Error message

Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home/drbiz/public/2013.realism.com/includes/common.inc).

security

The content relates to web security, including protecting priviledged information, application and system security, and access control.

Master Key or Breaking Smartphone Encryption

Imagine the situation where every house lock is made by one of three manufactures - Ambroid, Microlock, and Orange. All of the locks take your fingerprint to open, but each analyzes your fingerprint a little differently. Now the police need to enter your home (with justification). They do not have a fingerprint match, so they require Orange to create a keyhole for every lock that when using the proper key, the door will open.

Secure Web Applications

Web applications allow you to interact with your clients to create a positive relationship. These applications allow your clients to access your data and the clients to provide information to you. It is critical that these applications have a high level of security to maintain your positive relationship with your clients. Daly Realism has years of experience developing and customizing applications to maintain this relationship.

Weak Passwords At Fault for "Morto A"

This is a short follow-on to the Passwords and Hacking series.

The Internet worm "Morto A" continues to infect computers. It uses Microsoft's Remote Desktop to spread. It attempts to gain access to your computer using Remote Desktop's protocol. It will succeed if your password is one of 37 simple passwords listed below.

Solution: Don't use a simple password. See Passwords and Hacking for various means to create complex passwords.

Internet Explorer has Major Bug

Microsoft has confirmed that Internet Explorer (all versions) has a bug that allows the browser to run software as you on your computer. Making it happen is rather technical, but it can happen when you go to a "specially crafted"1 web site that downloads the code into the browser than causes the browser to execute the code as if it were part of the browser's regular code. The attacks "in the wild"2 use Flash on IE V9, 10, and 11.

Passwords and Hacking (Part 1)

How many accounts do you have – one, five, ten, twenty or more? There are accounts for email, online banking, games, shopping, retirement, entertainment, Facebook, work, networking, blogging, and others. Many of these categories have multiple accounts. You know that you should use complex passwords, but complex passwords are hard to remember so you reuse the same password for many of these accounts. You are not alone.

Phishing with Email

Firefox, Chrome, and other browsers have had anti-fishing mechanism for a couple of years. These browsers prevent users from going to know phishing sites unless each site is specifically approved. Crackers have found a method to bypass browser security by using email.

Automatic Likes on Facebook

Faebook 'Like' buttonFacebook allows you to "like" a page, post, picture, or almost anything else. When you like a page, a notice gets posted to your wall. This applies to both Facebook and external pages. Facebook also gives external page authors a widget to add to their page that makes liking the page easy. When you click on that widget, Facebook records that fact, puts a notice on your wall and increments the 'like' counter for that page.

Pages