Blog Posts Tagged with "Debugging"

0a8cae998f9c51e3b3c0ccbaddf521aa

Buggy out the Door: Externally Discovered Defects (EDD)

August 15, 2012 Added by:Rafal Los

What if 25% of your bugs actually ARE discovered by your customers? There is a collision of a few things here that makes this matter a lot less simple than we'd like, and a lot less convenient if you think you have a solution to the problem, but in the end it is a problem...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Chinese-Made US Military Chip: Backdoor or Debugging Function?

May 29, 2012 Added by:Pierluigi Paganini

News has been circulating on internet about a microchip used by the US military and manufactured in China that contains a secret "backdoor" that makes possible remote control of devices utilizing it. Security expert Robert Graham has declared that the bug is merely for debugging operations...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The (Hidden) Cost of Security Fixes in Enterprise Software

May 29, 2012 Added by:Rafal Los

Who should pay for fixes necessary to patch security defects in software? The question is deeper than whether fixes should be made available free of charge for software components that are found to contain issues. There are more costs than simply acquiring the fix here, which is where the conversation changes...

Comments  (1)

Bd623fa766512fdf6b57db66f522b741

Who Fights for the Users?

March 11, 2012 Added by:Ali-Reza Anghaie

The No More Free Bugs effort has changed the landscape by which security research is done. Before, you had one monetized market for such research - the black market. Now a new player has entered the fray - Government - and I'm not entirely sure I like where this is going...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google Releases Vulnerability Fixes with Chrome 17.0.963.65

March 05, 2012 Added by:Headlines

Google has released Chrome 17.0.963.65 for Windows, Macintosh, Linux and Google Chrome Frame which provides fixes for multiple vulnerabilities identified may have allowed for denial-of-service (DoS) attacks or the execution of malicious arbitrary code...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Log Management: Debugging Security

February 18, 2012 Added by:Danny Lieberman

Logs are key to security management not only for understanding what and why an event happened but also in order to prove regulatory compliance. The business requirements are that security logs should be both relevant and effective...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Top Ten Mistakes Made By Linux Developers

December 11, 2011 Added by:Danny Lieberman

My colleague, Dr. Joel Isaacson talks about the top ten mistakes made by Linux developers. It’s a great article and great read from one of the top embedded Linux programmers in the world...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

AmEx Secures Website Admin Debugging Panel Error

October 06, 2011 Added by:Headlines

“An attacker could inject a cookie stealer combined with jQuery’s .hide() and harvest cookies which can, ironically enough, be exploited by using the admin panel provided by sloppy American Express developers," Femerstrand explained in a blog post...

Comments  (0)

Bc353c4c6a6f7743290ce11723414424

AAA Security Troubleshooting

June 27, 2011 Added by:Dawn Hopper

In troubleshooting authentication, using specific debug tacacs+ or debug radius commands often provide too detailed and obscure output to anyone except those extremely knowledgeable in the protocols. Instead, the debug AAA authentication generic command has several advantages...

Comments  (0)