Develop an Age Verification Form Using ActionScript 3

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Develop an Age Verification Form Using ActionScript 3


Develop an Age Verification Form Using ActionScript 3

Posted: 04 Oct 2011 08:34 PM PDT


In this tutorial, we'll learn how to develop and implement an Age Verification form for use in your websites or applications. Read on to find out more!

Fail a security audit already -- it's good for you

Posted: 04 Oct 2011 09:02 AM PDT


Failing an audit sounds like the last thing any company wants to happen. But that's because audits are seen by many as the goal of a security program. In reality, audits are only the means of testing whether enforcement of security matches the policies. In the broader context, though, an audit is a means to avoid a breach by learning the lesson in a "friendly" exercise rather than in the real world. If the audit is a stress-test of your environment that helps you find the weaknesses before a real attack, you should be failing audit every now and then. After all, if you're not failing any audits there are two possible explanations:

In face of massive cybersecurity threat, government security dawdles

Posted: 04 Oct 2011 08:36 AM PDT


At a time when the cyberthreat level is at its peak, many federal agencies continue to struggle with IT security.

iPad Data LP: Security Savior or Strong-Arm Tactic

Posted: 04 Oct 2011 08:17 AM PDT


Symantec unveiled its Data Loss Prevention for Tablets today, which forces Internet traffic on an iPad through a virtual private network and inspects outgoing traffic. It's good security, but does it defeat the purpose of owning an iPad to begin with?

Massive DDoS attacks a growing threat to VoIP services

Posted: 04 Oct 2011 07:33 AM PDT


When the massive distributed denial-of-service (DDoS) attack in March brought down the voice-over-IP (VoIP) call processing supplied by TelePacific Communications to thousands of its customers, it marked a turning point for the local-exchange services provider in its thinking about security.

XSS web attacks could live forever, researcher warns

Posted: 04 Oct 2011 06:55 AM PDT


Websites that accidentally distribute rogue code could find it harder to undo the damage if attackers exploit widespread browser support for HTML5 local storage and an increasing tendency for heavy users of Web apps never to close their browser.

IBM buys security intelligence minded Q1 Labs

Posted: 04 Oct 2011 06:42 AM PDT


In a move to fortify a newly created division devoted to security systems, IBM is acquiring Q1 Labs, the company announced Tuesday. Terms of the deal were not disclosed.

U.S., Russia slowly improve cybersecurity cooperation

Posted: 04 Oct 2011 05:05 AM PDT


Lingering distrust between the U.S., Russia and China has hampered cooperation in the past on cyber security issues, but relations are taking a turn for the better, with increasing contact between experts.

'Well organized, sophisticated, fast' cybercriminals scare US banks

Posted: 04 Oct 2011 03:00 AM PDT


BITS, the U.S. financial industry's IT policy arm, has a new leader: Paul Smocer, an expert in email security and authentication.

Symantec makes cloud-based security service available for corporate trials

Posted: 04 Oct 2011 03:00 AM PDT


Symantec today said its new cloud-based single sign-on (SSO) service called O3 is available to enterprise customers to test.

Protect iPad data without hobbling users

Posted: 04 Oct 2011 02:47 AM PDT


Symantec plans to enable its data loss prevention server to work with iPads (even using iCloud) and, eventually, Android devices

Webroot moves to cloud-based malware detection

Posted: 04 Oct 2011 01:08 AM PDT


Webroot has revamped its antivirus product line, moving to a cloud-based system that it says is better suited to detect the deluge of malicious software circulating on the Internet.

iPhone and iPad Security: The Human Element

Posted: 03 Oct 2011 12:55 AM PDT


Tackling mobile security on a personal-business device isn't new, but it is still a very serious and present problem. Perhaps a lesson from the past holds an answer.

Google updates Chrome to restore browser after Microsoft blunder

Posted: 02 Oct 2011 11:19 PM PDT


Google updated Chrome over the weekend to help users affected by Microsoft's errant flagging of the browser as malware.

0 comments:

Post a Comment