• Jericho HTML Parser 3.3

    Updated: 2012-10-31 01:29:36
    Jericho HTML Parser is a Java library allowing analysis and manipulation of parts of an HTML document, including server-side tags, while reproducing verbatim any unrecognized or invalid HTML. It also provides high-level HTML form manipulation functions.Release Notes: Tags: Text Processing, Markup, HTML/XHTML, Software Development, Libraries, Java Libraries, Internet, Web, Dynamic Content Licenses: LGPL

  • Network Security Podcast, Episode 294

    Updated: 2012-10-30 23:53:20
    Rich is playing super-secret secret-squirrel in an undisclosed location (actually he’s teaching multiple talks at a conference in Arizona), so Martin and Zach run the gamut from their own recent conference tomfoolery, to China’s “goodbye Cisco!” move, to “how do i shot honeypots”, and a few other things in between. Also, Zach takes a few [...]

  • New Video Cenzic F5 BIG-IP ASM and Complete Website ProtectionCenzic Web Application Security Blog

    Updated: 2012-10-30 18:54:10
    : , Menu Skip to content Post navigation Mobile Application Security Flaw : Ineffective Session Termination New Video : Cenzic Integration with F5 BIG-IP ASM for Complete Website Protection Posted on October 30, 2012 by Admin Check out this new video from our friends at F5 Networks . In a few short minutes you’ll see how BIG-IP ASM integrates with Cenzic for complete website . protection F5 Networks’ BIG-IP Application Security Manager ASM is a web application firewall WAF that protects critical applications from the most advanced . threats By integrating Cenzic†s continuous online application testing capabilities with F5 BIG-IP ASM, vulnerabilities are immediately blocked as they are identified . This means that your organization remains protected and in compliance without interruption

  • Admin Author at Cenzic Web Application Security BlogCenzic Web Application Security Blog

    Updated: 2012-10-30 18:54:08
    , Menu Skip to content Author Archives : Admin Post navigation New Video : Cenzic Integration with F5 BIG-IP ASM for Complete Website Protection Posted on October 30, 2012 by Admin by Admin Check out this new video from our friends at F5 Networks . In a few short minutes you’ll see how BIG-IP ASM integrates with Cenzic for complete website . protection F5 Networks’ BIG-IP Application Security Manager ASM is a web application firewall WAF that protects critical applications from the most advanced . threats By integrating Cenzic†s continuous online application testing capabilities with F5 BIG-IP ASM, vulnerabilities are immediately blocked as they are identified . This means that your organization remains protected and in compliance without interruption to business , and applications

  • Application Security Manager Overview F5 Networks

    Updated: 2012-10-30 18:54:05
    About F5 Buy Contact For F5 Partners Login USA SOLVE IT Topics Access Availability Cloud Computing Performance Security Service Provider Storage Virtualization Technology Adobe Blackboard Citrix IBM Microsoft Oracle SAP VMware More . Industry Service Provider E-Commerce Education Financial Government Healthcare Manufacturing Media Content Sites Retail RACKSPACE GOES HYBRID WITH F5 Watch it now BELIEVE IT Case Studies Case Studies by Topic Case Studies by Product News Analyst Reports News Articles Peer Reviews Performance Tools Compression Calculator Legacy Load Balancer Consolidation Calculator Storage Cost Savings Calculator Server Offload Calculator Proof-of-Concept F5 International Technology Centers Free Trials Resources Application Guides Deployment Guides White Papers HA AND SECURITY

  • Application Security Testing Vulnerabilities Cenzic Hailstorm Products

    Updated: 2012-10-30 18:53:43
    Cenzic CENZIC BLOG CUSTOMER LOGIN CONTACT PRODUCTS Overview Cenzic Enterprise Cenzic Desktop Cenzic Managed Cloud Cenzic Cloud Overview How It Works Service Details Test Details Frequently Asked Questions Free HealthCheck Buy Now Cenzic Hybrid Software Cloud Cenzic Mobile SOLUTIONS Overview Compliance PCI Compliance OWASP SB-1386 and AB-1950 Security Compliance Best Practices Security Compliance Internal Security GLBA SOX Compliance HIPAA Compliance Government TECHNOLOGY Overview Stateful Assessment HARM Score Testing Production Apps CIA Research PARTNERS Overview Our Partners RESOURCES Overview Application Security Papers Case Studies Datasheets Evaluate Software Glossary Podcasts Videos Webcasts SERVICES SUPPORT Overview Technical Support Professional Services Quick Start Security

  • Cenzic WAF Intelligent Blocking Cenzic BlogCenzic Web Application Security Blog

    Updated: 2012-10-30 18:53:43
    Menu Skip to content Post navigation Security as Customer Service : The Zappos Hack Starts the Conversation Amidst the Mobile Pickpockets , Don†t Forget to Guard the Vault Cenzic WAF Intelligent Blocking Posted on February 6, 2012 by John Weinschenk We have been getting a lot of questions about how to automate online application protection We have been getting a lot of questions about how to automate online app protection . There are a number of ways to do this , but an easy one is integrating Cezic with your Web application firewall WAF By integrating Cenzic†s continuous online application testing capabilities into a WAF , online app scans can be automatically run through the WAF using Cenzic†s cloud solution . Integrated WAF Cenzic solutions like Barracuda,  Citrix   F5  

