Thursday, June 27, 2013

More about Firefox 22

Mozilla has released the latest version of the popular browser which promises direct, real-time communications for voice, video and data. The controversial for blocking third-party cookies is once turned off. Externally there is nothing fresh to see in Firefox22. All new features are hidden under the hood. With Firefox 22, the developers have once again put together a comprehensive package, which is available to all users for immediate download. The main innovation of the new Firefox browser is the comprehensive support of WebRTC. This is a relatively new, open standard that will transform communications in the network sustainable. Specifically, WebRTC is composed of different interfaces, which allows the transmission of audio and video signals as well as the exchange of files between different browsers. The individual elements of the standards had been incorporated in previous versions of Mozilla but now it is activated as a full package in Firefox 22 for the first time. Besides Mozilla is also a pioneer in the development of Google WebRTC both Firefox and Chrome only supports this technology.

Both swapping files and Internet telephony are nothing new in Mozilla or Google. But instead, for example, specially having to install Skype for video chat, the chat with friends (theoretically) works on any PC that can be found on the Firefox or Chrome. To use the technique; yet still lacking the appropriate applications in most of the web browsers. While there are a number of sites in the network for testing the function - such as AppRTC for video calling - for everyday use which are not. With the Talkilla Mozilla though operates on a promising project for the integration of functions and user interface - however, this ambitious project is still at a very early stage of development.

Mozilla's announcement of third-party cookies from Firefox to disable 22 by default, made primarily in the advertising industry for abdominal pain. Despite heavy criticism from the industry Mozilla is sticking to the blockade of third-party cookies, but his plan must be delayed because of technical problems. To see the menu under Privacy, although the option to reject third party cookies always, after installing Firefox 22 but this is not automatically enabled. The third major new feature of Firefox 22 refers to the faster execution of JavaScript code and listens to the name OdinMonkey. Thanks to this optimization module, the calculation of complex pages will henceforth succeed much faster. To demonstrate the efficiency of the technique, Mozilla has made the 3D games famous Unreal Engine 3 packed in collaboration with Epic Games in the browser. In the future, should be implemented as well as graphically demanding games in Firefox. Check the speed of websites show the technical changes of Mozilla effect. Especially in heavy SunSpider JavaScript test makes the new version of Firefox in comparison to its predecessor a strong push forward. However, despite all efforts, Chrome remains the unchallenged speed Primus.

In addition to several new features for web developers Firefox gets 22 HiDPI support donated for web pages to be displayed more sharply on high-resolution screens. Using the newly added "Web Notifications" interface can now also display notifications like incoming e-mails in the Firefox browser. In the Add-ons Manager can henceforth manage the social services. Users with Mac OS X get your download progress in the dock icon appears at the top right.

Know more about OS X Mavericks -2

Other highly anticipated features that helps more to the new users: better management of configurations with multiple screens. Until then, OS X was bad enough when we plugged a (second) screen to your Mac. The most glaring example was the full screen introduced with OS X Lion and required to have the same application on any screen mode. OS X Mavericks profoundly modifies the operation and offers a much more powerful solution, but probably more complex. The idea is to bring autonomy to each of the screens that you use: there is the menu bar on all screens and you can place applications in full screen on one monitor, but especially on any monitor. Specifically, you can now organize your windows as you want and simply work in OS X Mavericks. In this example, when writing an article, therefore, we have a compose window and a browser window on the right, a preview window, the corrector and Twitter on the left.

You receive an email? You can use Mission Control directly or trackpad gestures to change only the left screen. The right one is writing mode, the time to respond to email received. A gesture later, you will find the previous virtual desktop, one that allows a glimpse of the current document and correction.
Since it refers to the full screen mode, we regret that this release is not more evolved Mail application. The edit window is modal in part: it blocks the entire interface when writing a new message or a reply from the application, but if you create a mail from another program, the window is placed over another screen.

In theory, OS X Mavericks is supposed to remove any notion of primary or secondary display. Apple's new system has to guess that you are using at any given time and place the dock, knowing that the menu bar is constantly present. In fact, this operation does not seem to develop and can still be found in the System Preferences option available which allows you to choose the main screen. Last, Apple also supports these new options available for Apple TV. AirPlay can be used for a presentation on a television screen while using the Mac on.

Apple's browser has received some significant new features, but they do not apply to all OS X Mavericks. The new version of Safari is offered to remain with Lion and Mountain Lion and you can find the main news item in that other user: Small new Safari 6.1. In Apple's new system, the browser is Safari 7 and not 6.1. The change is not only symbolic, even if the interface has few differences, are important internal changes between the two versions. OS X 10.9, Safari and finally adopts the separation process for tabs. As in Chrome, for example, each open tab is a process, which should both accelerate and stabilize the browser. In case of problem on a tab, the browser will simply interrupt the matching process and avoid the complete crash. Apple ahead of many figures to prove that the browser is faster: from what we could tell, Safari is better than before and the gain is sensitive. This is especially the case on a Mac with Retina display, the computer that was just on the point with OS X 10.8.

