background preloader

Programming

Facebook Twitter

Linux. Syringe. Server Side Hive. Permissions. When a person logs into your app via Facebook Login you can access a subset of that person's data stored on Facebook.

Permissions

Permissions are how you ask someone if you can access that data. A person's privacy settings combined with what you ask for will determine what you can access. Permissions are strings that are passed along with a login request or an API call. Here are two examples of permissions: email - Access to a person's primary email address.user_likes - Access to the list of things a person likes. For example, if you add the login button to a web app and ask for email and user_likes via the scope parameter, a person would be prompted with this dialog when logging in for the first time: Your app has requested a person's email address and the things they like but that request also automatically asks for access to a person's public profile.

We provide similar mechanisms for iOS and Android. 80 Microcomputing Magazine February 1982. Steve Hanov's Programming Blog. Open-source software. Open-source software (OSS) is computer software with its source code made available and licensed with a license in which the copyright holder provides the rights to study, change and distribute the software to anyone and for any purpose.[1] Open-source software is very often developed in a public, collaborative manner.

Open-source software

Open-source software is the most prominent example of open-source development and often compared to (technically defined) user-generated content or (legally defined) open-content movements.[2] A report by the Standish Group (from 2008) states that adoption of open-source software models has resulted in savings of about $60 billion per year to consumers.[3][4] Definitions[edit] The Open Source Initiative's (OSI) definition is recognized[who?] As the standard or de facto definition. The Khronos Group Inc.

MySQL

Desings, Graphics and Colors. SQL Injection Attacks by Example. A customer asked that we check out his intranet site, which was used by the company's employees and customers.

SQL Injection Attacks by Example

This was part of a larger security review, and though we'd not actually used SQL injection to penetrate a network before, we were pretty familiar with the general concepts. We were completely successful in this engagement, and wanted to recount the steps taken as an illustration. "SQL Injection" is subset of the an unverified/unsanitized user input vulnerability ("buffer overflows" are a different subset), and the idea is to convince the application to run SQL code that was not intended. If the application is creating SQL strings naively on the fly and then running them, it's straightforward to create some real surprises.

Wikipedia_programming

SQL injection. A classification of SQL injection attacking vector as of 2010.

SQL injection

SQL injection attacks allow attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances, allow the complete disclosure of all data on the system, destroy the data or make it otherwise unavailable, and become administrators of the database server. In a 2012 study, it was observed that the average web application received 4 attack campaigns per month, and retailers received twice as many attacks as other industries.[2] History[edit] The first public discussions of SQL injection started appearing around 1998;[3] for example, a 1998 article in Phrack Magazine.[4] Form[edit] SQL injection (SQLI) is considered one of the top 10 web application vulnerabilities of 2007 and 2010 by the Open Web Application Security Project.[5] In 2013, SQLI was rated the number one attack on the OWASP top ten.[6] There are four main sub-classes of SQL injection:

JavaScript

PHP. Oracle. Facebook/open-graph-protocol - GitHub. Learning Modern 3D Graphics Programming. Hangout Hackathon Docs. The Latest in HTML5. Eric Bidelman ( G+, @ebidel ) Developer Relations Brown Bag ( View this presentation in a nightly build of Chrome, FF, or WebKit.

The Latest in HTML5

Also, some of this presentation does require Chrome 14+ dev. ) Central mozilla/ Mozilla. Step by step Guide to Crack WinRAR. Hi folks, its been a long time since I have posted some thing technical, so I will be writing about the challenge I got at NIT KU, where I cracked WinRAR 3.80 using a disassembler and will tell you the same here.

Step by step Guide to Crack WinRAR

You can crack any version of WinRAR using this method and need not to pay for the registration fee and you can do this all by your self, easily. Furthermore, major software are cracked using the same way,but just get a bit complex in the methodology. This tutorial is intended for those who are new to cracking and disassembling. Disclaimer – By Reading this tutorial You agree that this tutorial is intended for educational purposes only and the author can not be held liable for any kind of damages done whatsoever to your machine, or damages caused by some other, creative application of this tutorial. In any case you disagree with the above statement, stop here. The Tools. Web Devout.

Apache

The J2EE<img src="images/tm.gif" border="0" alt="Trademarked"> 1.4 Tutorial. Google. Ietf-oauth-v2-22 - The OAuth 2.0 Authorization Protocol.