Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT
ADVERTISEMENT

Links 1 through 10 of 36 by Mike Wasylik tagged security

there are six easy steps you can take to secure your WordPress installations and make difficult, if not impossible for a hacker to harm your website.

Share It With Others!

This is a bash function. It gets called recursively (recursive function). This is most horrible code for any Unix / Linux box.

Share It With Others!

"Airport security in America is a sham—“security theater” designed to make travelers feel better and catch stupid terrorists. Smart ones can get through security with fake boarding passes and all manner of prohibited items—as our correspondent did with ease."

Share It With Others!

Basically, if you create any ad-hoc network SSID, and a Windows XP user attempts to join it once, and at some point later is without a network connection, his laptop will broadcast your network SSID as an ad-hoc network. This is how the viral "Free Public WiFi" works.

Share It With Others!

Share It With Others!

Share It With Others!

Share It With Others!

Share It With Others!

Share It With Others!

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT