Hi and Welcome to small dot of Salman ke Khayalat on Websphere.
This blog is an attempt to keep all my information (which could range from ideas, from rants to product / movie reviews) in a visual way, a visual repository perhaps. Also, I have a knack of keeping bookmarks to my favorite websites and making them properly tagged, and assigned them keywords. Still with the amount of bookmarks, I feel a better way to document those websites (especially reference ones) is to use a Blog.
The name is Salman… Salman, Khwaja (Feels like the bond intro, doesn’t it). I came across a good idea of turning a small web page into a search engine.
- Time to remove xss protection in our hardening documents and introduce CSPs. https://portswigger.net/daily-swig/google-deprecates-xss-auditor-for-chrome https://portswigger.net/daily-swig/xss-protection-disappears-from-microsoft-edge https://groups.google.com/a/chromium.org/forum/m/#!msg/blink-dev/TuYw-EZhO9g/blGViehIAwAJ
- The Hacker News Engage Your Management with the Definitive ‘Security for Management’ Presentation Template In every organization, there is a person who’s directly accountable for cybersecurity. The name of the role varies per the organization’s size and maturity – CISO, CIO, and Director of IT are just a few common examples – but the responsibility is similar in all places. They’re the person who understands the risk and exposure, knows how prepared the team and most important – what the gaps are
- TechBeacon – Security Why the phishing problem is getting worse Phishing has been around as long as email, and it continues to present a substantial risk to business and is often cited as a top security concern. The concern is driven by increasingly sophisticated attacks; the move from email to alternative attack vectors, such as social media and messaging; and the simple fact that phishing targets the weakest link in the security chain: people.
- The Hacker News Cybersecurity Frameworks — Types, Strategies, Implementation and Benefits Organizations around the world are wondering how to become immune from cyber attacks which are evolving every day with more sophisticated attack vectors. IT teams are always on the lookout for new ransomware and exploit spreading in the wild, but can all these unforeseen cyber attacks be prevented proactively? That’s definitely a ‘NO,’ which is why there’s a reactive approach in place to
- The Hacker News Patch Tuesday: Microsoft Releases July 2019 Security Updates Microsoft today released its monthly batch of software security updates for the July month to patch a total of 77 vulnerabilities, 14 are rated Critical, 62 are Important, and 1 is rated Moderate in severity. The July 2019 security updates include patches for various supported versions of Windows operating systems and other Microsoft products, including Internet Explorer, Edge, Office, Azure
- Threatpost | The first stop for security news 1,300 Popular Android Apps Access Data Without Proper Permissions Study finds Android apps circumvented privacy opt-in rules and collected sensitive user information against user permission.
- Threatpost | The first stop for security news Marriott Hit With $123M Fine For Massive 2018 Data Breach The data breach fine against Marriott by the Information Commissioner’s Office comes a day after British Airways was also penalized.
- What Is Blockchain? The Complete WIRED Guide | WIRED https://www.wired.com/story/guide-blockchain/
- Over 1,300 Android Apps Caught Collecting Data Even If You Deny Permissions https://thehackernews.com/2019/07/android-permission-bypass.html
- Dark Reading: DevOps’ Inevitable Disruption of Security Strategy Black Hat USA programming will dive into the ways DevOps-driven shifts in practices and tools are introducing both new vulnerabilities and new ways of securing enterprises.
- WIRED A Zoom Flaw Gives Hackers Easy Access to Your Webcam All it takes is one wrong click, and the popular video conferencing software will put you in a meeting with a stranger.
- WIRED Should You Wear White or Black on Hot Days? Here’s the Data Quick experiments can help you answer the eternal question of whether to wear black or white on hot summer days. Turns out, it’s complicated.
- WIRED 5 Best Slow-Motion Video Apps: How to Shoot Slo-Mo on Phones How to manipulate time and space to get the most out of your phone’s camera. Our slo-mo advice, and the best smartphones for recording in slow motion.
- Progressive Web Apps explained: Everything you should know https://www.androidauthority.com/progressive-web-apps-1005564/
- “Data Breaches are on the Rise — Is it too hard to p̶r̶e̶v̶e̶n̶t̶ control data breaches?” by Sahil Ahamad https://link.medium.com/7edZdad78X
- WIRED How to Protect Our Kids’ Data and Privacy Opinion: Kids today have an online presence starting at birth, which raises a host of legal and ethical concerns. We desperately need a new data protection framework.
- The Hacker News Ubuntu-Maker Canonical’s GitHub Account Gets Hacked An unknown hacker yesterday successfully managed to hack into the official GitHub account of Canonical, the company behind the Ubuntu Linux project and created 11 new empty repositories. It appears that the cyberattack was, fortunately, just a “loud” defacement attempt rather than a “silent” sophisticated supply-chain attack to distribute modified malicious versions of the open-source
- WIRED What Is Credential Dumping? Modern network intrusions thrive on a counterintuitive trick: stealing passwords from computers that hackers have already compromised.
Or one could choose to go to following Categories
With time, I do develop small projects, that aid in the my web development. Below are small links to projects, which I have created for Self Promotion, and they are also being used in everyday routines tasks.
- Power Seek
A complete user manual resides here.
Test drive Power Seek here.
- Power test
test drive your web applications on check for screen sizes here.