ãããã£â¦ç§ã®ãã¼ã¸ã§ã³ç®¡çããã¡éãâ¦ï¼ãã解決ããGitã®ä½¿ãæ¹âè¶ âå ¥éï¼ããã°ãï¼ï½ãã女åé«çãRedmineã§ã¹ã¯ã©ã éçºããããï¼5ï¼ï¼1/3 ãã¼ã¸ï¼ æ¬é£è¼ã¯ãã¡ãã£ã¨ã¨ã¼ãã女åé«çã®å§å¦¹ãä»æ³¨ç®ã®ã¢ã¸ã£ã¤ã«éçºææ³ã§ããã¹ã¯ã©ã ã¨ããã¸ã§ã¯ã管çã½ããã®ãRedmineãã使ã£ã¦ãã·ã¹ãã éçºãããã¨ãããã£ã¯ã·ã§ã³ã§ãã ããã¾ã§ã®ã話 æ¬é£è¼ã¯ãã¡ãã£ã¨ã¨ã¼ãã女åé«çã®å§å¦¹ãä»æ³¨ç®ã®ã¢ã¸ã£ã¤ã«éçºææ³ã§ããã¹ã¯ã©ã ã¨ããã¸ã§ã¯ã管çã½ããã®ãRedmineãã使ã£ã¦ãã·ã¹ãã éçºãããã¨ãããã£ã¯ã·ã§ã³ã§ãã ã²ãããªãã£ããããé»åç®å®ç®±ï¼ã«ã¦ã³ã»ã©ã¼ï¼ãéçºãããã¨ã«ãªã£ããã·ãããã¨ãã¾ãããã®å§å¦¹ã第1åã®ãé«æ ¡çã«ãªã£ã¦åãã¦ã¹ã¯ã©ã ãå§ãã¾ããï½ãã¹ãã¼ãªã¼ãã§ä½ãä½ããã¾ã¨ããããã第2åã®ãã¹ããªã³ãã¨âããã°ãâã§ãã¼ã ã®ãã¼ããå»ã!! ï½ã¹
ãã¬ã¸ãã³ã | PRESIDENT STORE (ãã¬ã¸ãã³ãã¹ãã¢) 0 items ãã°ã¤ã³ æ°è¦ä¼å¡ç»é² éèªã®äºç´è³¼èª æ¸ç± éèª ã ãã¯ã»å¥å é»åæ¸ç± DVD å¤å ¸CD ã®ããã«ã¿ãã° æçéå · ãè²·ãç©ã¬ã¤ã è²·ãç©ãã ãåãåã éãã éèªã®äºç´è³¼èª æ¸ç± éèª ã ãã¯ã»å¥å é»åæ¸ç± DVD å¤å ¸CD ã®ããã«ã¿ãã° æçéå · ãè²·ãç©ã¬ã¤ã è²·ãç©ãã ãåãåã ã«ãã´ãª æ¸ç±(1005) DVD(31) ã ãã¯ã»å¥å(705) ã®ããã«ã¿ãã°(10) æçéå ·(13) å¤å ¸CD(11) ãã®ä»(0) ãã¬ã¸ãã³ã(279) dancyu(147) ãã¡ããªã¼(54) ä¸ç·(62) WOï¼ï¼¡ï¼®(64) ALBA(361) ã¨ã¬ã¸ã£ã¼ãã«æ¥æ¬ç(22) ããã ï¼ éèª ï¼ ãã¬ã¸ãã³ã ãã¬ã¸ãã³ã Books 1 | 2 | 3 | 4 | 5 | 6 | 7
2. Google browser security handbook Ðаиболее полное опиÑание ÑÑзвимоÑÑей и Ð¼ÐµÑ Ð°Ð½Ð¸Ð·Ð¼Ð¾Ð² безопаÑноÑÑи, пÑименÑÑÑÐ¸Ñ ÑÑ Ð² бÑаÑзеÑÐ°Ñ . РаÑÑмоÑÑим ÑаÑÑÑ 2, Ð³Ð»Ð°Ð²Ñ "Life outside same-origin rules" Ñаздел "Privacy-related side channels". http://code.google.com/p/browsersec/wiki/Part2 3. Google browser security handbook Reading back CSS :visited class on links Full-body CSS theft (Chris Evans 03/09/2010) Resou
