background preloader

StartSSL™ Certificates & Public Key Infrastructure

Public Proxy Servers Google Docs API: Client Login with PHP and Curl A few days ago I started looking deeper into the Google Code APIs and threw a few experiments using the Google Documents List Data API. Unfortunately, the only library they have for the third version of their protocol is written in Java. There is a PHP wrapper for the first version of the protocol, but it totally depends on the Zend Framework. Here’s a little code snippet for logging into a Google Docs account (writely) using ClientLogin with Curl and PHP. The Auth string is stored into the $auth variable for later use. ClientLogin assumes you login once and use the auth string for all on-going requests (more info: ClientLogin – Google Code). It seems though that Google Docs is purely for documents (spreadsheets and presentations) but not for actual files, as a JPEG I uploaded turned into a text/html type. I came across a cool website which I believe the Googlers have made – Data Liberation: Users should be able to control the data they store in any of Google’s products.

Python Programming Language – Official Website Crypto Obfuscator For .Net - Obfuscation, Code Protection, Optimization and Deployment Simplification For .Net Assemblies, WPF and ASP.Net Websites .Net Assembly Code Protection & Obfuscation Automatic Exception Reporting Optimization & Performance Improvement Smaller & Simplified Deployment Download Your Free Trial Now or Buy Now Use Advanced Obfuscation Techniques to ensure best protection for your code & intellectual property Avoid Common Obfuscation Problems using intelligent rules and automatic exclusions. Have A Simple UI - no complex settings required. Integrate Seamlessly in your build process. Perform Super Fast obfuscation. Now with Automatic Exception Reporting - Catch any unhandled exceptions and automatically report them to the exception reporting service.. Supports .Net 4.5, WinRT/Metro, Silverlight, XAP Files, Windows Phone 7/8, Compact Framework, XNA, XBox & more Supports BAML/XAML Renaming+Resource Encryption For WPF/Silverlight Assemblies. Protect your code and intellectual property from hackers, crackers or competitors. Protect time & money investment made in your software - Increase ROI for your business. Additional Features

ZoneAlarm Free Antivirus + Firewall Configurer un forward proxy simple avec Apache - Club des décideurs et professionnels en Informatique Cette section est détaillée dans l'article "HTTP : le protocole du Web passé en revue", dont je vous conseille la lecture de la rubrique appropriée. Nous allons ici nous intéresser au cas du forward proxy. Un proxy de type forward est une machine s'intercalant entre le client web (typiquement un navigateur) et un serveur web (la page demandée). Petite remarque : il peut y avoir une succession de proxies qui se relayent la requête avant que celle-ci n'atteigne finalement le serveur final. En entreprise (université, ou plus généralement petit à moyen espace fermé et limité), un proxy forward est utilisé dans plusieurs buts : Surveiller l'accès au web, chaque requête étant enregistrée (logguée) Empêcher l'accès à certains sites en les filtrant et les interdisant Créer un cache des ressources HTTP demandées Analyser la source de la page à la volée afin d'en chercher des éventuels malwares, de type javascript par exemple Et bien plus encore... I-A. I-B. Compilation et installation d'Apache

Keynotopia: User Interface Design Libraries for Keynote, PowerPoint and OpenOffice Ruby Programming Language Researcher Releases Smart Meter Hacking Tool Security consulting firm SecureState today released a new open source hacking tool that it claims will let security researchers and penetration testers verify the security of electric utility smart meters being installed in millions of homes around the country. The tool, called Termineter, is available for public download from SecureState's website and will be demonstrated at the BSides security event in Las Vegas next week. The company had earlier sent out a stripped down version of the tool to a limited number of individuals. Security consultancy InGuardians had planned to publicly release details of a similar tool called OptiGuard at the Shmoocon security conference a few months ago. InGuardian is scheduled to disclose details of its tool at the Black Hat security conference also being held in Las Vegas next week. Power companies and utilities will be able to use Termineter to identify and validate internal flaws that make the meters vulnerable to hacking and tampering, he said.

Main NGINX is a free, open-source, high-performance HTTP server and reverse proxy, as well as an IMAP/POP3 proxy server. NGINX is known for its high performance, stability, rich feature set, simple configuration, and low resource consumption. NGINX is one of a handful of servers written to address the C10K problem. NGINX powers several high-visibility sites, such as Netflix, Hulu, Pinterest, CloudFlare, Airbnb, WordPress.com, GitHub, SoundCloud, Zynga, Eventbrite, Zappos, Media Temple, Heroku, RightScale, Engine Yard, MaxCDN and many others. HTML5 video issues on the iPad and how to solve them I’ve been delaying this post since I wrote a rant about the iPad. The delay is mainly because I never found time to create sample files or record screencasts showing the bugs so I decided to publish it without any working examples since I don’t think I will have enough time or patience to isolate the problems and document it anytime soon, so you will have to believe that what I’m saying “is true” and that the bugs exist… Think of it as a reference in case you have any of those issues and not as a definitive way of making those things work, some bugs are only present on older versions of iOS and may not be easy to replicate. I’m sure I will leave a lot of important stuff behind but at least I’ll try to cover some bugs and how I solved them. I will try to be brief. Bugs and Hacks Preload video Here is an example of the code required to preload a video after user interaction on iOS 3.2+: As you can see on the code comments it requires a series of hacks to make it work properly. Conclusion

Protect Your Assets: A Buying Guide to Office Security Systems We talk frequently about cybersecurity, discussing how to protect your business’s data by using strong passwords, deploying antimalware utilities, and keeping your computers safe with the latest patches and updates. This time, the focus is on premises security, or protecting your business’s physical assets from burglary and vandalism. The best cybersecurity measures in the world are useless if a thief breaks into your office and makes off with your computers. You won’t lose any digital data if you’ve followed our advice to back up your computers to secure, offsite locations; but if your business is like most operations, it isn't entirely digital. You have paper records, including sensitive personal information about your employees. Your business also depends on physical assets—computers, displays, servers, fax machines, and everything that goes with them—that you will need to replace if someone steals them or destroys them. Think you can’t afford a security system? FrontPoint Security

International) › Linux Sehr geehrte Damen und Herren , wie Sie wissen, ist yourshelter seit dem 01.04.2010 ein Teil der Host Europe Gruppe. Um bei Weiterentwicklungen und Neueinführungen unseres Produkt-Portfolios alle Synergie-Effekte der Marken nutzen zu können, haben wir uns dazu entschlossen, unsere gesamten Anstrengungen zu bündeln, und auf die Marke Host Europe zu konzentrieren. Daher wurde yourshelter.net zum 21.09.10 eingestellt. Haben Sie Interesse an unseren Produkten, besuchen Sie uns unter oder wenden sich an unseren Vertrieb ( vertrieb@vanager.com ). Zugang zu unserem Kunden-Informations-System finden Sie hier: Die Zugangsdaten erhalten Sie, wie bereits per E-Mail angekündigt, per E-Mail und Brief. Dear Sir or Madam , As you know, yourshelter has become a member of the Host Europe Group since April, 1st 2010.

Related:  Useful network services