A Blog about Programming, Security, Business, Web, Earn money

Showing posts with label development. Show all posts
Showing posts with label development. Show all posts

More than 6 billions terminals threatened by ThreadX

    Researchers have identified a flaw in the SoC ThreadX OS that allows an attacker to send malicious code into WiFi controllers. Express Logic's operating system is embedded in nearly 6.2 billion computers, routers, smartphones and game consoles.
The Threadx-compatible SoCs, including the Marvell Avastar 88W8897, are integrated in a multitude of consumer terminals like PCs and smartphones, but also PS4 and Xbox One. (Credit: Marvell)

    Embedi researchers have detected a flaw in Express Logic's ThreadX operating system. Avastar 88W8897 SoCs and all ThreadX-compatible SoCs are affected. In short, nearly 6.2 billion devices (computers, smartphones, routers, PlayStation 4 and Xbox One) equipped with these SoC are exposed.

One of the vulnerabilities discovered was a special case of ThreadX block pool overflow. This vulnerability can be triggered without user interaction during the analysis of available networks, reads the blog post of the researcher Embedi. The latter has found several ways to execute malicious code. The most worrying is the ability to broadcast corrupted WiFi packets that will load into the SoC memory of the WiFi module. They will run at the time of updating the list of available networks on the machine, every five minutes on FNU / Linux according to the researchers. Worse, it is not necessary to know the WiFi key network to attack. Express Logic has stated that patches are being developed.


Share:

Horoscope for iPhone and iPad

<div dir="rtl" style="text-align: right;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://m.iapps4you.com/images/apps/411/411047/logo.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="175" data-original-width="175" src="https://m.iapps4you.com/images/apps/411/411047/logo.jpg" /></a></div>
<div dir="ltr" style="text-align: justify;">
&nbsp; &nbsp; Find your free horoscope, complete and in video with all the astro forecasts of the day, the week, the month and the year! Love, meetings, financial choices, health risk ... Whether you are Cancer, Leo or Taurus, the stars guide you to make the best choice, unless you prefer the forecasts of the Chinese horoscope!</div>
<div dir="ltr" style="text-align: justify;">
<br /></div>
<div dir="ltr" style="text-align: justify;">
&nbsp; &nbsp; Discover your horoscope of the day, the week, the month and the year, for free! Complete predictions in love, work and health. Manage multiple profiles to track your horoscope and that of your loved ones from day to day. Also find the zodiac signs compatibility service and discover the predictions of your Chinese astrological sign.</div>
<div dir="ltr" style="text-align: left;">
<br /></div>
<div dir="ltr" style="text-align: justify;">
It is you who schedule your alerts to receive your horoscope from the day to the hour you want.</div>
<div dir="ltr" style="text-align: justify;">
<br /></div>
<div dir="ltr" style="text-align: center;">
<span style="font-size: large;"><a href="https://apple.co/2RzrCdZ" target="_blank">Download</a></span></div>
<div dir="ltr" style="text-align: center;">
<br /></div>
<div dir="ltr" style="text-align: center;">
<br /></div>
</div>

Share:

Create your own FileProtector to hide your files

In today's article we will talk about programming. More specifically, we will program a small utility to hide / protect your important files (passwords, important memories ... etc).

Little notes before you start:

This utility is written in VB.NET language, it is an old project brought up to date.
This utility is only available on Windows.
For starters, and to edit the source code, you will need to install Visual Studio Community (the integrated development environment of Microsoft).

You will also need to install the .NET Framework, version 3.5 minimum (normally already present on most PCs). And you will need a minimum of knowledge in VB.NET language (or want to learn and understand;)).

Want to learn programming to get started on your own projects right now? Download the complete guide to learn C, C # and Python? Click here. Use the promo code "FIRSTAPROG" to get it at -20% (8 codes remaining).

What is a FileProtector?
It is a utility to protect your sensitive files with a password. This type of tool already exists, Winrar for example can do it, but we will make a portable utility, that is to say that does not require installation and contains only a small file. Unlike other FileProtector's, it will not clearly indicate that it is one, it will display a default error message, letting others believe it is a mundane program.