Posted in 1-0.ã¤ã³ã¿ã©ã¯ã·ã§ã³ãã¶ã¤ã³@ãã³ãã¼ã¯, 1-1.ITãã¶ã¤ã³ on July 2nd, 2010 by MJ â Comments Off Tags: é»åæ¿åº ãã³ãã¼ã¯ã®ç¬¬äºæ¬¡ä¸ä»£é»åç½²åNemIDã®å©ç¨ãå§ã¾ã£ããNemIDã«é¢ãã¦ã¯ä»¥åã«ãè¨åãã¦ããã(ãã³ãã¼ã¯ã®æ°ããé»åç½²ååç §)ãæ°ã ã®ãªã³ã©ã¤ã³ã§æä¾ããã¦ãããã³ãã¼ã¯é»åæ¿åºãµã¼ãã¹ãåããã«ã¯ãä¸å¯æ¬ ãªå人æå·IDã§ãããç¡æã§æä¾ããã(å°ãªãã¨ããã³ãã¼ã¯èªã®æ°èã§ã¯)ããæ°ã¶æ宣ä¼ãé »ç¹ã«ããã¦ããã®ã§ãå ¥æã®ãã¼ãã«ã¯(å°ãªãã¨ããã³ãã¼ã¯äººã«ã¯)ãããã¦ä½ãã¨æãããã第ä¸ä¸ä»£ã®DanIDãå©ç¨ãã¦ããå¸æ°ã¯è¿½ã£ã¦é£çµ¡ãæ¥ãã¨ãã話ã ãããªã³ã©ã¤ã³ã§å ¥æãããã¨ããå®éã«å°æ¹èªæ²»ä½ã®çªå£ã«è¡ã£ã¦å ¥æãããã¨ãã§ããã 第äºä¸ä»£ã®NemIDã¯ããããã»ãã¥ãªãã£ã¨ç°¡ä¾¿æ§ãå¼·åã
ãã£ãã·ã³ã°å¯¾çåè°ä¼ã¯11æ16æ¥ããã£ãã·ã³ã°è©æ¬ºã®ææ°ã®ååãã¾ã¨ããããã£ãã·ã³ã°ã¬ãã¼ã2010ãæ¥å¢ãããã£ãã·ã³ã°è©æ¬ºã®å®æ ãããå ¬éãããæ¥æ¬å½å ã§ã¯2009å¹´ã®å¾åãããã£ãã·ã³ã°ã®å ±å件æ°ãæ¥å¢ãã¦ããããã§ã«2æã¾ã§ã§å年度ã®151件ã«å¯¾ã283件ã¨87ï¼ å¢å ãã¦ãããæµ·å¤ã§ãå¢å å¾åã«ããããå½å ã®ä¼¸ã³çã¯æµ·å¤ãä¸åã£ã¦ããã¨ããã ãã£ãã·ã³ã°ãµã¤ãã®ã¦ãã¼ã¯URL件æ°ã¯ãå年度ã®3.8åã¨å ±å件æ°ä»¥ä¸ã®å¢å ã¨ãªã£ã¦ããã¨ãããããã¯ããã£ãã·ã³ã°ãµã¤ãã®ãã¤ã¯ãã¦ã³ãåé¿ãããªã©ããã£ãã·ã³ã°ææ³ã®é«åº¦åããé¢ä¸ããç¯ç½ªè ã®å¢å ãåæ ãã¦ãããã®ã¨èãããããä¸æ¹ã§ããã£ãã·ã³ã°ãããã©ã³ãåãæªç¨ãããä¼æ¥ã®ä»¶æ°ã¯æ¨ªã°ãããæ¸å°ãã¦ãããå¼ãç¶ãæåãªãµã¤ãã対象ã¨ããæ»æã«éä¸ãã¦ããã å½å®¶å ¬å®å§å¡ä¼ãç·åçãçµæ¸ç£æ¥çã®çºè¡¨ã«ããã°ãè¦å¯åºã«å ±åã®ãã£ã
ãä¸ã¤åã®éç¾ã¾ã§ãã¨ããã®ã¯ãååããä¸ã¤åã§çã¾ããæ¹ãé·çãããã¨ãããã¨ãã¨æã£ã¦ããæ代ããã£ãã é話ä¼é¡ã Silverlight ã¨ãããã©ã¦ã¶ãã©ã°ã¤ã³ã®ã»ãã¥ãªãã£ã«ã¤ãã¦ã"Silverlight Security Overview" ã¨ããããã¥ã¡ã³ããå ¬éãããã使ããªãæè¡ã¨ããã®ã¯ãã ãã ãå¿ãã¦ãã¾ããã®ã ã¨ãããã¨ã¨ãåã³ä½¿ãããã«ãªãã°æãåºããã®ã ã¨ãããã¨ã確èªãã¹ããã¡ãã£ã¨æãç«ã£ã¦ãããã翻訳ãã¦ã¿ããä¾ã«ãã£ã¦ãã¨ãããã訳ãã¦ã¿ãã¨ããç¨åº¦ã®ãã®ãªã®ã§ããææãªã©ããã°ã³ã¡ã³ãæ¬ã twitter ã«ã¦ãç¥ããã®ã»ã©ã Silverlight Security Overview JP.docx 追è¨ï¼ãã©ã¤ãã¼ãããã°ã«æè¡ã®è©±ãæ¸ãã®ã£ã¦ãã¯ããã¦ãããããªã^_^; 追è¨2ï¼ä¸è¨ã®ãªã³ã¯ããéããã¨ããã¨ã.zip ã¨ãã¦éãã¦ãã¾ãã
