Kademlia is one of the most popular peer-to-peer distributed hash table (DHT) and routing protocol in use today. Lets have a look at what Kademlia does and how the Kademlia DHT works.
IP spoofing is the attack used by hackers to steal a user's IP address and use it for his/her own malicious needs. I discuss IP spoofing and explain why the attack is not feasible.
Some websites use session ids that are easy to predict. If a hacker is able to understand how session identifiers are generated by that website, he can gain access to that user's account. This attack is known as Session Prediction.
SQL injection attacks pose a serious security threat to Web applications: they allow attackers to obtain unrestricted access to the databases underlying the applications and to the potentially sensitive information these databases contain.
Today, cloud computing generates a lot of hype; it's both promising and scary. Businesses see its potential but also have many concerns. Lets review some of the security concerns and the solutions available.
The main function of a computer system is to process information. Here we look at the functions of the major hardware components of a computer system and how they relate to information processing.
Starting a course on Database Security a, I got myself involved in the MySQL vs. Oracle debate started before Tyrannosaurus was born. There are many reasons to use either database - lets look at some of them.
Drupal's WSOD has been extensively documented by the Drupal community at http://drupal.org/node/158043. Typically, everything seems fine, and then, almost out of the blue, the Drupal based web application you are working on suddenly becomes completely broken.
I'm currently working on a website and stumbled onto a small problem and the solution which might be useful to someone - displaying Drupal dates in a custom format.
Hey guys, here is my new screencast on setting up video on your Drupal website using the Media and Media: Youtube modules.
There are several mechanisms you can use to protect your account from being hacked, we will go through each one of them in detail here, and how to implement each one.
Both Singular vs Plural Database table names have advantages and disadvantages, the most important thing is that your naming conventions are consistent across the database since it would be annoying to remember which table names are plural and which are singular. Here are a few things to consider when choosing your naming convention.

No front page content has been created yet.