56 Results for:"> goat
- Sort by:
Gmail phishing campaign uses real-time techniques to bypass 2FA
17 Jan 2017Researchers saw a Gmail phishing campaign in the wild using clever tricks to access accounts including a difficult 2FA bypass only possible in real time. Read More
How vulnerable is Microsoft IIS 7.5 to attacks?
09 Dec 2010While version 7.5 is more secure out of the box than past IIS releases, it doesn't guarantee 100% protection. Read More
CSRF attack: How hackers use trusted users for their exploits
14 Dec 2011A CSRF attack is a serious Web security threat that, combined with XSS, can be lethal. Learn about the CSRF attack’s anatomy, along with mitigation methods. Read More
Using OpenID
01 May 2007Learn more about OpenID, a decentralized, open source framework for user-centric digital identity. With OpenID, rather than managing all online accounts individually, users can manage their identity in one place ... Read More
Introducing Apache Wicket
01 Jan 2008This article approaches Apache Wicket by presenting the core concepts behind the framework, and moves to reinforce those concepts with an example leveraging some of Wicket's strengths. Read More
Cyber Reconnaissance, Surveillance and Defense
05 Oct 2015In this excerpt of Cyber Reconnaissance, Surveillance and Defense, author Robert Shimonski describes commonly used mobile technology and how phone tracking works. Read More
How to Use Spring 3.0 In a Servlet Based Web Application
02 Nov 2010This tutorial will show you how to run a simple web based application that uses Spring 3 as an IoC container. Read More
Slingshot Yourself Into DataNucleus 2.1 and JPA 2.0
10 Nov 2010Slingshot Yourself Into DataNucleus 2.1 and JPA 2.0 with this Tutorial for RDBMS Read More
Java EE 6 Overview
01 Feb 2009The details of Java EE 6 have been getting hashed out for quite a few months in the JSR 316 expert group, which I am part of. The goal of this article is to give you an overview of the changes in Java EE 6 as well ... Read More
Building Custom JSF UI Components
01 Aug 2005One of the key strengths of JavaServer Faces (JSF) is that not only does it provide substantial technology for easy, out of the box component based J2EE Web applications assembly, but it also is a very flexible API... Read More