Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

4 total results found

What to do if your e-mail is hacked

Cybersecurity

Standard steps to do if you believe your e-mail has been hacked:http://blogs.msdn.com/b/securitytipstalk/archive/2010/07/07/hotmail-hacked-take-these-steps.aspxWhile Hotmail is the most common target for hacking in the media, the instructions and general advic...

Gmail
Mail
email
hack
hack
Hotmail
myrealbox
Yahoo

Security Engineering - free e-book

Cybersecurity

Free online copy of a good and comprehensive computer security book: Security Engineering: A Guide to Building Dependable Distributed Systems.“If you’re even thinking of doing any security engineering, you need to read this book”Bruce Schneier

book
encryption
hack
privacy
security

CSS Design Concerns for IE6, IE7, and Firefox

Programming and Web Development CSS and Web Design

Below is the beginning of (hopefully) an ongoing collection of design-related CSS issues concerning different browsers. For this initial posting, I focus on Firefox, IE6, and IE7.The good news regarding IE7 is that a lot of bugs were fixed. See the following...

Conditional Comments
Explorer
Firefox
IE
Internet
comment
CSS
design
hack

SQL Injection (Application Vulnerability)

Cybersecurity

SummarySQL Injection is a type of security vulnerability that occurs when application does not properly sanitize user inputs. The vulnerability potentially allows attacker to arbitrarily manipulate queries sent to the database layer. This type of vulnerabili...

web application
database
SQL injection
exploit
hacking
hack