  • big-ip asm Archives Cenzic Web Application Security BlogCenzic Web Application Security Blog

    Updated: 2012-10-30 18:52:13
    Menu Skip to content Tag Archives : big-ip asm Post navigation New Video : Cenzic Integration with F5 BIG-IP ASM for Complete Website Protection Posted on October 30, 2012 by Admin by Admin Check out this new video from our friends at F5 Networks . In a few short minutes you’ll see how BIG-IP ASM integrates with Cenzic for complete website . protection F5 Networks’ BIG-IP Application Security Manager ASM is a web application firewall WAF that protects critical applications from the most advanced . threats By integrating Cenzic†s continuous online application testing capabilities with F5 BIG-IP ASM, vulnerabilities are immediately blocked as they are identified . This means that your organization remains protected and in compliance without interruption to business , and applications

  • cenzic Archives Cenzic Web Application Security BlogCenzic Web Application Security Blog

    Updated: 2012-10-30 18:52:11
    Menu Skip to content Tag Archives : cenzic Post navigation New Video : Cenzic Integration with F5 BIG-IP ASM for Complete Website Protection Posted on October 30, 2012 by Admin by Admin Check out this new video from our friends at F5 Networks . In a few short minutes you’ll see how BIG-IP ASM integrates with Cenzic for complete website . protection F5 Networks’ BIG-IP Application Security Manager ASM is a web application firewall WAF that protects critical applications from the most advanced . threats By integrating Cenzic†s continuous online application testing capabilities with F5 BIG-IP ASM, vulnerabilities are immediately blocked as they are identified . This means that your organization remains protected and in compliance without interruption to business , and applications

  • integration Archives Cenzic Web Application Security BlogCenzic Web Application Security Blog

    Updated: 2012-10-30 18:52:09
    Menu Skip to content Tag Archives : integration Post navigation New Video : Cenzic Integration with F5 BIG-IP ASM for Complete Website Protection Posted on October 30, 2012 by Admin by Admin Check out this new video from our friends at F5 Networks . In a few short minutes you’ll see how BIG-IP ASM integrates with Cenzic for complete website . protection F5 Networks’ BIG-IP Application Security Manager ASM is a web application firewall WAF that protects critical applications from the most advanced . threats By integrating Cenzic†s continuous online application testing capabilities with F5 BIG-IP ASM, vulnerabilities are immediately blocked as they are identified . This means that your organization remains protected and in compliance without interruption to business , and applications

  • New Video Cenzic F5 BIG-IP ASM and Complete Website ProtectionCenzic Web Application Security Blog

    Updated: 2012-10-30 18:52:07
    : , Menu Skip to content Post navigation Mobile Application Security Flaw : Ineffective Session Termination New Video : Cenzic Integration with F5 BIG-IP ASM for Complete Website Protection Posted on October 30, 2012 by Admin Check out this new video from our friends at F5 Networks . In a few short minutes you’ll see how BIG-IP ASM integrates with Cenzic for complete website . protection F5 Networks’ BIG-IP Application Security Manager ASM is a web application firewall WAF that protects critical applications from the most advanced . threats By integrating Cenzic†s continuous online application testing capabilities with F5 BIG-IP ASM, vulnerabilities are immediately blocked as they are identified . This means that your organization remains protected and in compliance without interruption

  • Xataface 1.3.3

    Updated: 2012-10-30 17:34:30
    Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects Xataface Xataface Xataface is a flexible and shapable skin that sits on top of MySQL , making it accessible to every-day users . It automatically generates the appropriate forms , lists , and menus for a user to interact with the database without having to know any SQL . It is a full-featured Web application framework , and gives developers the flexibility to customize the features and behavior of their application via configuration files using the simple INI-file syntax templates , and plug-ins . A generic application with no customizations is completely functional , but the developer is free to customize things at his . leisure Tags Internet Web

  • Funcito 1.2.0

    Updated: 2012-10-30 17:25:46
    Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects Funcito Funcito Funcito is a Java library which simplifies access to your favorite functional programming APIs by wrapping Java methods as the function-type objects defined in those libraries . Rather than creating another functional programming API , Funcito makes it easy to define function-type objects which wrap existing methods . As a result , your code has less noise and clutter of anonymous inner classes , annotations , etc . Your code remains safe for automated refactoring , since there are no String-based reflection or forced naming conventions . The supported frameworks are Google Guava , Jedi , Functional Java , Play Framework 2, and

  • F*EX 20121027

    Updated: 2012-10-30 13:25:01
    Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects F EX F EX F EX Frams' Fast File EXchange is a Web based service for sending very big files from one person to another . The sender uploads the file to the F EX server and the recipient automatically gets a notification email with a download URL . Files are automatically deleted after download or an expiration date . The recipient and sender only need an email program and a Web browser . Sending to multiple recipients needs storage on the server only once . In contrast with other file transfer services , it has no file size limits at all and comes with shell tools for scripting up . downloading Tags Communications File Sharing Internet FTP Web HTTP