The main purpose of this article is to provide you with a nice little project to familiarize yourself with the programming, since practicing is what allows you to learn faster. I also do not allow myself to consider this program as perfect, it has defects, it can be improved, modified or even rewritten in another programming language, and this is precisely what allows to practice and learn. Do not hesitate to suggest additions / modifications / improvements, because everyone can learn from others.

Example of operation
In order to make you understand how it works, nothing better than a video demonstration.

Explanations of the demonstration:
- We have two files to protect that we place in a demo.rar file.
- Drag and drop this demo.rar file into FileProtector.
- FileProtector asks us for a password and demo.rar number.
- We delete the original files and demo.rar
- Then click on FileProtector which displays a false error message.
- In the right corner of the error message, you can display the dialog box to decrypt the file.
- We give back the password and FileProtector we recreate the file demo.rar called this time dechiffre.rar and containing the initial files.

How to program FileProtector?
Let's start from a very general point of view.
There are two ways to use FileProtector
To encrypt
Drag and drop the file to be encrypted on FileProtector. This is handled via Environment.GetCommandLineArgs () which retrieves the full path of the dragged / dropped file.

We then read the contents of the dragged / dropped file with System.Text.Encoding.Default.GetString ((IO.File.ReadAllBytes (file))) and we ask for a password to encrypt all its contents with InputBox.

We now want to add the contents of the encrypted file to the end of FileProtector (the latter thus plays the role of encrypted file container).

For this we will first add a separator that will allow us to separate the contents of FileProtector contents of the encrypted file. We will also add the extension of the encrypted file so that it can be deciphered with the correct extension later:
FilePut(1, "#separateur#" & IO.Path.GetExtension(fichier) & "#ext#" & chiffre)
Here is a schema that shows the contents of FileProtector when it hides an encrypted file:


But to add this data in FileProtector, we have to go through a temporary copy of FileProtector because it is already running and we can not edit a file that is running.

We will create a temporary file identical to FileProtector, called "copy.exe" and we will add the information in question:
FileOpen(1, Application.StartupPath & "\copy.exe", OpenMode.Binary, OpenAccess.ReadWrite, OpenShare.Default)

Finally, it will remain to delete the old FileProtector and rename copy.exe FileProtector.exe. It is a combination to keep a single file FileProtector.exe by bypassing the limits mentioned above. For this, we use another temporary file that is a series of batch command to do the actions cited and self-delete.

Here is the source code that starts when FileProtector starts:

Here is the Rename And Delete procedure which is perhaps the most ambiguous part of this program:

To decipher:
FileProtector must be started as a normal program. This will display an error message to keep curious users away.

But it has a hidden feature to enable decryption. This is a small, transparent image in the lower right corner of the window.

Clicking on this image displays a dialog asking for the password to decrypt the hidden file.

The decryption then takes place, we do the same thing as before: we create a temporary copy file of FileProtector.exe to recover the encrypted content.

We decipher this content and recreate an empty FileProtector.exe file and the decrypted initial file, with the correct extension.

We reuse a batch file for that.

We can then repeat the steps and encrypt a new file.

Here is the code that executes when you click on the hidden image:



Known limitations
You can only put one file at a time in FileProtector (use a .zip file to place several files).

Files or folders with accents "é, è, à, etc" as well as network paths make (or can make) crash the program.

If the decryption password is incorrect, the temporary copy is not deleted.

The source code can (largely) be improved.

Maximum size tested: 400MB (the speed of (un) encryption and the final size depends on the encryption algorithm used).

Your antivirus may suspect this utility but it is not malicious. In this regard, sandboxed executions prevent the program from running normally.

Supplied as such, without warranty.

Improvements Track
Save the file name with the extension, to recover exactly the same file after decryption.

Manage the character problem (?).

Create an external process to avoid the (ugly) use of a bat file that opens a command prompt.

Check that it works on other systems.

Use more recent libraries / functions than FileOpen, FilePut ... Etc. For example, IO.FileStream and IO.StreamWriter.

Suggest another way to display the decryption dialog.

