100SILEX, de 0 à 100 s: Fortunately,
1116 Sitting is Killing You
As we enter the second decade of the 21st century, there is one thing nearly all modern Americans have in common: we sit all the time. Though our great shift towards computer-based work has done great things for productivity, it has, unfortunately, done terrible things for our health. From increased risk of heart disease and obesity in the long term, to sharply hampered cholesterol maintenance in the short term, the negative health effects of sitting are starting to weigh heavily against the benefits. Even the medical field â the greatest advocates of reducing sitting time â is plagued by this new health issue. Though doctors and nurses get plenty of walking time, it usually falls to the secretaries, billers, and coders to do all the sitting. And, as we can see, something has to change.
1052 Lab Overview
Not that I recommend this level of excitement to everyone, but this is my lab. It is my basement, and as you may note from the disheveled ceiling tiles up above, having this much equipment has actually forced me to purchase a separate AC unit for the basement. So my trendy two-zone AC house has now magically become a three-zone AC house. Fortunately, I didn't need a furnace for down here. Equipment is great in the winter to heat your house!
The lab has taken on a life of it's own over time... It started out as a single standard 7-foot 19" rack. Then it grew to two standard racks... Then it changed into three Ortronics Mighty-Mo 19" rack systems (because those are cool). As seen now, it has changed yet again into four separate rack cabinets. The cabinets are a bit pricey, so they aren't all the same vendor. Note to all, even if you find a really good price on Ebay, be aware that you still have to ship them, and they weigh a LOT! (This means, have lots of friends and lots of pizza/beer!)
Nov'04 -- Well, things have moved even more! The equipment was beating the AC unit that ran for the basement. So instead of being a three-level, three-zone house, we had to upgrade to being a four-zone house. Go figure. As noted above, I would not recommend this path to anyone unless you have a good amount of business to drive it! All of the equipment here is used for testing and lab purposes, but easily serves as Proof of Concept lab for many consulting clients of mine. The recent change was that the crawlspace area under the kitchen area was excavated out and had a concrete floor poured making an enclosed little room. In addition, a large air handler (AKA Mongo AC Unit) was put into that specific room and a door was installed for access and physical separation! While all a very interesting project, it is a pain to move any equipment that you amass, so definitely plan ahead for this sort of activity!
992 Troy Hunt: Whoâs who of bad password practices â banks, airlines and more
Troy Hunt on observations, musings and conjecture about the world of software and technology
Troy Hunt, blog, .NET, Azure, Backup, Bing, Blogger, Career Development, Code Quality, Conference, Database, Design Utopia, DotNetNuke, Enterprise Software Platform, Internet Explorer, iPhone, K2, LinkedIn, Media, NDepend, Online Identity, OWASP, People Management, Personal Development, Product Review, ReSharper, Security, SharePoint, Silverlight, Software Quality, SQL Injection, SQL Server, Subversion, Travel, Twitter, Visual Studio, Windows Mobile, XSS,
Ah, passwords. Love âem or hate âem, theyâre a necessary evil of the digital age. The reality is we all end up with an alphabet soup of passwords spread over dozens of various sites and services across the internet. Whilst we might not always practice it, we all know the theory of creating a good password; uniqueness, randomness and length. The more of each, the better.
Of course we frequently donât do this because of all sorts of human factors such as convenience, memory or simple unawareness of the risks. Still, when itâs a case of individuals electing not to create secure passwords, they really only have themselves to blame.
But what happens when the website wonât allow you to create a secure password? Or at least when they severely constrain your ability to create long, random, unique passwords? And what about when they donât allow you to send it between your computer and their server securely?
Even worse, what happens when our most âsecureâ institutions implement lazy password policies? Unfortunately, all of this is pretty rampant practice.
720 Common Security Mistakes in Web Applications - Smashing Magazine
Web application developers today need to be skilled in a multitude of disciplines. Itâs necessary to build an application that is user friendly, highly performant, accessible and secure, all while executing partially in an untrusted environment that you, the developer, have no control over. I speak, of course, about the User Agent. Most commonly seen in the form of a web browser, but in reality, one never really knows whatâs on the other end of the HTTP connection.
There are many things to worry about when it comes to security on the Web. Is your site protected against denial of service attacks? Is your user data safe? Can your users be tricked into doing things they would not normally do? Is it possible for an attacker to pollute your database with fake data? Is it possible for an attacker to gain unauthorized access to restricted parts of your site? Unfortunately, unless weâre careful with the code we write, the answer to these questions can often be one weâd rather not hear.
Weâll skip over denial of service attacks in this article, but take a close look at the other issues. To be more conformant with standard terminology, weâll talk about Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), Phishing, Shell injection and SQL injection. Weâll also assume PHP as the language of development, but the problems apply regardless of language, and solutions will be similar in other languages.
369 How to Install Mac OS X on a PC (Without Using a Mac)
There are many great tutorials on the web for using a Mac to install Mac OS X Snow Leopard on a PC. Unfortunately, you may be unable to follow such tutorials if you do not readily have access to a Mac to perform the preparation necessary for the installation.
Great progress has been made in hacking PCs to run OS X, and it is now possible to install Mac OS X without a Mac. Thanks to some great tools put together by some brilliant hackers, it is also much easier and does not involve nearly as much time and effort as was once required.
101 - 201