ãªã©ã¤ãªã¼ãããã ã»ãã¥ãªãã£ã®ç¥è©± ä½è : John Viega,èéå¼æ¨¹(ç£è¨³),å¤ç®å¤§åºç社/ã¡ã¼ã«ã¼: ãªã©ã¤ãªã¼ã¸ã£ãã³çºå£²æ¥: 2010/04/26ã¡ãã£ã¢: åè¡æ¬ï¼ã½ããã«ãã¼ï¼ ã¯ãªãã¯: 123åãã®ååãå«ãããã° (22件) ãè¦ããç®æ¬ãã¦ããã£ããæè¬ï¼ ã¨ããã®ããããã®ç£è¨³ããã¦ãã @khiro ãã㯠NAIST ã®åæã§ããã修士ã®ã¨ãä¸ç·ã« SICP åå¼·ä¼ããã£ã仲ãªã®ã§ãä»åº¦æ¬ãåºãã®ã§ãéããã¦ããã§ãããã¨ã¡ã¼ã«ããã ããããã§ãããå½¼ã¯ä¿®å£«ãåæ¥ãããã¨ã»ã³ã ISç 究æã«å¤ãã¦ããããå¨å¦ä¸ã¯æªè¸ã¦ã¼ã¹ã«æ¡æãããããæ å ±å¦çå¦ä¼ã®è«æèªã«æ¡é²ããããã¨æ´»èºãã¦ãããèªåãããããã¨åºæ¿ã«ãªã£ãã ãã¦ãã®æ¬ã ããMcAfee ã¨ããã¢ã³ãã¦ã¤ã«ã¹ã½ããã®ç¾CTO(æé«æè¡è²¬ä»»è )ãå å¯ç¤¾é·ã®äººããã»ãã¥ãªãã£é¢ä¿ã®ã½ããã«ã¤ãã¦ã¶ã£ã¡ã
McAfeeã®åå¯ç¤¾é·ã§ãç¾SaaSé¨éCTOã§ããèè ããITã»ãã¥ãªãã£ç£æ¥ã«é·å¹´æºã£ã¦ããçµé¨ãå ã«ã¤ã¥ã£ãæ¬ãã¦ã¤ã«ã¹ããã£ãã·ã³ã°ãããã¯ã©ã¦ããä»®æ³åã¾ã§ãã³ã³ãã¥ã¼ã¿ã«å¯¾ãããã¾ãã¾ãªæ»æã®æå£ãè¨ããæ»æã¸ã®å¯¾æçãèå¯ãããæ¬æ¥æ»æãé²ãã対çãè¬ããã¯ãã®ãITã»ãã¥ãªãã£ç£æ¥ãã®äººãã¡ããçµæçã«ããã£ã¦ã¦ã¼ã¶ãå±éºã«ãããã¦ãããã¨ããã¦ã¼ã¶ãæ£ããé²å¾¡çã¨ä¿¡ãã¦ããäºæã®å±éºæ§ãææããITã»ãã¥ãªãã£ã®çã®å§¿ãæããã«ããã æ£èª¤è¡¨ ããã§ç´¹ä»ããæ£èª¤è¡¨ã«ã¯ãæ¸ç±çºè¡å¾ã«æ°ã¥ãã誤æ¤ãæ´æ°ãããæ å ±ãæ²è¼ãã¦ãã¾ãã以ä¸ã®ãªã¹ãã«è¨è¼ã®å¹´æã¯ãæ£èª¤è¡¨ãä½æããå¢å·æ¸ç±ãå°å·ããæã§ãããææã¡ã®æ¸ç±ã§ã¯ããã§ã«ä¿®æ£ãæ½ããã¦ããå ´åãããã¾ãã®ã§ãæ¸ç±æçµãã¼ã¸ã®å¥¥ä»ã§ãææã¡ã®æ¸ç±ã®å·çãå·ãå¹´ææ¥ãã確èªã®ä¸ããå©ç¨ãã ããã 第1å·æ£èª¤è¡¨
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks View SIOC Presented at: 18th International World Wide Web Conference (WWW2009)by Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin KirdaWebpage: http://www2009.eprints.org/56/1/p551.pdf Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting
