56 Results for:"> goat

  • Sort by: 

Gmail phishing campaign uses real-time techniques to bypass 2FA

By Michael Heller 17 Jan 2017

Researchers saw a Gmail phishing campaign in the wild using clever tricks to access accounts including a difficult 2FA bypass only possible in real time. Read More

How vulnerable is Microsoft IIS 7.5 to attacks?

By Kevin Beaver 09 Dec 2010

While version 7.5 is more secure out of the box than past IIS releases, it doesn't guarantee 100% protection. Read More

CSRF attack: How hackers use trusted users for their exploits

By Karthik Poojary 14 Dec 2011

A CSRF attack is a serious Web security threat that, combined with XSS, can be lethal. Learn about the CSRF attack’s anatomy, along with mitigation methods. Read More

Using OpenID

01 May 2007

Learn more about OpenID, a decentralized, open source framework for user-centric digital identity. With OpenID, rather than managing all online accounts individually, users can manage their identity in one place ... Read More

Introducing Apache Wicket

01 Jan 2008

This article approaches Apache Wicket by presenting the core concepts behind the framework, and moves to reinforce those concepts with an example leveraging some of Wicket's strengths. Read More

Cyber Reconnaissance, Surveillance and Defense

05 Oct 2015

In this excerpt of Cyber Reconnaissance, Surveillance and Defense, author Robert Shimonski describes commonly used mobile technology and how phone tracking works. Read More

How to Use Spring 3.0 In a Servlet Based Web Application

By Cameron McKenzie 02 Nov 2010

This tutorial will show you how to run a simple web based application that uses Spring 3 as an IoC container. Read More

Slingshot Yourself Into DataNucleus 2.1 and JPA 2.0

10 Nov 2010

Slingshot Yourself Into DataNucleus 2.1 and JPA 2.0 with this Tutorial for RDBMS Read More

Java EE 6 Overview

01 Feb 2009

The details of Java EE 6 have been getting hashed out for quite a few months in the JSR 316 expert group, which I am part of. The goal of this article is to give you an overview of the changes in Java EE 6 as well ... Read More

Building Custom JSF UI Components

01 Aug 2005

One of the key strengths of JavaServer Faces (JSF) is that not only does it provide substantial technology for easy, out of the box component based J2EE Web applications assembly, but it also is a very flexible API... Read More