Spending two weeks in Russia I had an opportunity to look at how their Internet censorship system operates in practice. As human rights watchdogs alarmed already, the scope of blocked websites now goes way beyond the typical criminal content declared initially by the government and now routinely includes political content. The good news is that the system is still easily bypassable even by an unexperienced user.
Looking for a Twitter API library that would work with Python 3 I stumbled upon a number of projects that implement OAuth authentication protocol in a rather superfulous way (but "baroque" would be a better word here).
Emerging Threats publishes excellent, free IP blacklists for general usage at servers and routers, in formats suitable for use with iptables and other popular firewalls. Unfortunately, on low memory and small CPU devices, loading ~1.5k iptables rules is a performance killer — here's how to do this more efficiently using ipset.
Play Framework comes equipped with a pretty complete object-relational mapping (ORM) features to enable fast and easy exchange of data between web forms and database models. As usual, with fast and easy comes the risk of abuse and Play is no exception here.
Back in 2009 the European Commission raised a controversial proposal to grant consumer rights to software users, much like those applying to cars or other "physical" goods.With recent Heartbleed failure of OpenSSL it's likely that these populist proposals will appear again. Why wasn't that good idea?
8 April 2014 is a busy day for sysadmins. Everyone is patching CVE-2014-0160 and I can actually see this in realtime — servers that were vulnerable in the morning, no longer expose their data in the afternoon. This is not really frequent that a vulnerability is treated so seriously, but in this case it's fully justified.
New electronic signature directive named "Electronic identification and trust services for electronic transactions in the internal market" (eIDAS) has been now voted in favour at the European Parliament.
Does Play Framework need ESAPI at all? It is pretty robust as it comes to automatic escaping of potential cross-site scripting vectors but if you don't use Play templates to display data (but an AJAX API instead) you'll need to do this separately. Play also offers a quite good validation framework but you still need to actually implement the validation functions for some types of content — and here's where OWASP ESAPI comes handy.
European Union has just announced a "political agreement" between Member States on new regulation related to electronic identification and trust services called eIDAS, that is going to upgrade the old electronic signature directive 1999/93/EC.
I've been using VoIP (voice over IP) telephony since 2004 and recent move to a new flat made me rebuild the whole configuration and was a good opportunity to review it and see how much I could have earned with VoIP?
Main motivation for this work was to counter security issues caused by Play implementation of session variables. Session variable is a store that allows a web application to set variables related to a particular user's session. In the traditional Java HttpServlet a session variable can be set using setAttribute() and getAttribute().