1 2009 å¹´ 2 æ 6 æ¥ ç¬ç«è¡æ¿æ³äººæ å ±å¦çæ¨é²æ©æ§ ã»ãã¥ãªãã£ã»ã³ã¿ã¼(IPA/ISEC) é¨ãã®ãã¯ããã¯ãã½ã¼ã·ã£ã«ã»ã¨ã³ã¸ãã¢ãªã³ã°1 ã㨠èå¼±æ§ãå·§ã¿ã«å©ç¨ããæ¨çåæ»æ ï½ IPA ãé¨ã£ãæ¨çåæ»æã®åæã»å¯¾çã«ã¤ãã¦ ï½ 1. ã¯ããã« 2008 å¹´ 4 æ 16 æ¥ãIPA ã»ãã¥ãªãã£ã»ã³ã¿ã¼ãé¨ã£ãããªããã¾ãã¡ã¼ã«ããåºå㣠ã¦ãããã¨ã確èªãã¾ãããã¡ã¼ã«æ¬æã«ã¯ãå½æ©æ§ãã¦ã§ãã§å ¬éãã¦ããæ å ±ã»ã㥠ãªãã£ã«é¢ãã注æåèµ·ãããã³èª¿æ»å ±åã«ã¤ãã¦æ¸ããã¦ããããã«ã¦ã§ã¢ãä»æãã ãã PDF ãã¡ã¤ã«ï¼ä»¥ä¸ãæªæã® PDF ãã¡ã¤ã«ãã¨è¨è¼ï¼ãæ·»ä»ããã¦ãã¾ãããPDF ãã¡ã¤ã«ãé²è¦§ããã½ããã¦ã§ã¢ Adobe Reader ã®èå¼±æ§ãä¿®æ£ããã¦ããªãå ´åããã®æ·» ä»ãã¡ã¤ã«ãéããã¨ã§ãPDF ãã¡ã¤ã«ã«ä»æãããããã«ã¦ã§ã¢ã«ææããå¯
åå ãã¦ãã¾ããããªãã ãã²ããã¶ãã«pcapã使ã£ã¦ãªã«ãä½ããããªãã¾ããããã±ããå·¥ä½ã¯ãä»åå©ç¨ããlibpcapã¨libnetããããã°ãå²ã¨ãæ軽ã«å¤§æµã®ãã¨ãã§ããã®ã§ã¯ãªãã§ãããããä¾ãã°ãlibnetã«ã¯ä»¥ä¸ã®ãããªé¢æ°ãç¨æããã¦ãããããæ軽ã«DNSãã±ãããçæãããã¨ãã§ãã¾ããã¾ããlibnet_open_rawsockã®ãããªAPIã使ããã¨ã§RAW Socketå¨ãã®OSæ¯ã®ã·ã¹ãã ã³ã¼ã«ãæ½è±¡åãããã¨ãã§ãã¾ãã int libnet_build_dns(u_short id, u_short flags, u_short num_q, u_short num_anws_rr, u_short num_auth_rr, u_short num_addi_rr, const u_char *payload, int payload_s, u_char *
Web Security Context: User Interface Guidelines W3C Recommendation 12 August 2010 This version: http://www.w3.org/TR/2010/REC-wsc-ui-20100812/ Latest version: http://www.w3.org/TR/wsc-ui/ Previous version: http://www.w3.org/TR/2010/PR-wsc-ui-20100622/ Editors: Thomas Roessler, W3C Anil Saldhana, RedHat Please refer to the errata for this document, which may include some normative corrections. See
