background preloader

OAuth — An open protocol to allow secure API authorization in a

OAuth — An open protocol to allow secure API authorization in a
For Consumer developers... If you're building... web applications desktop applications mobile applications Javascript or browser-based apps webpage widgets OAuth is a simple way to publish and interact with protected data. It's also a safer and more secure way for people to give you access. We've kept it simple to save you time.

Related:  Smart Cardcreation webPasswords

Dr Oglesby's Funk Prescription - Scirra Store Five awesome new tracks from Matt Oglesby Dr Oglesby has cooked 5 new grotesquely funky songs! Buy now to bestow some serious funk into your games. All 5 songs come with a royalty free license! - Introduction to Biometrics The NSTC Subcommittee on Biometrics and Identity Management developed this introductory material in order to better communicate both within the government and with other interested parties. Stating facts and discussing related issues in a consistent, understandable manner, will enable smoother integration of privacy-protective biometric solutions. Federal agencies are working to ensure that their outreach activities are consistent with, and occasionally reference, this suite of documents so that the public, press and Congress are able to easily understand their plans and discuss them productively. The Subcommittee encourages other entities to also use and reference this material. The background material here was developed in 2006.

Mining Our Own Personal Data, for Self-Discovery Stephen Wolfram, a scientist and entrepreneur, wondered: Could all of that information be compiled into a personal database, then analyzed to tell us something meaningful about our lives? Maybe it could suggest when we tended to be the most creative or productive, along with the circumstances that led up to those moments. Dr.

The Infection File Popularity Contest - SpywareGuide Greynets Bl Ever wondered exactly how people who enjoy putting malicious files into the wide blue yonder ensure their bundles of joy are as attractive as possible to those who would happily download them? Well, I came across this program today and thought it was worth looking into. It dips into what's hot and current in the world of free downloads then uses that to ensnare as many potential victims as possible. How do they do it?

Brute Forcing Passwords and Word List Resources Brute force, even though it's gotten so fast, is still a long way away from cracking long complex passwords. That's were word lists come in handy. It's usually the crackers first go-to solution, slam a word list against the hash, if that doesn't work, try rainbow tables (if they happen to have the tables for that specific hash type), and then the full on brute force. Some would say those first two steps are reversed, and it really is the choice of the the person doing it and the word lists they have to work with.

The Promise and Peril of the 'Data-Driven Society' Left: Damian Dovarganes/Associated Press; Jim Hollander/European Pressphoto AgencyData from credit card purchases and cell phone use provide a wealth of information about personal behavior. A small group of academics, business executives and journalists gathered at the M.I.T. Media Lab last Thursday, and the purpose was to toss out ideas and discuss the concept of “Data-Driven Societies.” Cain & Abel Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.

How to Load In and Animate Content with jQuery In this tutorial we will be taking your average everyday website and enhancing it with jQuery. We will be adding ajax functionality so that the content loads into the relevant container instead of the user having to navigate to another page. We will also be integrating some awesome animation effects. So first of all, I have put together a very simple layout for this example. Here's a screenshot and the HTML code we'll use.

Understanding /etc/shadow file byVivek GiteonFebruary 23, 2006 last updated November 20, 2015 inBASH Shell, CentOS, Debian / Ubuntu, FreeBSD, HP-UX Unix, Linux, RedHat and Friends, Solaris-Unix, Suse, Ubuntu Linux, UNIX, User Management Can you explain /etc/shadow file format used under Linux or UNIX-like system? The /etc/shadow file stores actual password in encrypted format for user’s account with additional properties related to user password i.e. it stores secure user account information. All fields are separated by a colon (:) symbol. It contains one entry per line for each user listed in /etc/passwd file Generally, shadow file entry looks as follows (click to enlarge image):

Smartcards Why smart cards? Smartcards have been in the market for a few years, but the real growth has really started recently, together with the growth of internet and digital communications network. Many see the Smartcard as an important building block of the information society.

Related:  geekysemi automated...AuthenticationCyberspace PrivacyssoOuvertesSECURITYSecurity