For example with a keyboard shortcut:
Private Sub Form1_KeyDown(sender As Object, e As KeyEventArgs) Handles Me.KeyDown
    If e.Control AndAlso e.KeyCode = Keys.S Then 'si la touche controle est appuyée ainsi que la touche S
       'demander mot de passe
    End If
 End Sub
Share:

Microsoft Edge: Did Google intentionally sabotage the browser?


A former Microsoft trainee accuses Google of intentionally changing its websites, including YouTube. The goal is to "break" competing browsers like Microsoft Edge, according to information published on the English-language website HackerNews.

According to Joshua Bakita, Google would make regular code changes in some of its sites in order to cause slow and weary users of browsers other than Google Chrome. To stay compatible with Google services, these browsers that are like Safari or Edge.P would be forced to update regularly.

Changes in YouTube's code
Joshua Bakita even estimates that Eden was superior to Chrome on YouTube, but that Google then chose to change the code to return to its competitor, rather than improve its own features.
"Although I'm not entirely sure that YouTube has been intentionally modified to slow Edge, many of my colleagues are convinced of this - and they've looked at the problem more closely," writes the former intern on HackerNews. . To improve nothing, when we asked him, YouTube refused to delete the "div" (tag in the code HTLM) empty hidden and did not give explanations ".

Google denies any intentional maneuver
For its part, Google has refuted all charges of sabotage. For the web giant, YouTube's empty "div" was a simple computer bug, which has since been fixed.

"YouTube does not add code designed to neutralize the optimizations of other browsers and acts quickly to correct the detected bug," said a spokesman for the firm in The Verge. He added: "We regularly collaborate with other browser vendors via standardization organizations, the Web Platform Tests project, the Chromium open source project ... to improve browser interoperability. "

Share:

Introduction to ASP.NET MVC


Explore the key moving elements of MVC, the way to produce an initial project, and therefore the variations between MVC and ASP.NET.

Mod 01: Basics of MVC and the Moving Parts

Mod 02: Creating and Configuring Models

Mod 03: The Power of Visual Studio

Mod 04: Deep Dive into Controllers

Mod 05: Deep Dive into Views

Mod 06: Introduction to Bootstrap


Mod 07: Introduction to Authentication in MVC

Mod 08: Supplement Your Knowledge
Share:

Courses don’t fear the internet

BASIC HTML & CSS for NON-WEB DESIGNERS
 By Jessica Hische and Russ Maschmeyer

   Are you a print designer, artist, fine-artist, or general artistic person? does one have a stinking web {site} that you simply abused  along yourself in Dreamweaver in this ONE net style category that you simply took in college? does one not have a site the least bit as a result of you’ve been waiting 2 years for your relative to place it along for you? Well, we’re here to assist. we all know that you simply have very little to no want to try and do net style professionally, however that doesn’t mean that you simply need an unpleasant same web site or to accept one that hasn't been updated since Hackers was in theaters. Through short tutorial videos, you’ll learn the way to require a basic wordpress web log and manipulate the css, HTML (and even some php!) to match your aesthetic. You’ll feel authorised instead of lame by {the internet|the net|the net} and worst case situation you’ll a minimum of find yourself having an improved plan of however skilled web styleers flip your design dreams into a reality on screen.



“Don’t Fear the Internet”, a new resource to help demystify html and css coding so you can prettify your blogs and quit asking your nerd friends for freebies!

In this episode, we’ll introduce you to the internet, give you a simple framework for how the web works as well as introduce you to what a website is on a practical level.

In this enlightening (and hunger-inducing) episode, we’ll talk a bit about HTML code structure before we get into the meat of it (har har!) in upcoming episodes.

In this episode, we’ll introduce you to the developer tools hidden in your browser that will become indispensable as you begin to look at HTML and CSS code.

In the first video in this two-part series, we’ll take you through building a webpage from scratch by using a good text editor.

In the conclusion of this two-part series, we’ll show you how to apply and write your own CSS.

We’ll give you the low-down on Classes and IDs and hone your CSS skills at the same time.

