t use a GUID there!  If you use one there, eventually you’ll use them all up and we won’t have any left!” Of course, GUIDs don’t get “used up,” and there are plenty to [...]

DEFCON 16 – The Tools

DEFCON 16 – The Tools

DEFCON, the 9000+ attendee hacker conference in Vegas has become a sort of hydra conference. It has become more like a global fair than what most people think of conferences; even the badge is highly unique. I say this because there are so many things to do at DEFCON, other than going to talks, that you could spend your whole weekend looking at [...]

The regular expression required to validate an email address according to the respective RFCs

The regular expression required to validate an email address according to the respective RFCs

click for full email validation regular expression Cheers to the persons using /.+@.+/ as their email validation regex... I like to try "root@localhost" to see if it'll take it. Realizing this, some people suggest we stop validating email addresses by computation of any sort. Instead, they say we should just send a validation email to the [...]

The Web Entrepreneur’s Toolbox: 100 Hacks and Resources

The Web Entrepreneur’s Toolbox: 100 Hacks and Resources

Great article with some great tips for those Web Entrepreneurs that frequent this site... "In today's consumer-driven world, it's getting harder and harder to keep customers happy. If your business can't deliver a product or a service that immediately satisfies the client, it will be trampled by the long line of competitors behind it. The [...]

TSA Proud of Confiscating Non-Dangerous Items

TSA Proud of Confiscating Non-Dangerous Items

This is just sad. The TSA confiscated a battery pack not because it's dangerous, but because other passengers might think its dangerous. And they're proud of the fact. "We must treat every suspicious item the same and utilize the tools we have available to make a final determination," said Federal Security Director David Wynn. "Procedures are [...]

HOWTO: Secure A Linux Web Server

HOWTO: Secure A Linux Web Server

If you self-manage or Co-Lo a Linux server, you absolutely need to know how to secure your box. If you don't know, you need managed hosting. End of story. No questions. Here's a (very) basic outline for you. You'll need to do some research on each step. This post is specific to a Linux server running Apache and PHP, a very common combination. [...]

Happy Sysadmin Day!

Happy Sysadmin Day!

Happy Sysadmin Day! Today is the ninth annual sysadmin appreciation day and I'd like to extend my heartfelt thanks to the other systems administrators around the world, and all the other tireless toilers in the bowels of the Internet. You truly rule the Earth, thou latter-day morlocks. Source

Filling Out Forms: Still a Dangerous Game

Filling Out Forms: Still a Dangerous Game

It may not sound too scary, but filling out forms on the Web is still a dicey business, a researcher said this week. In an update of his 2002 paper, which exposed many of the vulnerabilities associated with HTML forms, EnableSecurity's Sandro Gauci states that most browsers still haven't completely fixed the problems associated with commonly [...]

Prevent XSS and SQL Injection

Prevent XSS and SQL Injection

Today I was toying with Apache and made a .htaccess for all of you; that prevents most used XSS and SQL injection vectors in the request uri. It looks at the request uri and sends the malicious user to a log file which sends an e-mail to the webmaster with all his information and what happened when this user was trying to punk with some scripts. I [...]

Why Whitehats Need to Know Blackhat SEO

Why Whitehats Need to Know Blackhat SEO

Whitehat SEO, while not at a standstill, is certainly feeling a pinch from Google lately. Penalties are being handed out to sites much like a fratboy would cups of beer to the only attractive girl at the party. And yet many still refuse to learn anything remotely blackhat. I understand that they don’t want to implement the tactics [...]

How I Would Hack Your Weak Passwords

How I Would Hack Your Weak Passwords

If you invited me to try and crack your password (you know the one that you use over and over for like every web page you visit) how many guesses would it take before I got it? Let’s see… here is my top 10 list. I can obtain most of this information much easier than you think, then I might just be able to get into your e-mail, [...]

This can’t be called Hacking when it’s this easy.

This can’t be called Hacking when it’s this easy.

Click here. For the unknowing... phpmyadmin is a web-based mysql admin tool. The google query is structured to find installs of phpmyadmin that aren't password protected. This gives anyone full access to read and modify the database. Also, if the pages were password-protected, Google's spider wouldn't have been able to get in to index them in [...]

 Page 3 of 3 « 1  2  3