  • UrBackup 1.0

    Updated: 2012-10-30 11:46:49
    Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects UrBackup UrBackup UrBackup is an efficient client server backup system for Linux and Windows . A client for Windows lets you backup open files and complete partition images . Incremental and full image backups are stored to disk in a efficient way with file level de-duplication on either Windows or Linux servers . An easy-to-use server Web interface lets you analyze storage usage , view logs , modify settings , and browse backups . Backup images can be restored using a prebuilt live Linux CD based on . KNOPPIX Tags backup Images Server webInterface Licenses GPLv3 Operating Systems Linux 32 64 Win32 Win64 Solaris GNU kFreeBSD Implementation C++

  • Sagasu 2.0.11

    Updated: 2012-10-30 01:23:53
    Sagasu is a GNOME tool to find strings in multiple files. The user specifies the search directory and the set of files to be searched. Double-clicking on a search result launches a user command that can for example load the file in an editor at the appropriate line. The search can optionally ignore CVS directories. Sagasu is a Japanese word that means "to search." Release Notes: A Danish translation has been added. Tags: Desktop Environment, GNOME, Utilities, Text Processing Licenses: GPL

  • texture pack 0.2.2-2

    Updated: 2012-10-30 00:54:15
    texture pack is a texture pack library based on proceduralization. Images are formed from base images that are then proceduralized or filtered into more images.Release Notes: This release provides five more Synthetic Texture Packs, resulting in ten RealPacks and ten SynthPacks (a pack = 1,770 textures). Release Tags: Stable, Major, graphical, Art Tags: Proceduralization, automation, Art, Image, texture, filtering Licenses: GPLv3

  • translate word 0.9.2

    Updated: 2012-10-30 00:39:55
    translate word is a commandline program which translates words into different languages. It uses internal dictionaries and connects online to the Google Translation and the FreeTranslation engines. Release Notes: This release fixes some problems, and stabilizes and cleans the code base. Release Tags: Stable, Minor, Command Line, Translation Service Tags: Linguistic, Command Line, translation Licenses: GPLv3

  • Laptop Mode Tools 1.62

    Updated: 2012-10-30 00:23:53
    Laptop Mode Tools allows you to control various power management settings based on AC/battery power state. Among other things, it controls Linux's "Laptop Mode" feature that allows your hard drive to spin down for extended periods. It can also control CPU frequency scaling and screen blanking timeouts (both terminal and X). It supports automatic hibernation when battery is low. Release Notes: This release includes some important bugfixes and should make power savings much better on your machines. It also includes support for operating systems using systemd as the init. It is highly recommended to upgrade to this version. Tags: Desktop Environment, tools, Filesystems, Utilities Licenses: GPL

  • libzdb 2.10.6

    Updated: 2012-10-29 23:54:43
    Libzdb is a database library with thread-safe connection pooling. The library can connect transparently to multiple database systems. It has zero runtime configuration and connections are specified via a URL scheme. A modern object-oriented API is provided. Libzdb supports MySQL, PostgreSQL, SQLite, and Oracle.Release Notes: This is a minor feature and bugfix release. Tags: Software Development, Libraries, Application Frameworks, Database, API, Stable Licenses: GPL

  • SparForte 1.3.2

    Updated: 2012-10-29 23:25:07
    SparForte is a scripting language for large projects requiring reliable, scalable code, reduced maintenance time, and strong bug elimination requirements. It is targeted for programmers interested in quickly writing reliable software, educators wanting to teach disciplined programming skills, and advocates of the Ada/Spark programming languages.Release Notes: This release fixes the boolean shortcut feature and has a workaround for a GCC 4.7.1 issue. Sources include a new spec for Red Hat RPM builds. Release Tags: Stable Tags: Development, Shells, Scripting Languages, Web Licenses: GPLv3 or later

  • ZShaolin 0.5

    Updated: 2012-10-29 22:54:16
    Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects ZShaolin ZShaolin ZShaolin installs a small and powerful scriptable shell environment on your Android device . It comes with applications to edit images , audio , and video using batch scripts one can write and upload : FFMpeg , ImageMagick , Sox , Oggz , Lua , GNU awk , sed , grep , and of course . zsh Tags GPL shell ffmpeg video converter Image Conversion Audio Encoder scripting Lua Licenses GPL Operating Systems Android 2.2 or later Implementation C zsh Website Tweet Release tags All releases Recent releases 0.5 30 Oct 2012 02:31 Bugfixes Release : Notes This release fixes usage of ImageMagick and lets busybox applications connect to the network .

