ActiveDen – Puppet Christmas Card XML

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

ActiveDen – Puppet Christmas Card XML


ActiveDen – Puppet Christmas Card XML

Posted: 15 Nov 2011 04:07 PM PST


Complete vector animated and sounded Christmas e-card with interactive ON-OFF switch. HTML page template with XML custom external logo, music and adjustable multiline textblock with tags and URL link support. Animation centered in browser window.

ActiveDen – Enigma XML, SEO & Mobile Template

Posted: 15 Nov 2011 04:13 PM PST


Demo: activeden.net/item/enigma-xml-seo-mobile-template/70192… Download: www.filesonic.com/file/2743539481/enigma.zip Mirror: www.wupload.com/file/1238965786/enigma.zip

Arista again looks to buck Cisco, others in data center

Posted: 15 Nov 2011 05:02 AM PST


Arista Networks this week has rolled out four switches and enhanced software designed to address the scalability, resilience and density requirements of cloud computing.

iOS, Android to get federal-strength authentication

Posted: 15 Nov 2011 08:01 AM PST


Businesses also gain a new Android app management and provisioning tool

Why Law Enforcement Can't Stop Hackers

Posted: 15 Nov 2011 07:14 AM PST


On July 19, 2011, FBI agents in nine states rounded up 14 men and two women ranging in age from 21 to 36 for their alleged involvement with the international hacking group Anonymous. Fourteen of these individuals were arrested for allegedly plotting and executing a distributed denial of service (DDoS) attack in December 2010 that took down PayPal's Website.

Facebook users flooded with adult images in mystery hack

Posted: 15 Nov 2011 06:52 AM PST


For the past several days, many Facebook users have been seeing adult images in their news feeds that feature pornography, violence and animal abuse -- the result of what security analysts say is a mystery attack.

W3C releases draft online privacy standards

Posted: 15 Nov 2011 06:04 AM PST


The World Wide Web Consortium (W3C) has released the first draft of two standards intended to protect the privacy of Web users and allow them to opt out of Web tracking systems.

Advertisers can't be trusted to self-regulate on data collection, says EFF

Posted: 15 Nov 2011 05:53 AM PST


The Electronic Frontier Foundation (EFF) doesn't think that the digital advertising industry can efficiently regulate itself and has issued a statement saying that the self-regulatory principles for multisite data recently published by the Digital Advertising Alliance will suffer from a lack of enforcement.

FAQ: What's the big deal about Duqu?

Posted: 15 Nov 2011 03:28 AM PST


The recently discovered Duqu Trojan has gotten a lot of attention in the security research community. Here's why.

Apple secures iTunes update checking to address man-in-the-middle vulnerability

Posted: 15 Nov 2011 02:24 AM PST


Apple's iTunes 10.5.1 update addresses a weakness in the application's update mechanism that could be exploited to trick users into visiting malicious websites.

Researchers find new way to hide messages in VoIP

Posted: 15 Nov 2011 01:00 AM PST


Researchers have devised a new scheme for hiding secret data within VoIP packets, making it possible to carry on legitimate voice conversations while stolen data piggybacks on the call undetected, making its way to thieves on the outside.

FBI investigating intrusion into university records system to alter grades

Posted: 15 Nov 2011 08:41 AM PST


The computerized records system at Santa Clara University in California was compromised to alter student grades, an official of the university said.

Huawei buys out Symantec in joint venture

Posted: 14 Nov 2011 02:57 AM PST


Huawei Technologies will buy out the rest of a joint venture with Symantec for US$530 million, the companies announced on Monday.

How to Protect Your Smartphone from Bad Apps

Posted: 14 Nov 2011 12:18 AM PST


Today, the sheer number of people embracing smartphones makes those mobile devices and the data stored on them attractive targets to Bad Guys looking to access or steal your personal information. And though mobile malware isn't exactly a major issue at this point, it could be if those hackers and thieves have their way. But you can, and you should, do your best to protect your device and your data.

4 spear-phishing hooks for the holidays

Posted: 14 Nov 2011 12:04 AM PST


Cybercriminals are increasingly abandoning the technique of casting a wide net by blasting thousands of email accounts with a phishing scam. That's not nearly as lucrative as a spear-phishing attack, which might take more work, but has the potential for a much bigger payoff, according to Rohyt Belani, CEO of phishing-awareness-training company PhishMe.

Has the spam problem been solved?

Posted: 13 Nov 2011 11:33 PM PST


Microsoft founder Bill Gates said in 2004 that the problem of spam would be solved within two years. It seemed unlikely at the time, and in fact 2006 came and went without so much as a dip in the crushing load of unwanted email advertising.

CA takes to the cloud for identity management

Posted: 13 Nov 2011 11:00 PM PST


CA Technologies has gotten its feet wet with cloud-based security before, but now the company is moving further in with a package of cloud based identity and access control services.

Regulators sniffing around mobile privacy issues

Posted: 13 Nov 2011 10:36 PM PST


Regulators are starting to investigate what kind of oversight is in place to make sure that mobile applications don't encroach on user privacy rights, a lawyer in Microsoft's Windows Phone segment said on Monday.

Security researcher says Iran to blame for its own Duqu infections

Posted: 13 Nov 2011 10:20 PM PST


An Iranian government official yesterday acknowledged that the Duqu attacks had infected computers in the country but claimed that the Trojan was "under control," according to a report by a state-run news agency.

0 comments:

Post a Comment