Technologie

Adobe Flash 20.0.0.235

Quoi de nouveau dans Adobe Flash Version 20.0.0.235:

 

Fixed Issues

  • Flash Player fails to load the .SWF files that comprise much of com2Learn.com’s course content
  • Method URLLoader.load fails to load an xml file located within an MHT archive
  • Unloaded SWFs with Dialogs:Flash player hangs on clicking « browse dialog » link
  • usflashmap.com – Flash Player gets hang after clicking on the List tab
  • Embedded Flash objects stop working in SMART Notebook on Windows
  • The candidate window displayed at wrong position when input some CCJK characters on Windows 10 Edge Browser
  • Flash in 16:9 video resolution shows green strip (noise) on right of video window on Mac
Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+

Tor 5.0.4

Quoi de nouveau dans Tor 5.0.4:

  • Update Firefox to 38.4.0esr
  • Update NoScript to 2.6.9.39
  • Update Torbutton to 1.9.3.5
  • Spoof Referer when leaving a .onion domain
  • about:tor should accommodate different fonts/font sizes
  • Don’t translate the homepage/spellchecker dictionary string
  • Don’t show text-select cursor on circuit display
  • Remove unused code
  • Translation updates
  • Remove the en-US dictionary from non en-US Tor Browser bundles
  • Remove dead ScrambleSuit bridge
  • Update meek-amazon fingerprint
  • Isolate favicon requests caused by the tab list dropdown
  • Don’t crash while opening a second Tor Browser
Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+

Joomla Administrator

Joomla Administrator

 

As a website administrator you might be concerned about the visual appearance of a website but will pass responsibility for making changes and improvements to a web designer. Similarly, when changes to functionality are required you will contract a web developer to do the necessary work. As a website administrator you are responsible for the day-to-day operation and maintenance of the website. Activities might include ensuring that the site is properly backed up; managing user access; possibly installing extensions. You will also have responsibility for maintaining the security of the website.

 

 

Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+

Administration Bitrix

Administration Bitrix

 

Bitrix Site Manager is the core on which you can build any complex web projects. With Bitrix Site Manager, you do not need any special programming or web design knowledge and skills. Bitrix Site Manager installs to the root directory of a remote server. An administrator can manage sites via the web interface. To function properly, the server configuration should meet the following minimum requirements:

  • Apache web server version 1.3 or higher;
  • PHP version 5.0.0 or higher;
  • MySQL version 4.1.11 or higher / Oracle 10g or MSSQL 2000 or higher;
  • 10 Mb of free disk space (for the Update System).

 

 

Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+

Cryptography law

Cryptography law

 

Cryptography law

 

Issues regarding cryptography law fall into four categories :

  • Export control, which is the restriction on export of cryptography methods within a country to other countries or commercial entities. There are international export control agreements, the main one being the Wassenaar Arrangement. The Wassenaar Arrangement was created after the dissolution of COCOM (Coordinating committee for Multilateral Export Controls), which in 1989 « decontrolled password and authentication-only cryptography. »
  • Import controls, which is the restriction on using certain types of cryptography within a country.
  • Patent issues, which deal with the use of cryptography tools that are patented.
  • Search and seizure issues, on whether and under what circumstances, a person can be compelled to decrypt data files or reveal an encryption key.

 

Cryptography law in different countries

 

France. As of 2011 and since 2004, the law for trust in the digital economy (LCEN) mostly liberalized the use of cryptography. As long as cryptography is only used for authentication and integrity purposes, it can be freely used. The cryptographic key or the nationality of the entities involved in the transaction do not matter. Typical e-business websites fall under this liberalized regime. Exportation and importation of cryptographic tools to or from foreign countries must be either declared (when the other country is a member of the European Union) or requires an explicit authorization (for countries outside the EU).

 

United States. In the United States, the International Traffic in Arms Regulation restricts the export of cryptography. The export of cryptography from the United States is the transfer from the United States to another country of devices and technology related to cryptography. Export of cryptographic technology was severely restricted by U.S. law until 1992, but was gradually eased until 2000; some restrictions still remain. Since World War II, many governments, including the U.S. and its NATO allies, have regulated the export of cryptography for national security considerations, and, as late as 1992, cryptography was on the U.S. Munitions List as an Auxiliary Military Equipment. In light of the enormous impact of cryptanalysis in World War II, it was abundantly clear to these governments that denying current and potential enemies access to cryptographic systems looked to be militarily valuable. They also wished to monitor the diplomatic communications of other nations, including the many new nations that were emerging in the post-colonial period and whose position on Cold War issues was regarded as vital. Since the U.S. and U.K. had, they believed, developed more advanced cryptographic capabilities than others, the intelligence agencies in these countries had a notion that controlling all dissemination of the more effective crypto techniques might be beneficial.