  • wcd 5.2.3

    Updated: 2012-10-29 21:41:18
    Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects wcd wcd WCD is a directory changer for DOS and Unix . Another NCD Norton Change Directory clone . This program jumps to a sub directory anywhere in the directory-tree . The directory to jump to can be given by only the first characters or an expression with . wildcards Tags Utilities Licenses GPL Freeware Operating Systems Windows MS-DOS Windows POSIX Implementation C Translations Dutch English Spanish Finnish German Website Download Tweet Release tags All releases Recent releases 5.2.3 30 Oct 2012 02:30 Stable Release : Notes Wcd has a new optional compact tree mode in which the tree is drawn the same way as in Windows or the KDE explorer . It now

  • Tamed Pluto 1.0

    Updated: 2012-10-29 17:57:03
    Tamed Pluto improves upon Pluto (the Lua serialization library) in debuggability and cross-architecture compability.Release Notes: This release can render serialization images in a human-readable format. Tags: Library, Serialization Licenses: Public Domain

  • Gamvas Web 0.8.3

    Updated: 2012-10-29 17:41:28
    Gamvas Web is a JavaScript game development framework with easy-to-learn and fully-documented API, game states, animated objects, Box2D physics integration, a particle emitter, and more. Release Notes: This release fixes several major bugs, including broken layer z-ordering and out-of-view rendering of the loading screen. It also introduces one physics world per game state (instead of one per game) and allows you to remove actors from the scene. Release Tags: Stable Tags: JavaScript library, Canvas, Game Engine, game framework, Game Library Licenses: MIT/X

  • imread 0.2.5

    Updated: 2012-10-29 16:45:18
    imread is a simple library which reads and saves images from disk to and from numpy arrays. Its goal is to perform this task simply, so that it can become very stable, leaving more complex image processing for other packages. Release Notes: This release adds Python 3 support and read support for BMP format images. Release Tags: Minor, Stable Tags: computer vision, Image Processing, image analysis, Programming Licenses: MIT/X

  • Chakra Linux 2012.10

    Updated: 2012-10-29 14:49:08
    Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects Chakra Linux Chakra Linux Chakra Linux is a Linux distribution that combines the simplicity of Arch Linux with KDE . It is fast , user-friendly , and extremely powerful . It can be used as a live CD or installed to hard disk . Chakra is currently under heavy and active development . It features a graphical installer and automatic hardware configuration . Chakra provides a modular and tweaked package set of the KDE Software Compilation with a lot of useful additions . It features the concept of half-rolling releases and freshly cooked packages and bundles . It is designed for people who really want to learn something about Linux or don't want to deal

  • XCache 3.0.0

    Updated: 2012-10-29 13:08:03
    Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects XCache XCache XCache is a fast , stable PHP opcode cacher that has been tested and run on production servers under high load . It supports and is tested on all lastest PHP CVS branches , including PHP_5_1, PHP_5_2, PHP_5_3, and PHP_5_4. Operating Systems POSIX BSD OpenBSD Linux Implementation C PHP Translations Chinese English Website Download Tweet Release tags All releases Recent releases 3.0.0 30 Oct 2012 15:52 Release : Notes Bugfixes . Many improvements with updates to the XCache admin page , namespace support , and more . An updated API with a few ini added . A new diagnosis module to give advice via htdocs . Auto-disables caching on crash at

  • autorevision 1.2

    Updated: 2012-10-29 09:50:05
    Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects autorevision autorevision autorevision extracts metadata about the head version of your repository . It is meant to be used by project build systems to extract properties which can be used in software version strings . It can create files containing variable and macro definitions suitable for C , C++ , sh , Python , Perl , PHP , lua , JavaScript , and header files suitable for use with preprocessing Info.plist files . Tags VCS Build Tools Licenses BSD Revised Operating Systems Unix Implementation shell script Website Download Tweet Release tags All releases Recent releases 1.1 28 Oct 2012 16:45 Major feature enhancements Release : Notes Java and Jave

  • Dragonfly Navigator 1.0.4

    Updated: 2012-10-29 09:40:28
    Dragonfly Navigator is a dual pane file manager. It is designed to be fast and simple to use but powerful, and supports job queuing.Release Notes: This release makes a Linux build available, changes the license to GPLv3, makes the code available on github, and adds minor bugfixes. Tags: File Managers, dual-pane Licenses: GPLv3

  • Finnix 106

    Updated: 2012-10-29 04:19:29
    Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects Finnix Finnix Finnix is a small , self-contained , bootable Linux CD distribution LiveCD for system administrators , based on Debian testing . You can use it to mount and manipulate hard drives and partitions , monitor networks , rebuild boot records , install other operating systems , and much more . Tags Filesystems Systems Administration Operating Systems Linux Distributions CD-Based Networking Hardware Boot Archiving backup Internet Installation Setup Licenses GPL Operating Systems POSIX Linux Website Download Tweet Release tags All releases Recent releases 106 30 Oct 2012 02:09 Release : Notes This release contains an important kernel update , as

  • Unsettings 0.08

    Updated: 2012-10-28 21:35:03
    Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects Unsettings Unsettings Unsettings is a graphical configuration program for the Unity desktop environment which lets you change some of Unity's settings . It also lets you save your settings into and load from a text file in JSON format so you can easily back up your settings or copy them to a different account . Tags unity configuration Utility desktop customisation Licenses GPLv3 Operating Systems Linux Implementation Python GTK3+ Translations English German Bulgarian Chinese Simplified Chinese Traditional Dutch Finnish French Polish Russian Spanish Turkish Brazilian Portuguese Slovak Website Tweet Release tags All releases Recent releases 0.08 28 Oct