1ShoppingCart online store software

Being able to sell products or services online is a great way to make semi-passive income, as it can come in regardless of what you're doing. While this is the dream of many entrepreneurs and businesses, not everyone is successful in this type of venture. If you want to make sales online, you have to make sure that your website is setup just right. One of the best things that you can do when you want to sell products online is get the right type of ecommerce software setup. With a good ecommerce solution, customers will be able to find the products that they are looking for, purchase them, and get them shipped out without you having to do anything. For example, 1ShoppingCart online store software is a good one to use. It has the potential to simplify your life and make things much more successful online. When you are interested in doing more with your online business, you should make sure that the look and feel of your ecommerce pages is also right. You do not want to overload the pages with information like many websites make the mistake of doing. If you do, you'll have a hard time getting people to stick around on your site long enough to make a purchase. By simplifying your site and making it so that your customers can find what they're looking for, you will increase the time they spend on your site and the amount of sales that your site makes on a regular basis.

Tuesday, June 25, 2013

Screen Capture for Mac

Some of the most simple, easy to use and effective video processing software are available at reliable online store that cater to the various needs of their clients. Viewer could get plenty of information and guidance from the website on their products that are displayed at the site and could be very beneficial to the customers. The provider in question started operating way back in the year 2004 and has seen steady grown in business with hard work and dedicated service to all their customers. They started off with two products in the beginning and now have a wide range of 20 titles for Mac and PC. With their focus on catering to products suitable to adults, children students, business men and for people of all categories of life, they came out with products that were simple, accessible and scalable making it easy for the user to install their software straight out of the box without any complication. They strive to improve on their products with each passing phase of life by concentrating on the growing needs of the users with a tendency to be the providers and caterers of more sophisticated products for all their customers.

The products available at website mac are Video converter, DVD Ripper, Screen capture etc: and individuals can use presets for mobile devices, convert the most popular formats, save time with high conversion speed, rip DVDs and save DVD movies in many formats, The can also extract audio and convert between audio formats, enjoy clean design with great usability, merge several files into one file and much more. For users interested in learning, the choice of video guides, information about Video Codec, Audio and Video formats with Video filters and effects are also provided at the site to enlighten their users on their products and its usage. Their support center is available for the service of their customers and should they arise any queries with immediate replies; the facility of a live chat is also made available at their site. A quick tour at the site can give the viewer all the required information with regards to the products, its benefit and usage with all the desired support from their service team on board.

Monday, June 24, 2013

Three Entry Points for Cross-Site Scripting

Cross-site scripting (XSS) can be more of an annoyance than a serious threat in some instances. However, there are circumstances where XSS is used for malicious purposes, where hackers may easily exploit your information and wreak havoc. This can be especially dangerous to your sensitive data if your website contains vulnerabilities that welcome exploits.

According to a report by Symantec, 84 percent of the security vulnerabilities documented by this security expert were attributed to XSS committed on websites in 2007. It has been concluded that at least 68 percent of existing websites for that year were vulnerable to XSS attacks.

It is good practice for developers and testers to be fully aware of the possibility that every one of your data entry points could be targeted for an XSS attack. Web applications are at high risk for malicious actions committed through the:

  • Hijacking of user accounts
  • Access to sensitive data and ability to modify that data
  • Bypassing of controls for access
  • Presentation of fraudulent content

The Most Common Entry Point

Session cookies are the most common way that XSS is used to exploit user information. A session cookie is used to store the user’s identity while logged into a website. If another site is opened while logged into the first website and XSS is present, the second website could hijack the session cookie from the first. The hijacker would be able to use the session cookie in their browser, in addition to using the information to impersonate the user on the initial website. Depending upon the nature of the first website that the session cookie has been hijacked from, the results could be very damaging.

Examples include:

  • If the user is logged into a banking website, the hacker could use the session cookie to impersonate the user and conduct transactions that will remove cash from the user’s bank account.
  • Banking information can be accessed from shopping sites and allow the hacker to make purchases with that information.

Additional XSS Entry Points for Web Applications

Forms. Web forms such as login forms, if improperly coded can be vulnerable to XSS. If the hacker takes advantage of this vulnerability and injects a script into the login form, the script will send them the user’s password—allowing hackers access to the user’s account where changes or purchases could be made.

Examples include:

  • If a login form is compromised for a shopping website, a hacker could then impersonate the user and make purchases using whatever pre-stored means of payment are entered into the account.
  • With so many users neglecting to follow the best practices with password security, the hacker could potentially access many different websites just by assuming that the credentials for each are the same.

URLs. If a hacker sends an email to a user with what appears to be a legitimate URL, could infact be a malicious script that is embedded within the URL. Once the user has been lured to the legitimate site, they log in and the script sends the session cookie to the hacker.

Examples include:

  • An attack such as this can also be attributed to postings on social networking websites. The hacker could post a message with XSS code hidden within it. An unsuspecting user clicks on the URL and their information is sent to the hacker who can then steal their credentials and make changes to their account.
  • The hacker could impersonate the user and post messages on social network websites that are malicious in nature, possibly resulting in the user being banned from the website

Best Ways to Avoid XSS Attacks

By identifying vulnerabilities for XSS attacks on your websites, you are taking the first step toward preventing and mitigating the problems that could result. Developers can reduce their risk of XSS attacks by adopting the following practices:

  • Validating output by sanitizing data HTML encoding to eliminate malicious characters.
  • Avoiding inserting user-controlled data in script code and reducing the amount of allowed HTML.
  • Using server-side validation to detect request containing malicious exploits.

XSS is more common than many users realize, with vulnerabilities discovered even across major brands. Developers using sound XSS practices and thoroughly testing for vulnerabilities save end users from the potentially devastating effects of an attack via XSS.

Fergal Glynn is the Director of Product Marketing at Veracode, an award-winning application security company specializing in secure software supply chain and other security breaches with effective risk assessment tools like secure software supply chain toolkit.