Quick Tip: Check Flash Player Version Using ActionScript 3

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Quick Tip: Check Flash Player Version Using ActionScript 3


Quick Tip: Check Flash Player Version Using ActionScript 3

Posted: 04 Aug 2011 08:04 PM PDT


In this Quick Tip, I'll show you how to get and display the Flash Player Version using ActionScript. Let's take a look! Using the Capabilities class, we'll get the Flash Player version and Operating System then display them in a series of TextFields...

Activeden – Rabbit Beer Poker – Rip

Posted: 04 Aug 2011 08:17 PM PDT


Features Config this game through XML Adjust AI through XML Play advertise between each games , advertise list can be edit by XML Sound effect and Music are mp3 files loaded outside , change them by just replace the file Logo on table , Logo on menu , can be loaded from outside with your [...]

Black Hat: Routers using OSPF open to attacks

Posted: 04 Aug 2011 07:34 AM PDT


A researcher at Black Hat has revealed a vulnerability in the most common corporate router protocol that puts networks using it at risk of attacks that compromise data streams, falsify network topography and create crippling router loops.

Researchers show off homemade spy drone at Black Hat

Posted: 04 Aug 2011 07:18 AM PDT


A pair of security researchers Wednesday unveiled a remote controlled, unmanned aerial vehicle capable of cracking Wi-Fi passwords, exploiting weak wireless access points and mimicking a GSM tower to intercept cell phone conversations.

Black Hat: Hackers and crackers needed to counter terrorists

Posted: 04 Aug 2011 06:14 AM PDT


Hackers and crackers heard a patriotic plea during a Black Hat keynote in which they were portrayed as potential heroes as terrorism shifts from acts of physical violence to cyberattacks that can also cause physical destruction.

Black Hat: Lots of hacks and a patriotic plea

Posted: 04 Aug 2011 09:43 AM PDT


Black Hat hasn't disappointed this year, with research revealing a flaw that undercuts OSPF routing, two separate assertions that security for Apple products in the enterprise isn't that bad and a friendly hand being offered to hackers and crackers to join the U.S. fight against terrorists in cyberspace.

Researcher follows RSA hacking trail to China

Posted: 04 Aug 2011 03:03 AM PDT


Malware used in the attack against RSA Security earlier this year was controlled from China, a well-known botnet researcher said Wednesday.

Over 100 Indian govt. websites defaced since January

Posted: 04 Aug 2011 03:03 AM PDT


A total of 117 Indian government websites were defaced by hackers from January to June this year, prompting the government to take additional security measures, a federal minister told Parliament.

RSA's SecurID breach linked to China, researcher says

Posted: 03 Aug 2011 05:00 AM PDT


The breach of RSA, the security division of EMC, last spring in which sensitive information related to RSA SecurID tokens was stolen, can be traced back to an attack originating in China, a security researcher strongly believes based on a close look into malware associated with the RSA breach.

McAfee gets defensive: Massive cyber attack revelation not being used as a security sales tactic

Posted: 03 Aug 2011 01:41 AM PDT


McAfee today published a report that tells how it discovered evidence in a server on the Internet of stealthy intrusions, probably by an unnamed "nation-state," into 72 businesses and government agencies since 2006. The goal, says McAfee, is to steal massive amounts of confidential information.

Metasploit 4.0 sets the stage for mass penetration testing

Posted: 03 Aug 2011 01:05 AM PDT


Security product provider Rapid7 has updated its widely used open-source Metasploit exploitation framework, expanding the software so it supports enterprise IT security staff as well as its core audience of penetration testers.

Does the Mac have an edge against state-sponsored hacking?

Posted: 03 Aug 2011 12:51 AM PDT


When hackers broke into Google's computer network nearly two years ago, their first step was to take over Microsoft Windows machines running in the company's China offices. Would Google have been better off had those workers been running the Mac?

Microsoft kicks off $250,000 security contest

Posted: 03 Aug 2011 12:39 AM PDT


Microsoft today launched a $250,000 contest for researchers who develop defensive security technologies that deal with entire classes of exploits.

Take cyberthreats seriously, says counter-terrorism expert

Posted: 03 Aug 2011 12:17 AM PDT


Cofer Black warns that government officials shouldn't dismiss warnings of imminent cyberattacks.

ACLU wants details on mobile tracking by police

Posted: 02 Aug 2011 11:51 PM PDT


The ACLU has asked law enforcement agencies in 31 states to detail how they are using mobile phone location data.

Mobile device security: Questions to ask for creating policy

Posted: 02 Aug 2011 11:40 PM PDT


While 69 percent of organizations have employees using personal devices to connect to their corporate network, more than one-fifth, or 21 percent, currently have no policy in place to govern the use of personal mobile devices on their network. These new figures, released recently from security-products firm Courion, suggest many security leaders are still ignoring the need to address mobile-device management among their employees.

The Best 30 HTML5 games

Posted: 03 Aug 2011 10:09 PM PDT


HTML5 is set to revolutionise the creation of online games over coming years. Here, we present you with the longest list of HTML5 games available on the internet.

0 comments:

Post a Comment