  • libquickmail 0.1.5

    Updated: 2012-10-28 21:07:18
    libquickmail is a library intended to give C/C++ developers a quick and easy way to send e-mail from their applications. It supports multiple To/Cc/Bcc recipients and multiple attachments without size limitation. It uses libcurl for SMTP communication. The library can also be used to just create a multipart MIME message body.Release Notes: This release includes a light version which does not use libcurl for SMTP transport. Tags: E-mail, Library, MIME, SMTP Licenses: GPLv3

  • weboob 0.d

    Updated: 2012-10-28 19:52:08
    Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects weboob weboob Weboob is a project that provides several applications console or graphical to interact with a lot of Web sites . There are more than 40 supported Web sites and 20 applications to view bank accounts , drag on dating websites , search and play videos , display the weather , read news , show train timelines , get torrents on trackers , edit a wiki , listen to radio , view and download image galleries , and perform other useful . tasks Tags Console Qt Web Video Torrent Wiki Licenses GPLv3 Operating Systems Linux Implementation Python Translations English Website Download Tweet Release tags All releases Recent releases 0.d 28 Oct 2012 20:25

  • Mobile Application Security Flaw Ineffective Session Termination CenzicCenzic Web Application Securi

    Updated: 2012-10-20 02:59:06
    : Menu Skip to content Post navigation Mobile Security Flaw : Unencrypted Data Mobile Application Security Flaw : Ineffective Session Termination Posted on October 19, 2012 by Sameer Dixit Free Mobile Security Webinar The Persistent Threat of Mobile Apps Wednesday , October 24 11AM PDT Mobile applications are proliferating and so are attacks on and from mobile . devices Join Cenzic’s Sameer Dixit to learn about mobile security threats . Our expert will show you how shockingly easy it is to hack a mobile app and how you can assess , block and correct mobile-related . vulnerabilities This is a must attend” event for any organization that has or will deploy mobile applications that access sensitive . data This has been observed over and over again in the native mobile client server

  • ineffective session termination Archives Cenzic Web Application Security BlogCenzic Web Application

    Updated: 2012-10-20 02:58:49
    Menu Skip to content Tag Archives : ineffective session termination Post navigation Mobile Application Security Flaw : Ineffective Session Termination Posted on October 19, 2012 by Sameer Dixit by Sameer Dixit Free Mobile Security Webinar The Persistent Threat of Mobile Apps Wednesday , October 24 11AM PDT Mobile applications are proliferating and so are attacks on and from mobile . devices Join Cenzic’s Sameer Dixit to learn about mobile security threats . Our expert will show you how shockingly easy it is to hack a mobile app and how you can assess , block and correct mobile-related . vulnerabilities This is a must attend” event for any organization that has or will deploy mobile applications that access sensitive . data This has been observed over and over again in the native mobile

  • Mobile Application Security Flaw Ineffective Session Termination CenzicCenzic Web Application Securi

    Updated: 2012-10-20 02:58:48
    : Menu Skip to content Post navigation Mobile Security Flaw : Unencrypted Data Mobile Application Security Flaw : Ineffective Session Termination Posted on October 19, 2012 by Sameer Dixit Free Mobile Security Webinar The Persistent Threat of Mobile Apps Wednesday , October 24 11AM PDT Mobile applications are proliferating and so are attacks on and from mobile . devices Join Cenzic’s Sameer Dixit to learn about mobile security threats . Our expert will show you how shockingly easy it is to hack a mobile app and how you can assess , block and correct mobile-related . vulnerabilities This is a must attend” event for any organization that has or will deploy mobile applications that access sensitive . data This has been observed over and over again in the native mobile client server

  • Talend Open Studio for Data Quality 5.2.0

    Updated: 2012-10-18 08:03:39
    Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects Talend Open Studio for Data . Talend Open Studio for Data Quality Talend Open Studio for Data Quality helps you to profile your data . The ergonomic interface allows you to define metrics indicators and collect statistics on your data in a few clicks . It comes with a set of regular expressions that helps you to identify bad data . You can create your own regular expressions and use them in data profiling analyses . A lot of options exist for each indicator , which change the behavior of the indicator so that it gives you more pertinent information . Data quality options on indicators alert you when your data quality is not what you . expected Tags

  • Talend Open Studio for ESB 5.2.0

    Updated: 2012-10-18 08:03:37
    Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects Talend Open Studio for ESB Talend Open Studio for ESB Talend Open Studio for ESB is an innovative , Eclipse-based tooling environment for modeling , configuring , and deploying integration solutions using the Apache-based open source enterprise service bus ESB Talend ESB . Talend ESB is a versatile and flexible ESB that allows organizations to address integration challenges , from simple departmental projects to complex , heterogeneous IT environments . Powered by the Apache CXF , Apache Camel , and Apache ActiveMQ Open Source integration projects , it makes enterprise-class integration accessible by delivering a cost-effective and easy-to-use way to