In this “epicsode”, Jessica covers some type history and many CSS terms you’ll come to know and love.

In this installment, Russ can take you from net layout zero to hero. He’ll take you step by step, from the box model to positioning and floating and can begin you down the trail to responsive net style with fluid dimension layouts.

Share:

Apple Plans speeds up to prevent Google Maps from winning the card war

   Apple confirms that Apple Plans employees are starting to walk around the world to improve its mapping service. The firm has already been collecting data on the ground since 2015 by car, but in October people equipped with backpacks bursting with sensors began to be spotted by Californian netizens. Apple has also posted a page on its site that tracks where and on what date Apple Maps employees will collect data in the field.



Since its launch in September 2012, we can not really say that Apple Plans is overshadowing its rival Google Maps. The company's mapping application was originally thought of by Apple as a way to end its dependence on Google Maps, the mapping service that has managed to establish itself as many of Google's other products and services as the best and the most used of the market. As soon as it was released, Apple Plans (also known as Apple Maps in English-speaking countries) is rather shunned by iPhone users.

Apple wants to put Plans at Google Maps

And for good reason: the service is much less accurate and successful than its rival which was hitherto installed by default. To be able to offer Plans quickly to users without having to collect data in the field, Apple had bought data from several suppliers, including TomTom. But according to the first feedback, the application often gave incorrect navigation instructions, in addition to much less well integrate transit trips - areas in which Google Maps excels. Which does not mean that things have not improved since then.

In 2013, Apple bought, for example, HopStop and Embark (transit card specialists), WifiSlam (specialist in interior mapping), Locationary (mapping data) and Broadmap (management, classification and analysis of data). cartographic data). Since the application has managed to correct many of his youthful mistakes. But remains behind Google Maps, lack of such accurate data collected in the field. That's why, as early as 2015, Apple started running vehicles equipped with LIDARs and cameras on the roads.

But again, when Google Maps cars and foot staff have traveled virtually the entire planet, Apple has collected data from the field - outside the United States - only in a few regions (especially around capitals) in 9 countries, including France. Gold seems finally decided to go to the next level to prevent Google from winning the "card war". First, the Apple website has put a page on line where it is possible to know where and when the company's cars will drive the roads - mainly in the United States and United Kingdom at the time of writing.

Apple Plans and Google Maps will eventually become essential gears for autonomous cars

Apple's project manager, Eddy Cue, says the company is now focused on collecting data from the field. The firm also confirms that it is starting to employ people on foot equipped with electronic backpacks to collect even more accurate data on sidewalks and paths. In addition, according to Digital Trends, Apple would now use, anonymously, the location data from the iPhone. Ultimately, this should allow to update the cards more dynamically as its competitor.

The stakes are high: the companies that will have the best cartographic data tomorrow, will be able to sell them to the manufacturers of autonomous cars. A market that could "be worth billions of dollars," according to Bloomberg. However, Apple also has ambitions in this sector, a project called Project Titan internally.

Do you think that Apple can still win the battle against Google on the map? Share your opinion in the comments.

Share:

Windows 10 Microsoft wants to add ads to the mail application

   Microsoft has been thinking of adding advertising in Windows 10 through some popular applications. Some users have noticed the presence of ads in the form of email in "Mail" mail client installed by default. However, a company official said the test should not have reached the general public.



Windows 10 could make room for advertising in some of its applications, such as its mail client. Indeed, some Mail users in many countries have seen the presence of advertisements in the form of emails underlines The Verge. An initiative that seems straight forward to draw inspiration from its competitor Google. Indeed, Gmail has already been advertising on its service for a little while.

Windows 10 has been advertising in its mail application

We do not know exactly what pushes Microsoft to imitate the pace of its competitor. Windows 10 is after all a paid software. The license is included in the price of new computers, users may not appreciate this very unpleasant novelty. However, the Redmond giant explained about this through Frank Shaw, communications manager of Microsoft that explains that it was ultimately a test that should never have touched the general public.

According to the firm who told The Verge, "The company decided to turn off these ads. He also stated that the experiment was never designed to be tested on a large scale, which does not support the existence of a pilot program FAQ set up in several countries around the world, but the advertisements should disappear" . If some users have seen advertising on the app, it should disappear quickly.