ntdll.dllã¯ã·ã¹ãã ãã£ã¬ã¯ããªã«æ ¼ç´ããã¦ãããWFP(Windows File Protection)ã§å®ããã¦ããããã§ãããããããsfc_os.dllãã¨ã¯ã¹ãã¼ããã¦ãããã¨ã¯ã¹ãã¼ãåºæ°ãã5ãã®é¢æ°ã¨ããsfc.dllã®ã¨ã¯ã¹ãã¼ãåºæ°ã2ãã®é¢æ°ã使ããã¨ã§ãWFPãç¡å¹ã«ãã¦ãntdll.dllãæ¸ãæãããã¾ãã ããããntdll.dllã¯Windowsã·ã¹ãã ä¸ä¾å¤çã«éè¦ãªDLLã§ãntdll.dllãå¼·å¼ã«æ¸ãæãã¦Windowsãåèµ·åããã¨ããã«ã¼ã¹ã¯ãªã¼ã³ã«ã¨ã©ã¼ã表示ããã2度ã¨Windowsãèµ·åããªããªãã¾ãã STOP: c0000221 Unknown Hard Error \SystemRoot\System32\ntdll.dll ntdll.dllã好ããªããã«æ¸ãæããã ããªã®ã«ãäºåº¦ã¨Windowsãèµ·åã§ããªããªããªãã¦ãã
対象èªè Webã¢ããªã®è¨è¨ã«æºããæ¹ããããã¯èå³ã®ããæ¹ã ä¸æ£é·ç§»ã®å®ç¾©ã¨ç¨®é¡ãä¸æ£é·ç§»ã¨ã¯ãWebã¢ããªã±ã¼ã·ã§ã³ã®è¨è¨ä¸ãæ¥åçã«æ³å®ããã¦ããªããã¼ã¸éã®ç§»åããå®ç¾©ãããã¨ãã§ãã¾ããå ·ä½çã«ã¯ã次ã®ç¨®é¡ãããã¾ããã¢ããªã±ã¼ã·ã§ã³å ã®ããã¯ãã¼ã¯ããããã¨ãæ³å®ãã¦ããªããã¼ã¸ãããã¯ãã¼ã¯ã«ç»é²ããå¾ã§ããã¯ãã¼ã¯ããå¼ã³åºããã¨ããããã¯URLãç´æ¥å ¥åãã¦è¡¨ç¤ºãããã¨ããã©ã¦ã¶ã®ãæ»ãããé²ãããã¿ã³ãæ¼ãã¦ç§»åãããã¨ããã©ã¦ã¶ã®ãæ´æ°ããã¿ã³ãæ¼ããã¨ãã¢ããªã±ã¼ã·ã§ã³ã®ãã¿ã³ããªã³ã¯ãé£æãããã¨ã ä¾ãã°1.ã¯ãã¦ã¼ã¶ã¼æ å ±ç»é¢ãããçºæ³¨ç¢ºèªç»é¢ããããã¯ãã¼ã¯ãããå ´åã§ãããã°ã¤ã³ãã¦ããªãç¶æ ã§ã¦ã¼ã¶ã¼æ å ±ç»é¢ã«é£ã³è¾¼ã¾ãã¦ãå人æ å ±ã表示ãããã¨ã¯ã§ãã¾ããããæ¢ã«çºæ³¨ãçµãã£ã注æã®ç¢ºèªç»é¢ã表示ãã¦ã¯ããã¾ãããã2.ã®ãæ»ãããé²ãããã¿ã³ãæ¼ãã
ä»åã®ãã¼ãã¯ããã®ããã°ã®å³ãµã¤ãã«ãæ²è¼ããã¦ããæ¸ç±ããã³ã»ããã°ã©ãã®ããã®PHPå ¥é 10æ¥éã³ã¼ã¹ãã®ç´¹ä»ã§ããã¢ã·ã¢ã«ã®æµ·åã¨ç¬¹äºãå·çããæ¬ã§ãã¢ã·ã¢ã«PHPã¹ã¯ã¼ã«ã®é大æã¨ããããæ¬ã§ãã ãèããããããæ £ããããä¸çªã帯ã«æ¸ããã¦ããã¨ãããããã°ã©ãã³ã°ãç¿å¾ããã«ã¯ãã¾ãèªåã®æã§ä½ã£ã¦ããã®å®è¡çµæãç®ã§ç¢ºãããã®ãä¸çªã§ããPHPã¯ã³ã³ãã¤ã«ããå¿ è¦ããªããç´æçã«ç解ããããæ§é ããã¤ã®ã§ãæåã®ç°å¢ããæ´ããã°ããµã¯ãµã¯ãæ¸ãã¦è©¦ãã¦ã¿ããã¨ãã§ãã¾ããããªãã¡ãããã°ã©ãã³ã°æªçµé¨è ã«ã¨ã£ã¦ããåãããããããè¨èªã¨è¨ãã¾ãã ãã®æ¬ãå¶ä½ããéã«ç¹ã«éè¦ããã®ã¯ã å®åã§å¿ è¦ãªãã¯ããã¯ã身ã«ã¤ããï¼ ã»ãã¥ãªãã£ï¼å ¥åãã¼ã¿ãã§ãã¯ãCSRF対çãªã©ï¼ãæèããå 容ã¨ãªã£ã¦ãã¾ãããã£ãã使ã£ããã©ãå®åã§ã¯ä½¿ããªãã§ã¯æå³ããªãã§ãããããåå¿è
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}