background preloader

MyPermissions - Scan your permissions... Find out who gained access to your personal info.

https://mypermissions.com/

Related:  Sécurité

Codebashing In this interactive tutorial you will understand how SQL injection attacks are used to compromise the security of a web application, and how to write code more securely to protect against this type of attack. 1. Exercise Background How to prepare algorithmically created content in #Processing for offset print #res13 / @andreasgysin Last month at Resonate festival in Belgrade Andreas Gysin ran a workshop titled “Printshop With Processing” aimed at graphic designers who want to integrate Processing in their print-production workflow. The participants discussed and experimented with different ways on how to output algorithmically created graphical ornaments or representations of data to multiple page documents, ready for offset print with process (CMYK) and spot colors. Using this tutorial and examples, previously edited vector graphics, typography blocks or entire layouts in PDF documents can be imported, manipulated and used as templates instead of adding them later-on ‘by hand’.

Mobile/Janus Overview Janus is a compression and privacy proxy with the goal to provide more secure and efficient mobile browsing. The goals section gives some details on our objectives and the ways we want to achieve them. The Janus Proxy is currently using the experimental SPDY protocol but will use the upcoming new HTTP/2 standard when it is finalized. The proxy does compress and re-encode media files using techniques described in the features section. Design - Color Use color primarily for emphasis. Choose colors that fit with your brand and provide good contrast between visual components. Note that red and green may be indistinguishable to color-blind users. Blue is the standard accent color in Android's color palette. Each color has a corresponding darker shade that can be used as a complement when needed. Download the swatches

firefox and flash problems - but are they malware? *aaaaaaarrrrrgggggghhhhhhh!!!!!* Excuse the screams of frustration over here but i'm getting pretty fed up! Especially with the way my firefox and flash have been acting. How to: Install Let’s Encrypt certificates - How to - YunoHost Forum Hi everyone, Let's encrypt went into public beta recently, which means anybody can use their services now to get "trusted" certificates and get rid of self-signed certificates. There are only sparse documentation on the internet now (and most of them not so newbies-friendly ?)

Social Media Monitoring Tools: Facts and How to Use Social Media has proved to be next generation converting platform. With various offer that gets converted almost every second with the help of social media marketing helps it to get more popularity and branding. If you are also looking forward to give your business a big booster, then social media promotion is the key to success. Not just this, in terms of Search engine too, Social media has got enough powers to bring ranking up in Search engine with social media power. Sandcat Browser - The Pen Tester's Browser Sandcat Browser 5 brings unique features that are useful for pen-testers and web developers. Sandcat is built on top of Chromium and uses the Lua programming language to provide extensions and scripting support. See what's new in Sandcat 5

Bootstrap, from Twitter Need reasons to love Bootstrap? Look no further. By nerds, for nerds. Built at Twitter by @mdo and @fat, Bootstrap utilizes LESS CSS, is compiled via Node, and is managed through GitHub to help nerds do awesome stuff on the web. Made for everyone. How to solve speaker is not plugged in problem in windows7 - general-discussion - windows-7 Your question mahima_01 March 15, 2012 11:38:01 AM how to solve "speakers is unplugged" problem in windows 7 although i have connected it? More about : solve speaker plugged problem windows7 | E-mail me updates | Track this thread The NSA back door to NIST Thomas C. Hales (University of Pittsburgh) (This article will be published in the Notices of the American Mathematical Society.) Use once. Die once. — activist saying about insecure communication This article gives a brief mathematical description of the NIST standard for cryptographically secure pseudo-random number generation by elliptic curves, the back door to the algorithm discovered by Ferguson and Shumow, and finally the design of the back door based on the Diffie-Hellman key exchange algorithm.

10 Amazing Useful Tools to Evaluate Your Web Design A good web design is the one which your visitors find easy to navigate. If they find your website difficult to understand or slow, then they would definitely leave without trying to find the required information any more. The design of a website is an important factor in the success of your website.

XRay · XRay New tool to increase the Web's transparency The Problem We live in a data-driven world. Many of the Web services, mobile apps, and third parties we interact with daily are collecting immense amounts of information about us -- every location, click, search, email, document, and site that we visit.

Related:  Android & AppsbarPrivacy & Google