'Flash'에 해당되는 글 3건

  1. 2011.03.31 iPhone 을 USB(flash drive)로 쓰기... Use iPhone as USB(flashdrive) by CEOinIRVINE
  2. 2011.03.04 Web Vulnerability regarding F company by CEOinIRVINE
  3. 2008.11.22 Pentagon bans computer flash drives by CEOinIRVINE 1

1. Download iFlashDrive from Itunes.
2. Connect iPhone with ITunes by USB cable
3. Click APP tab
4. Click iFash Drive
5. Attache the file from your PC.

Key features:

★ USB Storage ★
- Transfer files between your iPad and computer
- List and preview files.
- View disk usage status.
- Save files from other apps (like Email, Safari,etc.).

★ File Sharing ★
- Bluetooth: connection between your iDevices can be easily built and used to share files.
- Email: Individual files ≤ 10 MB can be emailed from this program as an email attachment.
(Note: Be sure to tap "Bluetooth" button on BOTH sides while building Bluetooth connection.)

★ Built-in File Viewer ★
- Microsoft Word (.doc, .docx)
- Microsoft Excel (.xls, .xlsx, .csv)
- Microsoft PowerPoint (.ppt)
- PDF Files (.pdf)
- iWork documents
- Web Pages (.htm, .html)
- Text Files (.txt, etc.)
- Graphic Files (.bmp, .gif, .png, .jpg, etc.)
- Media files (.mp3, .mp4, .mov, etc.)


'IT' 카테고리의 다른 글

Outlook 전자 메일에서 첨부 파일 차단  (0) 2011.04.21
my useful iPhone APPs  (0) 2011.03.31
worst companies to work for  (0) 2011.03.15
OSI Layers  (0) 2011.03.15
Web Vulnerability regarding F company  (0) 2011.03.04
Posted by CEOinIRVINE
l

  1. XSS
    1. Severity : High
    2. URI was set to 1<div style=width:expression(prompt(957586))>
      URL encoded GET input genre was set to " onmouseover=prompt(968437) bad="


  2. Application Error Msg
    1. Severity : Medium
    2. URL encoded GET input key was set to '"'");|]*{%0d%0a<%00>
      Error message found:
      java.lang.NumberFormatException: For input string:


  3. Error Msg on Page
    1. Severity : Medium
    2. Pattern found:
      java.lang.NumberFormatException: For input string:


  4. Insecure crossdomain.xm
    1. Severity : Medium
    2. The browser security model normally prevents web content from one domain from accessing data from another domain. This is commonly known as the "same origin policy". URL policy files grant cross-domain permissions for reading data. They permit operations that are not permitted by default. The URL policy file is located, by default, in the root directory of the target server, with the name crossdomain.xml (for example, at www.example.com/crossdomain.xml).

      When a domain is specified in crossdomain.xml file, the site declares that it is willing to allow the operators of any servers in that domain to obtain any document on the server where the policy file resides. The crossdomain.xml file deployed on this website opens the server to all domains (use of a single asterisk "*" as a pure wildcard is supported) like so:
      <cross-domain-policy>
      <allow-access-from domain="*" />
      </cross-domain-policy>
      
      This practice is suitable for public servers, but should not be used for sites located behind a firewall because it could permit access to protected areas. It should not be used for sites that require authentication in the form of passwords or cookies. Sites that use the common practice of authentication based on cookies to access private or user-specific data should be especially careful when using cross-domain policy files.
      This vulnerability affects Server.


'IT' 카테고리의 다른 글

worst companies to work for  (0) 2011.03.15
OSI Layers  (0) 2011.03.15
Intermediate CA Certificates Problem  (1) 2011.03.04
iPad 2 구매대행..  (0) 2011.03.03
Galaxy Tab vs. the iPad  (0) 2010.11.24
Posted by CEOinIRVINE
l

The Pentagon has banned, at least temporarily, the use of external computer flash drives because of a virus threat officials detected on Defense Department networks.

While defense officials would not publicly confirm the ban, messages were sent to department employees informing them of the new restrictions. As part of the ban, the Pentagon was collecting any of the small flash drives that were purchased or provided by the department to workers, according to one message distributed to employees.

Workers are being told there is no guarantee they will ever get the devices back and it is not clear how long the ban will last.

Pentagon spokesman Bryan Whitman would provide no details on the virus Friday, but he described it as a "global virus" that has been the subject of public alerts.

"This is not solely a department problem, this is not solely a government problem," Whitman said.

The Pentagon has acknowledged that its vast computer network is scanned or probed by outsiders millions of times each day. Last year a cyber attack forced the Defense Department to take up to 1,500 computers off line.

Officials said then that a penetration of the system was detected, but the attack had no adverse impact on department operations.

However, military leaders have consistently warned of potential threats from a variety of sources including other countries -- such as China -- along with other self-styled cyber-vigilantes and terrorists.

The issue has also been of concern at the Department of Homeland Security. A September audit by the DHS Inspector General recommended that the agency implement greater procedures to ensure that only authorized computer flash drives or other storage devices can be connected to the network there and that an inventory of those devices be set up.

DHS agreed with the recommendations and said some of that is already being done. DHS also said more software enhancements are in the works that will provide more protection.

Posted by CEOinIRVINE
l