On the positive side of this experience, we remember that Microsoft refuses to scan emails to display targeted content. The company has always refused to give in to this kind of practice and has even teased Google in the past about it. Gmail has decided to stop scanning emails from. What do you think of this case? If Microsoft added advertising in its applications, how would you welcome this news? Share your opinion about it in the comments.

Share:

Web Programming in Python with Django


What is Django? 
Apps, Models, and Views
URL Structure
Templates
Admin Interface
Forms
Examples / Tutorials

Download free Web Programming in Python with Django, course tutorial training, PDF file by Steve Levine, Maria Rodriguez, Geoffrey Thomas.

Share:

IPSec VPN Guide free


   IPSec is a transparent security layer for TCP/IP that is commonly used to create and operate Virtual Private Networks (VPNs).

  This document has been divided into several distinct parts according to the amount of information different types of readers are likely to need:

Part I. Learning about InJoy IPSec
Part II. Getting Started Guide
Part III. Setting up a VPN
Part IV. Advanced Features Guide
Part V. Deployment Examples
Part VI. References

  It is never too late to start learning and it would be a shame to miss an opportunity to learn a tutorial or course that can be so useful as IPSec VPN Guide especially when it is free! You do not have to register for expensive classes and travel from one part of town to another to take classes. All you need to do is download the course and open the PDF file. This specific program is classified in the Network category where you can find some other similar courses.

Share:

Adobe Dreamweaver Essentials



     Adobe Dreamweaver could be a program that enables users to make websites. The program makes it simple for users with restricted information of scripting languages to make their own web site that permits them to focus a lot of on visual aspects. The user will click and drag things into place or use the tools provided to make their own content, and Dreamweaver mechanically writes the code that's required to form it show properly in a very applications programme. It doesn't, however, limit those that area unit terribly aware of committal to writing and scripting languages to change their sites by ever-changing the code directly.

It is ne'er too late to start out learning and it might be a shame to miss a chance to be told a tutorial or course which will be therefore helpful as Adobe Dreamweaver necessities particularly once it's free! you are doing not ought to register for expensive  categories and travel from one a part of city to a different to require categories. All you would like to try to to is transfer the course and open the PDF file. This specific program is assessed within the net programming class wherever you'll be able to realize another similar courses.


Share:

How to be a Programmer



To be a good programmer is difficult and noble. The hardest part of making real a collective vision of a software project is dealing with one's coworkers and customers. Writing computer programs is important and takes great intelligence and skill. But it is really child's play compared to everything else that a good programmer must do to make a software system that succeeds for both the customer and myriad colleagues for whom she is partially responsible. In this essay I attempt to summarize as concisely as possible those things that I wish someone had explained to me when I was twenty-one.
It is never too late to start learning and it would be a shame to miss an opportunity to learn a tutorial or course that can be so useful as How to be a Programmer especially when it is free! You do not have to register for expensive classes and travel from one part of town to another to take classes. All you need to do is download the course and open the PDF file. This specific program is classified in the Computer programming category where you can find some other similar courses.
Thanks to people (like you?) Who share th knowledge, you can discover the extent of our being selected to easily learn without spending a fortune! How to be a Programmer. is available for free by its author. But also many other tutorials are accessible just as easily!
Computer PDF guide you and allow you to save on your studies.
How to be a Programmer. help on the contact form if problems
Computer PDF is also courses for training in Pascal, C, C + +, Java, COBOL, VB, C #, perl and many others IT.
You should come see our Computer programming documents. You will find your happiness without trouble !
The latest news and especially the best tutorials on your favorite topics, that is why Computer PDF is number 1 for courses and tutorials for download in pdf files - How to be a Programmer. and Computer programming!
Download other tutorials for advice on How to be a Programmer. you will see ! We will do everything to help you !
And you dear surfers what you need? The best course and tutorial, and how to learn and use How to be a Programmer. of course!
Share:

Blog Archive

Recent Posts

Contact Us

Name

Email *

Message *