  • Talend Open Studio for MDM 5.2.0

    Updated: 2012-10-18 08:03:37
    Talend Open Studio for MDM provides the key data management functions across integration, quality, and governance to get users started with master data in their companies. It allows users to install, implement, and manage a single solution across all these key functional groups, decreasing complexity and time to value for MDM projects. Release Notes: This release adds many new features and fixes bugs. Release Tags: new features, Bugfixes Tags: Software Development, Code Generators, Database Licenses: GPLv2

  • how to Archives Cenzic Web Application Security BlogCenzic Web Application Security Blog

    Updated: 2012-10-17 07:04:02
    Menu Skip to content Category Archives : how to Post navigation Older posts Mobile Security Flaw : Unencrypted Data Posted on October 3, 2012 by Sameer Dixit by Sameer Dixit With more than a million mobile applications in the wild it†s time for organizations to tackle common mobile security . flaws Hackers are already leveraging mobile applications to create havoc for enterprises . Over the next several weeks , we’re going to share some common vulnerabilities and best practices for mobile application developers to prepare their applications to effectively defend from . attacks Unencrypted Data Storage Regardless of the mobile platform iOS , Android etc . application project resources , settings and preference files such as plist and xml are frequently unencrypted . These files may

  • mobile Archives Cenzic Web Application Security BlogCenzic Web Application Security Blog

    Updated: 2012-10-17 07:04:00
    Menu Skip to content Category Archives : mobile Post navigation Mobile Security Flaw : Unencrypted Data Posted on October 3, 2012 by Sameer Dixit by Sameer Dixit With more than a million mobile applications in the wild it†s time for organizations to tackle common mobile security . flaws Hackers are already leveraging mobile applications to create havoc for enterprises . Over the next several weeks , we’re going to share some common vulnerabilities and best practices for mobile application developers to prepare their applications to effectively defend from . attacks Unencrypted Data Storage Regardless of the mobile platform iOS , Android etc . application project resources , settings and preference files such as plist and xml are frequently unencrypted . These files may contain sensitive

  • android Archives Cenzic Web Application Security BlogCenzic Web Application Security Blog

    Updated: 2012-10-17 07:03:58
    Menu Skip to content Tag Archives : android Post navigation Mobile Security Flaw : Unencrypted Data Posted on October 3, 2012 by Sameer Dixit by Sameer Dixit With more than a million mobile applications in the wild it†s time for organizations to tackle common mobile security . flaws Hackers are already leveraging mobile applications to create havoc for enterprises . Over the next several weeks , we’re going to share some common vulnerabilities and best practices for mobile application developers to prepare their applications to effectively defend from . attacks Unencrypted Data Storage Regardless of the mobile platform iOS , Android etc . application project resources , settings and preference files such as plist and xml are frequently unencrypted . These files may contain sensitive

  • ios Archives Cenzic Web Application Security BlogCenzic Web Application Security Blog

    Updated: 2012-10-17 07:03:57
    Menu Skip to content Tag Archives : ios Post navigation Mobile Security Flaw : Unencrypted Data Posted on October 3, 2012 by Sameer Dixit by Sameer Dixit With more than a million mobile applications in the wild it†s time for organizations to tackle common mobile security . flaws Hackers are already leveraging mobile applications to create havoc for enterprises . Over the next several weeks , we’re going to share some common vulnerabilities and best practices for mobile application developers to prepare their applications to effectively defend from . attacks Unencrypted Data Storage Regardless of the mobile platform iOS , Android etc . application project resources , settings and preference files such as plist and xml are frequently unencrypted . These files may contain sensitive

  • mobile Archives Cenzic Web Application Security BlogCenzic Web Application Security Blog

    Updated: 2012-10-17 07:03:55
    Menu Skip to content Tag Archives : mobile Post navigation Mobile Security Flaw : Unencrypted Data Posted on October 3, 2012 by Sameer Dixit by Sameer Dixit With more than a million mobile applications in the wild it†s time for organizations to tackle common mobile security . flaws Hackers are already leveraging mobile applications to create havoc for enterprises . Over the next several weeks , we’re going to share some common vulnerabilities and best practices for mobile application developers to prepare their applications to effectively defend from . attacks Unencrypted Data Storage Regardless of the mobile platform iOS , Android etc . application project resources , settings and preference files such as plist and xml are frequently unencrypted . These files may contain sensitive

  • mobile app development Archives Cenzic Web Application Security BlogCenzic Web Application Security

    Updated: 2012-10-17 07:03:53
    Menu Skip to content Tag Archives : mobile app development Post navigation Mobile Security Flaw : Unencrypted Data Posted on October 3, 2012 by Sameer Dixit by Sameer Dixit With more than a million mobile applications in the wild it†s time for organizations to tackle common mobile security . flaws Hackers are already leveraging mobile applications to create havoc for enterprises . Over the next several weeks , we’re going to share some common vulnerabilities and best practices for mobile application developers to prepare their applications to effectively defend from . attacks Unencrypted Data Storage Regardless of the mobile platform iOS , Android etc . application project resources , settings and preference files such as plist and xml are frequently unencrypted . These files may contain

