Cron only decorator for App Engine
A technical guide on creating a Python decorator to restrict Google App Engine cron job URLs to authorized requests only.
A technical guide on creating a Python decorator to restrict Google App Engine cron job URLs to authorized requests only.
A technical analysis of how an expired database password caused Informatica to spawn excessive connections, crashing an Oracle server.
Exploring the idea of automatic login via notification emails, discussing the tradeoffs between usability and security.
A technical guide for troubleshooting EBS-BI integrated authentication by validating session cookies directly in the Oracle database.
daloRADIUS update deprecates old user portal authentication method, introduces new password and permission settings for better security.
Investigating Google Chrome's persistent background connections to 1e100.net domains, exploring their purpose and potential tracking implications.
Analysis of a deceptive Facebook app that tricks users into running malicious JavaScript to spam friends.
Discusses a security vulnerability in OBIEE's JMX remote access and provides steps to secure it with password authentication.
Analysis of Oracle's October Critical Patch Update, focusing on the OBIEE vulnerability CVE-2009-1990 and its patch details.
A guide to installing Microsoft Security Essentials on Windows Server 2008 by modifying system checks during installation.
Oracle's October Critical Patch Update addresses security vulnerabilities in OBIEE and Oracle Application Server, requiring immediate attention.
A security vulnerability in SQL Server (2005-2008 R2) allows guest account impersonation to bypass database access controls, with a fix planned for a future version.
A developer shares their discovery of a security vulnerability (CVE-2008-5187) in the Imlib2 image library.
Explains the AntiForgeryToken helper and ValidateAntiForgeryToken attribute in ASP.NET MVC Preview 5 for preventing cross-site request forgery attacks.
Urgent security alert for BlogEngine.NET users about a vulnerability exposing user credentials, with a patch recommendation.
Discusses key differences between mobile devices and desktops for application development, focusing on security, data management, and using the right tool for the job.
Explores implementing Forms-based security in ASP.NET MVC, covering Web.config limitations and using Code Access Security attributes for authorization.
Introduces Munin, a PHP-based web application firewall similar to mod_security, for securing websites on IIS and Apache.