background preloader

MyPermissions - Scan your permissions... Find out who gained access to your personal info.

Related:  Sécurité

Codebashing In this interactive tutorial you will understand how SQL injection attacks are used to compromise the security of a web application, and how to write code more securely to protect against this type of attack. 1. Exercise Background TypeDrawing - Hansol Huh TypeDrawing originally started with online project in Jan 2005. Since then, a number of users have made fun and arty drawings using this program. Also, TypeDrawing has been featured on various famous websites like theFWA, and won several awards such as from FlashForward. In 2009, TypeDrawing iPhone version was released, and after one year, iPad version was released. Both iPhone and iPad version are way better than online version. It is much easier to draw by using your fingers (not a mouse), and many great features were added.

The Standard for Asshattery Yesterday, Twitter announced a few changes to their API. They’re steadily squeezing out third-party clients like Tweetbot, Echofon and Dabr, and they’re removing unauthenticated API calls. The latter means that every Twitter app, no matter how minor, will require a “Sign in with Twitter” button. For me, the immediate effect of this is that my Klout parody Klouchebag, along with a few other things I’ve designed, will die.1 The NSA back door to NIST Thomas C. Hales (University of Pittsburgh) (This article will be published in the Notices of the American Mathematical Society.) Use once. Die once. — activist saying about insecure communication This article gives a brief mathematical description of the NIST standard for cryptographically secure pseudo-random number generation by elliptic curves, the back door to the algorithm discovered by Ferguson and Shumow, and finally the design of the back door based on the Diffie-Hellman key exchange algorithm.

Johnny Chung Lee - Projects - Wii As of June 2008, Nintendo has sold nearly 30 million Wii game consoles. This significantly exceeds the number of Tablet PCs in use today according to even the most generous estimates of Tablet PC sales. This makes the Wii Remote one of the most common computer input devices in the world. Dexter Slice of Life on Facebook stalks new ground in branded games And no, we're not just talking about how this Facebook game revolves around America's favorite serial killer. Dexter Slice of Life, the Facebook game in development at Ecko|Code (most recently of Weeds Social Club fame), looks to shake up the oft-scoffed at branded social games scene ... and leave a few nicks here and there. Ecko|Code Executive VP of Product Development Marc Fernandez is confident that Slice of Life will set a new standard for branded games on Facebook. "We're big fans of the brand," Fernandez says of the Ecko|Code team, which already created a Dexter game for iOS devices. "We've continued to develop it and we have high hopes for it.

WebRTC Leak Test - Security Gladiators Tool What Is WebRTC Leak? Whenever you have to use an internet service to protect your privacy and guard your identity, you run the risk of WebRTC leak problems. Even VPN users sometimes have to deal with it.

Related:  OutilsMédiasSociauxProductivityNUMERIQUERéseaux et Médias SociauxSécurité des données sur internetVærktøjer