
Cybersecurity News IPhone URL Schemes - akosma wiki From akosma wiki This page centralizes code samples for URL schemes available in many iPhone applications, not only in Apple's but in many others. It also includes programming tips and references about implementing apps registering or consuming URL schemes. If you own an iPhone app, contact akosma software to add the schemes you've implemented in your application, for others to use. The important thing is to showcase code samples, ready for others to use. Terms of Use This wiki page is a courtesy service. Thanks for sharing your URL scheme to the community! Programming Tips Registering your own URL schemes Please check this page in iPhone Developer Tips. Note about URL Encoding in Objective-C There can be some problems with NSString's stringByAddingPercentEscapesUsingEncoding: method since it does not encode some reserved characters for URLs; you might prefer to use this code instead: Apple iPhone Applications Safari Apparently opens in Safari. Maps Phone Mail YouTube Duo
Kinect Tutorial - Hacking 101 Microsoft's Kinect has been out for a few months now and has become a fairly popular accessory for the Xbox 360. Let's face it though, using the Kinect for what it was intended didn't end up being the most exciting part of this new toy. What has become far more interesting is seeing the various hacks developed that makes the device so much more than simply an input mechanism for games. Now it's your turn to do something amazing, and this tutorial will get you started. Today I'm going to get your Kinect up and running and demonstrate how to get the camera and depth information into your very own C# application. Above is some example output that our app will produce. 1. openkinect.org is going to be your best friend for this portion of the project. 2. Since our plan with this tutorial is just to display output, we can get away with a basic WPF application, which actually performs surprisingly well. Bundled as part of the libfreenect source are a set of wrappers for various languages. 3.
History of Computer Security Early Computer Security Papers, Part I This list of papers was initially distributed on CD-ROM at NISSC '98. These papers are unpublished, seminal works in computer security. Table of Contents How To Use This Collection All papers are stored in Adobe's PDF (Portable Document Format). If you have a web browser you can use this interface to access the papers. Paper descriptions are in the file Papers.pdf. A copy of these instructions is in the text file README.txt. Return to top of page List of Papers Click on the citation to read a description of the importance of the paper; click on the file to read the paper itself. Return to top of page Background and Organization Computer security as a discipline was first studied in the early 1970s, although the issues had influenced the development of many earlier systems such as the Atlas system and MULTICS. The information in these papers provides a historical record of how computer security developed, and why. Acknowledgements We thank Dr. Ande72 Keywords
Launching Your Own Application via a Custom URL Scheme Note: Since the introduction of custom URL schemes, this post has consistently been the top read content on the blog. Although much is the same, there are a few nuances that have changed. This is a re-write of the original post, updated for the latest iOS and Xcode versions. One of the coolest features of the iPhone/iOS SDK is an application’s ability to “bind” itself to a custom URL scheme and for that scheme to be used to launch the application from either a browser or from another application. Registering a Custom URL Scheme The first step is to create a custom URL scheme – start by locating and clicking on the project info.plist in the Xcode Project Navigator. From the list presented scroll down and select URL types. Open the directional arrow and you’ll see Item 0, a dictionary entry. Tap on Item 0 and add a new row, select URL Schemes from the drop-down and tap Enter to complete the row insert. Expand the array and tap on Item 0. Calling Custom URL Scheme from Safari
Learn The Ruby Programming Language While Having Fun With Hackety Hack Similar to Alice, which we have covered before, it is meant as a beginners tutorial to programming; however the main difference is that Alice is a GUI programming toolkit while Hackety Hack is a text-based “real” programming environment. To begin, download Hackety Hack for your operating system. Versions are available for Windows, Mac OS X and Linux. Even though their website says that it is for 64-bit only the download worked fine on my Windows 32-bit machine so perhaps that is meant for the Mac OS X version only. Click “Ready” to begin the program. Learning Programming Basics Hackety Hack begins with a menu of Lessons. The rest of the tutorials are geared towards beginner programmers but if you are new to the Ruby language they will also be helpful. How To Program In Ruby The first program you will write will be a “Hello World” program which is standard in computer programming language circles. From there, you get progressively difficult levels of programming from the tutorials.
CSM: Computer Science and Mathematics Division iOS | How-to Use Property List Files to Store Data in iPad or iPhone App One of vital elements of any iOS application is the info.plist file. This graph based file contains important configuration settings for your application to run normally. For instance you set the icons your app requires in the plist file. This property list file is not only used by app but also by the App Store to determine if the application is properly configured to be included in the App Store. The plist is a key component of the application bundle. When an application is created, a info.plist is created with a set of keys required to allow your app to run normally and co-exist on the device and be listed in the App Store. Property list files are also used to manage the functionality of an app by providing a useful persistence data store for lightweight storage. Property List files lose their effectiveness if you try you use them other than their intended use. Using archiving or another lightweight storage mechanism like possibly a SQLite database might be a better choice.
codr.cc - share code Ross Anderson's Home Page Ross Anderson [Research] [Blog] [Politics] [My Book] [Music] [Contact Details] What's New Security protocols and evidence: where many payment systems fail analyses why dispute resolution is hard. In Why bouncing droplets are a pretty good model of quantum mechanics, we solve an outstanding mystery in physics (see blog posts, three previous papers and older blog posts). Reading this may harm your computer – The psychology of malware warnings analyses what sort of text we should put in a warning if we actually want the user to pay attention to it (blog). 2013 highlights included Rendezvous, a prototype search engine for code; a demonstration that we could steal your PIN via your phone camera and microphone; an analysis of SDN Authentication; and papers on quantum computing and Bell's inequality. 2010 highlights included a paper on why Chip and PIN is broken for which we got coverage on Newsnight and a best paper award (later, the banks tried to suppress this research). Research
Cocoa Dev Central: Learn Objective-C Objective-C Objective-C is the primary language used to write Mac software. If you're comfortable with basic object-oriented concepts and the C language, Objective-C will make a lot of sense. This tutorial is written and illustrated by Scott Stevenson Copyright © 2008 Scott Stevenson Calling Methods To get started as quickly as possible, let's look at some simple examples. [object method]; [object methodWithInput:input]; Methods can return a value: output = [object methodWithOutput]; output = [object methodWithInputAndOutput:input]; You can call methods on classes too, which is how you create objects. id myObject = [NSString string]; The id type means that the myObject variable can refer to any kind of object, so the actual class and the methods it implements aren't known when you compile the app. In this example, it's obvious the object type will be an NSString, so we can change the type: NSString* myString = [NSString string]; Notice that there's a asterisk to the right of the object type. Init
Processing (fr) Conçu par des artistes, pour des artistes, Processing est un des principaux environnements de création utilisant le code informatique pour générer des œuvres multimédias sur ordinateur. L'attrait de ce logiciel réside dans sa simplicité d'utilisation et dans la diversité de ses applications : image, son, applications sur Internet et sur téléphones mobiles, conception d'objets électroniques interactifs. Processing fédère une forte communauté d'utilisateurs professionnels et amateurs : artistes, graphistes, vidéastes, typographes, architectes, web designers et designers en général. Il est également utilisé par des enseignants en arts qui souhaitent familiariser leurs étudiants avec les potentialités artistiques de la programmation, les concepteurs du logiciel l'ayant pensé dès l'origine comme un outil d'apprentissage. Dessiner et créer avec du code informatique Processing permet également de programmer des circuits électroniques qui interagissent avec le milieu qui les entoure.
Schneier on Security