  • mobile app vulnerabilities Archives Cenzic Web Application Security BlogCenzic Web Application Secur

    Updated: 2012-10-17 07:03:52
    Menu Skip to content Tag Archives : mobile app vulnerabilities Post navigation Mobile Security Flaw : Unencrypted Data Posted on October 3, 2012 by Sameer Dixit by Sameer Dixit With more than a million mobile applications in the wild it†s time for organizations to tackle common mobile security . flaws Hackers are already leveraging mobile applications to create havoc for enterprises . Over the next several weeks , we’re going to share some common vulnerabilities and best practices for mobile application developers to prepare their applications to effectively defend from . attacks Unencrypted Data Storage Regardless of the mobile platform iOS , Android etc . application project resources , settings and preference files such as plist and xml are frequently unencrypted . These files may

  • unencrypted data Archives Cenzic Web Application Security BlogCenzic Web Application Security Blog

    Updated: 2012-10-17 07:03:50
    Menu Skip to content Tag Archives : unencrypted data Post navigation Mobile Security Flaw : Unencrypted Data Posted on October 3, 2012 by Sameer Dixit by Sameer Dixit With more than a million mobile applications in the wild it†s time for organizations to tackle common mobile security . flaws Hackers are already leveraging mobile applications to create havoc for enterprises . Over the next several weeks , we’re going to share some common vulnerabilities and best practices for mobile application developers to prepare their applications to effectively defend from . attacks Unencrypted Data Storage Regardless of the mobile platform iOS , Android etc . application project resources , settings and preference files such as plist and xml are frequently unencrypted . These files may contain

  • bala venkat Archives Cenzic Web Application Security BlogCenzic Web Application Security Blog

    Updated: 2012-10-17 07:03:10
    Menu Skip to content Tag Archives : bala venkat Post navigation Live Webinar : ABC’s of Web Application Security Posted on September 26, 2012 by Cenzic , . Inc by Cenzic , Inc . Hardly a day goes by without news of a major web application or web site being compromised . The question is : what can and should your organization do to protect itself from becoming the next victim To answer this and your other important security questions , Cenzic invites you to attend a 30-minute live webinar , ABC’s of Web Application Security on Wednesday , October 3 at 11 am PDT . ABC†s of Web Application Security Wednesday , October 3 at 11:00 AM PDT Register Now Featured : Speakers Scott Parcel Chief Technology Officer Cenzic , . Inc Bala Venkat Chief Marketing Officer Cenzic , . Inc In this highly

  • scott parcel Archives Cenzic Web Application Security BlogCenzic Web Application Security Blog

    Updated: 2012-10-17 07:03:08
    Menu Skip to content Tag Archives : scott parcel Post navigation Live Webinar : ABC’s of Web Application Security Posted on September 26, 2012 by Cenzic , . Inc by Cenzic , Inc . Hardly a day goes by without news of a major web application or web site being compromised . The question is : what can and should your organization do to protect itself from becoming the next victim To answer this and your other important security questions , Cenzic invites you to attend a 30-minute live webinar , ABC’s of Web Application Security on Wednesday , October 3 at 11 am PDT . ABC†s of Web Application Security Wednesday , October 3 at 11:00 AM PDT Register Now Featured : Speakers Scott Parcel Chief Technology Officer Cenzic , . Inc Bala Venkat Chief Marketing Officer Cenzic , . Inc In this highly

  • webinar Archives Cenzic Web Application Security BlogCenzic Web Application Security Blog

    Updated: 2012-10-17 07:03:07
    Menu Skip to content Tag Archives : webinar Post navigation Live Webinar : ABC’s of Web Application Security Posted on September 26, 2012 by Cenzic , . Inc by Cenzic , Inc . Hardly a day goes by without news of a major web application or web site being compromised . The question is : what can and should your organization do to protect itself from becoming the next victim To answer this and your other important security questions , Cenzic invites you to attend a 30-minute live webinar , ABC’s of Web Application Security on Wednesday , October 3 at 11 am PDT . ABC†s of Web Application Security Wednesday , October 3 at 11:00 AM PDT Register Now Featured : Speakers Scott Parcel Chief Technology Officer Cenzic , . Inc Bala Venkat Chief Marketing Officer Cenzic , . Inc In this highly

  • cyber crime Archives Cenzic Web Application Security BlogCenzic Web Application Security Blog

    Updated: 2012-10-17 07:02:43
    Menu Skip to content Category Archives : cyber crime Post navigation Should SMBs worry about Web application security Posted on September 21, 2012 by Bala Venkat by Bala Venkat Let†s say that you are an owner of an SMB , you have a website that gets modest traffic , most of which you determine are your existing or potential customers . They browse your wares and offerings , and can purchase them directly through your . website Let†s also say that security for your company†s website really hasn†t been one of your major concerns . You think to yourself , “Why should it be ” You service a small , yet steadily growing user-base . You don†t think you would be on a hacker†s radar for a million . years You are one of the little guys right Why would a hacker target you Why would

