Commanding Chaos for Coworking, Open Source and Creative Communities

Security

ShareKey smartphone app replaces your house keys

Tue, 01/08/2013 - 06:59 -- rprice

effectively an Android app that communicates with smart door locks via NFC to open and close them simply by waving the phone near the lock.

you can give your houseguests unrestricted access for a week, or give your temporary employees access in work hours.

Security
phone
nfc
internetofthings
house
smart

ShareKey smartphone app replaces your house keys

Tue, 01/08/2013 - 06:59 -- rprice

effectively an Android app that communicates with smart door locks via NFC to open and close them simply by waving the phone near the lock.

you can give your houseguests unrestricted access for a week, or give your temporary employees access in work hours.

Security
phone
nfc
internetofthings
house
smart

CV Dazzle: Camouflage From Computer Vision by Adam Harvey

Thu, 01/03/2013 - 12:13 -- rprice

CV Dazzle is an independent project, but it won't be for long.

If you're a coder, computer vision expert, fashion designer, hacker, makeup artist, hair stylist, 3D modeler, privacy enthusiast, activist, fashion designer, or have something to contribute to the project, you should really introduce yourself:

hacks
face
Security
computer_vision
art

CV Dazzle: Camouflage From Computer Vision by Adam Harvey

Thu, 01/03/2013 - 12:13 -- rprice

CV Dazzle is an independent project, but it won't be for long.

If you're a coder, computer vision expert, fashion designer, hacker, makeup artist, hair stylist, 3D modeler, privacy enthusiast, activist, fashion designer, or have something to contribute to the project, you should really introduce yourself:

hacks
face
Security
computer_vision
art

BOTCHA Spam Prevention | drupal.org

Tue, 10/16/2012 - 06:16 -- rprice

BOTCHA lets spambots to prove they are bots, and let real users zip by.

BOTCHA is useful for any form that has to be protected from spambots.
How it works

The approach of BOTCHA is to add various elements to forms that need protection from bots. These elements do not present new fields to users, so BOTCHA is completely transparent to humans. Both humans and bots submit those forms and BOTCHA performs heuristic analysis on each submitted form. Bots are usually programs/scripts that are relatively dumb, and most of the time they fail BOTCHA tests and human users don't.

Security
spam
drupaleasypodcast

BOTCHA Spam Prevention | drupal.org

Tue, 10/16/2012 - 06:16 -- rprice

BOTCHA lets spambots to prove they are bots, and let real users zip by.

BOTCHA is useful for any form that has to be protected from spambots.
How it works

The approach of BOTCHA is to add various elements to forms that need protection from bots. These elements do not present new fields to users, so BOTCHA is completely transparent to humans. Both humans and bots submit those forms and BOTCHA performs heuristic analysis on each submitted form. Bots are usually programs/scripts that are relatively dumb, and most of the time they fail BOTCHA tests and human users don't.

Security
spam
drupaleasypodcast

Local image input filter | drupal.org

Mon, 10/15/2012 - 08:06 -- rprice

Locks down image references to the host/domain of your site only, to prevent CSRF attacks, and avoid HTTPS mixed content errors.

In short: This input filter restricts image tags in HTML content submitted by users to your site.

* This input filter finds all IMGs in a text, checks whether their src attribute is relative and points to an image under the Drupal root.
* Images satisfying that requirement are retained and left alone.
* All other images are removed.

image
Security
drupaleasypodcast

Local image input filter | drupal.org

Mon, 10/15/2012 - 08:06 -- rprice

Locks down image references to the host/domain of your site only, to prevent CSRF attacks, and avoid HTTPS mixed content errors.

In short: This input filter restricts image tags in HTML content submitted by users to your site.

* This input filter finds all IMGs in a text, checks whether their src attribute is relative and points to an image under the Drupal root.
* Images satisfying that requirement are retained and left alone.
* All other images are removed.

image
Security
drupaleasypodcast

Infographic: How Drupal combines open source, openness, and security | opensource.com

Wed, 03/14/2012 - 08:29 -- rprice

Drupal is a huge software project by any measure, with thousands of developers writing code for it and deploying websites and applications on it. Alongside Linux, Apache, and Mozilla, it is one of the largest open source projects in the world. This infographic helps explain the important work of Drupal's Security Team.

opensource
infographic
Security
drupaleasypodcast

Pages

Subscribe to RSS - Security