The First Amendment made controlling all use of cryptography inside the U.S. difficult, but controlling access to U.S. developments by others was thought to be more practical — there were at least no constitutional impediments. Accordingly, regulations were introduced as part of munitions controls which required licenses to export cryptographic methods (and even their description); the regulations established that cryptography beyond a certain strength (defined by algorithm and length of key) would not be licensed for export except on a case-by-case basis. The expectation seems to have been that this would further national interests in reading ‘their’ communications and prevent others from reading ‘ours’. This policy was also adopted elsewhere for various reasons.

The development, and public release, of Data Encryption Standard (DES) and asymmetric key techniques in the 1970s, the rise of the Internet, and the willingness of some to risk and resist prosecution, eventually made this policy impossible to enforce, and by the late 1990s it was being relaxed in the U.S., and to some extent (e.g., France) elsewhere. As late as 1997, NSA officials in the US were concerned that the widespread use of strong encryption will frustrate their ability to provide SIGINT regarding foreign entities, including terrorist groups operating internationally. NSA officials anticipated that the American encryption software backed by an extensive infrastructure, when marketed, was likely to become a standard for international communications. In 1997, Louis Freeh, then the Director of the FBI, said For law enforcement, framing the issue is simple. In this time of dazzling telecommunications and computer technology where information can have extraordinary value, the ready availability of robust encryption is essential. No one in law enforcement disputes that. Clearly, in today’s world and more so in the future, the ability to encrypt both contemporaneous communications and stored data is a vital component of information security.

As is so often the case, however, there is another aspect to the encryption issue that if left unaddressed will have severe public safety and national security ramifications. Law enforcement is in unanimous agreement that the widespread use of robust non-key recovery encryption ultimately will devastate our ability to fight crime and prevent terrorism. Uncrackable encryption will allow drug lords, spies, terrorists and even violent gangs to communicate about their crimes and their conspiracies with impunity. We will lose one of the few remaining vulnerabilities of the worst criminals and terrorists upon which law enforcement depends to successfully investigate and often prevent the worst crimes. For this reason, the law enforcement community is unanimous in calling for a balanced solution to this problem.

Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+

Installer Nokogiri et lxml

Comment installerNokogiri (Ruby) et lxml (Pyhon) facilement :

nokogiri

Installer Nokogiri (ruby)

gem install nokogiri -- --use-system-libraries=true --with-xml2-include=/Applications/Xcode.app/Contents/Developer/Platforms/MacOSX.platform/Developer/SDKs/MacOSX10.11.sdk/usr/include/libxml2

lxml

Installer lxml (python)

brew install libxml2
brew install libxslt
brew link libxml2 --force
brew link libxslt --force

sudo pip install lxml
brew unlink libxml2
brew unlink libxslt

Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+

Corecrypto

corecrypto

Cryptographic Libraries

The same libraries that secure iOS and OS X are available to third‑party developers to help them build advanced security features.

Security Framework

Security Framework provides interfaces for managing certificates, public and private keys, and trust policies. It supports the generation of cryptographically secure pseudorandom numbers. It also supports the storage of certificates and cryptographic keys in the keychain, which is a secure repository for sensitive user data.

Common Crypto

The Common Crypto library provides additional support for operations like symmetric encryption, hash-based message authentication codes, and digests.

corecrypto

Both Security Framework and Common Crypto rely on the corecrypto library to provide implementations of low level cryptographic primitives. This is also the library submitted for validation of compliance with U.S. Federal Information Processing Standards (FIPS) 140-2 Level 1. Although corecrypto does not directly provide programming interfaces for developers and should not be used by iOS or OS X apps, the source code is available to allow for verification of its security characteristics and correct functioning.

Share on FacebookTweet about this on TwitterPin on PinterestShare on Google+
Page 2 sur 71234567
Rbcafe © 2004- | Rb Cafe 1.3 | Contacter Rbcafe | Rbcafe sur Twitter | Rbcafe sur Facebook | Politique de confidentialité