  • product information Archives Cenzic Web Application Security BlogCenzic Web Application Security Blo

    Updated: 2012-10-17 07:02:42
    Menu Skip to content Category Archives : product information Post navigation Should SMBs worry about Web application security Posted on September 21, 2012 by Bala Venkat by Bala Venkat Let†s say that you are an owner of an SMB , you have a website that gets modest traffic , most of which you determine are your existing or potential customers . They browse your wares and offerings , and can purchase them directly through your . website Let†s also say that security for your company†s website really hasn†t been one of your major concerns . You think to yourself , “Why should it be ” You service a small , yet steadily growing user-base . You don†t think you would be on a hacker†s radar for a million . years You are one of the little guys right Why would a hacker target you Why

  • application security testing Archives Cenzic Web Application Security BlogCenzic Web Application Sec

    Updated: 2012-10-17 07:02:40
    Menu Skip to content Tag Archives : application security testing Post navigation Should SMBs worry about Web application security Posted on September 21, 2012 by Bala Venkat by Bala Venkat Let†s say that you are an owner of an SMB , you have a website that gets modest traffic , most of which you determine are your existing or potential customers . They browse your wares and offerings , and can purchase them directly through your . website Let†s also say that security for your company†s website really hasn†t been one of your major concerns . You think to yourself , “Why should it be ” You service a small , yet steadily growing user-base . You don†t think you would be on a hacker†s radar for a million . years You are one of the little guys right Why would a hacker target you

  • small business Archives Cenzic Web Application Security BlogCenzic Web Application Security Blog

    Updated: 2012-10-17 07:02:38
    Menu Skip to content Tag Archives : small business Post navigation Should SMBs worry about Web application security Posted on September 21, 2012 by Bala Venkat by Bala Venkat Let†s say that you are an owner of an SMB , you have a website that gets modest traffic , most of which you determine are your existing or potential customers . They browse your wares and offerings , and can purchase them directly through your . website Let†s also say that security for your company†s website really hasn†t been one of your major concerns . You think to yourself , “Why should it be ” You service a small , yet steadily growing user-base . You don†t think you would be on a hacker†s radar for a million . years You are one of the little guys right Why would a hacker target you Why would they

  • bandwidth 0.32f

    Updated: 2012-10-14 22:00:27
    Login Signup Lost password Home Articles Browse Projects by Tag Submit new Project About Blog Help Sites All Mac OS X Mobile Unix Projects bandwidth bandwidth Bandwidth is primarily a memory bandwidth benchmark , but it can also measure network bandwidth . It measures the maximum memory bandwidth of each part of the memory system , including main memory , L1 and L2 caches , framebuffer memory , and register-to-register using fast , sequential memory accesses . It also performs random memory accesses to provide a more real-world performance estimate . The tests support Linux Intel Windows Cygwin , Mac OS X , and Windows Mobile . Its core routines are in assembly for x86 and x86-64 architectures . Bandwidth also includes automatic graphing of the results , stored to a BMP image file . The

  • NetSecMicrocast: Davidoff & Ham

    Updated: 2012-10-10 01:57:07
    I got to catch up to a couple of friends of mine, Sherri Davidoff and Jonathan Ham, a few weeks ago.  They recently released a book called Network Forensics: Tracking Hackers Through Cyberspace.  The pair talk about what goes into creating a lab in preparation for a book like this, about Internet Pigeon Protocols and [...]

  • Mobile Security Flaw Unencypted Data CenzicCenzic Web Application Security Blog

    Updated: 2012-10-04 07:35:38
    : Menu Skip to content Post navigation Live Webinar : ABC’s of Web Application Security Mobile Security Flaw : Unencrypted Data Posted on October 3, 2012 by Sameer Dixit With more than a million mobile applications in the wild it†s time for organizations to tackle common mobile security . flaws Hackers are already leveraging mobile applications to create havoc for enterprises . Over the next several weeks , we’re going to share some common vulnerabilities and best practices for mobile application developers to prepare their applications to effectively defend from . attacks Unencrypted Data Storage Regardless of the mobile platform iOS , Android etc . application project resources , settings and preference files such as plist and xml are frequently unencrypted . These files may contain

  • Sameer Dixit Author at Cenzic Web Application Security BlogCenzic Web Application Security Blog

    Updated: 2012-10-04 07:35:36
    , Menu Skip to content Author Archives : Sameer Dixit Post navigation Mobile Security Flaw : Unencrypted Data Posted on October 3, 2012 by Sameer Dixit by Sameer Dixit With more than a million mobile applications in the wild it†s time for organizations to tackle common mobile security . flaws Hackers are already leveraging mobile applications to create havoc for enterprises . Over the next several weeks , we’re going to share some common vulnerabilities and best practices for mobile application developers to prepare their applications to effectively defend from . attacks Unencrypted Data Storage Regardless of the mobile platform iOS , Android etc . application project resources , settings and preference files such as plist and xml are frequently unencrypted . These files may contain

Current Feed Items | Previous Months Items

Sep 2012 | Aug 2012 | Jul 2012 | Jun 2012 | May 2012 | Apr 2012