Teare: How to Steal Passwords from Safari’s AutoFill
Teare: How to Steal Passwords from Safari's AutoFill … somewhat similar to the recently-announced cross-site scripting vulnerabilities in Mozilla Firefox and Microsoft Internet Explorer.[Via the...
View ArticleVirtualHost success story
I finally figured out how to get the VirtualHost directives in my Apache configuration to work the way I wanted. I had previously had vhosts defined, but one would always clobber on the other. I...
View ArticleOur first son
One week ago, Christen gave birth to Elijah Wesley. He’s our first son and our first child. Although we’ve been prepared just a bit for the experience by having Baxter, our puppy, the experience is...
View ArticleExtra Pepperoni: The Apple Keychain is cool, but also strange and problematic
Extra Pepperoni: The Apple Keychain is cool, but also strange and problematic. This article obviously caught some attention, since Perry the Cynic is the first poster in the comments. Heh.[Via Daring...
View ArticleI have but one thing to say to Janice
Please, Janice, stop giving out the wrong phone number. Fix this situation already. It’s been two years, now. We’re frankly sick of getting all of these stupid phone calls meant for you.Thank you.
View ArticleThousands of junk trackbacks
I’m not even sure what the utility of trackbacks are, but I have the feature enabled on my Drupal site. Unfortunately, I discovered that this made the site susceptible to junk trackbacks.Given that I...
View ArticleThe iPhone objections
I don’t know if I will get one. I certainly won’t get one until my Verizon Wireless contract has expired … and even then, there are factors to weigh.But in the meantime, I’ve been staring squinty-eyed...
View ArticleSecurely deleting the iPhone?
I’m wondering if there’s a way to securely delete the data contents of the iPhone. Since there will be a mix of personal data and media on the device, it seems like a secure deletion routine would be...
View ArticleIs root on the iPhone a security flaw?
You may find this odd coming from a relatively security-conscious sysadmin-type person, but I’m not totally convinced that having everything run as root (if that is indeed true) on the iPhone is a bad...
View ArticleFull cart
Wow, I must be shopping too much — but not buying enough — at the iTunes Store. I’ve filled it up!I had used the shopping cart feature since my first visit to the iTMS years ago. It has become my wish...
View ArticleUsing OpenSSL to securely connect to your IMAP account
I never knew how to connect to an IMAP server when SSL/TLS were forced. With unencrypted connections, you can just Telnet in, but this exposes your login credentials and data, so many servers will not...
View ArticleCode signing man page in Leopard
I found the man page for code signing in Leopard; it’s found under “codesign”:$ man codesignUpdate: It’s worth noting that Apple has released the Code Signing Guide to document this feature further,...
View ArticleSandboxing man pages in Leopard
I also found the man pages for process sandboxing in Leopard; it’s found under “sandbox”:$ man sandbox
View ArticleADC Leopard release notes
Hm. They actually tell you what’s new in Leopard— from a Mac OS X developer perspective, anyway — in the release notes section of the ADC Reference Library.Who would have guessed? I think I missed this...
View ArticleThose who count the votes
Contrast this story at Daring Fireball, refering to this+“Can+You+Count+on+Voting+Machines?”+story+at+the+New+York+Times, with...
View ArticleOur long electronic domain nightmare has ended
Yes, I forgot to renew my domain. Yes, that became a real pain very quickly when I realized what the repercussions were.For future generations, I suggest not having to deal with this when:you want to...
View ArticleMac OS X keychain and password storage
I’ve found that trying to explain the Mac OS X keychain at all tends to make peoples’ eyes glaze over. The keychain is poorly-understood overall, perhaps because it tries to bridge the gap between...
View ArticleRadmind server logging and the repo command
Under normal circumstances, the latest Radmind tools that communicate with the server report client status updates in the Radmind server’s system log. These standard messages can include ones like:May...
View ArticleAddressless Kerberos tickets in Mac OS X
I was concerned when reading Kerberos: The Definitive Guide that Mac OS X clients bound to an Active Directory didn’t have an easy way to specify that their Kerberos tickets should work behind NAT. The...
View Article
More Pages to Explore .....