The article was published at Open-Tube.com.
The author list 10+ free tools to analyze source code. The tool are:
Multi-language
1. RATS
2. Yasica
Java
1. CheckStyle
2. FindBugs
3. PMD
4. Hamurapi
C/C++
1. Sparse
2. Splint
3. UNO
4. Blast
5. CPPCheck
Check it out at http://open-tube.com/10-free-tools-for-static-code-analys...
Saturday, December 31, 2011
Internet Society Member Newsletter - December 2011
=========================================================== Internet Society Member NewsletterVolume 10 Number 13 - ===========================================================Contents------------News------------Internet Society Awards Grants to 14 Community-Based ProgramsInternet Society Launches New WebsiteInternet Society Joins Opposition to Stop...
Friday, December 30, 2011
Google Gmail doesn't meet LAPD security needs
An article by Stuart Johnston from SearchCloudComputing.com on how search engine giant, Google, failed to comply with LAPD security requirements in providing emails to the agency. Check it out at Google Gmail doesn't meet LAPD security needs
An interesting part of the article is the last paragraph which stated the mistake by Google and also incapable...
Top five cloud security tips of 2011
Take a look on the article Top five cloud security tips of 2011
It summarize the tips based on author's perspecti...
Methods overloading or overriding
An article by Javin Paul about two methods in Java which many of us including me confuse about it. Yes, we have used it (that includes me) but actually we don't know the differences between those two. So this is really good article for us to understand it ... check it out at Java Developers Group News | LinkedIn
But, which one is better for performance...
Thursday, December 29, 2011
US and Israel is behind Stuxnet and Duqu Malware - Kaspersky
Stuxnet virus has at least 4 cousins
VIRUS LINK: Customers using computers in Tehran in
this May 9, 2011 file photo. According to new research from Kaspersky
Lab, the Stuxnet virus that last year damaged Iran's nuclear programme
was likely one of at least five cyber...
Decoding malware SSL using Burp proxy
When performing dynamic analysis of malware, you will occasionally
encounter SSL being utilized for network communication, thus preventing
you from analyzing the content. Typically Wireshark
is utilized to examine network traffic at the packet level. Wireshark
has an SSL dissector that allows for the decryption of SSL...
Monday, December 26, 2011
« Public Status Updates Plunged 93% Since Facebook Moved Privacy Controls Inline Facebook Is Testing Event Suggestions » 35 Privacy Changes Facebook Must Make In Europe
Posted by David Cohen on December 22nd, 2011 5:14 PM
Facebook and the Office of the Irish Data Protection Commissioner publicly released the results of a detailed three-month audit
of the social network’s privacy policies in the European...
The International Conference on Digital Information and Wireless Communications (ICDIWC2012)
The International Conference on Digital Information and Wireless Communications (ICDIWC2012)
Hindusthan College of Arts and Science, India
http://www.sdiwc.net/icdiwc2012/
You are invited to participate in The
International Conference on Digital Information and Wireless
Communications that will be held in India, on March 8-10, 2012....
Friday, December 23, 2011
Five predictions for security in 2012
Posted by Elinor Mills | 12/23/2011 | 04:00 AM
This was an exciting year in the Internet security community, with big
tech firms like Sony and RSA getting hacked and putting consumer data
and corporate networks at risk, and reports of attacks on utilities,...
Think static analysis cures all ills? Think again.
December 23, 2011Buffer Overflow, Information Security, Software Development, Software Security, Static Analysis
1 comment:

Mark Pitchford
3/1/2011 11:15 AM EST
Static code analysis has been around as long as software
itself, but you'd swear from current tradeshows that it was just
invented. Here's how to choose the right code-analysis tools for your
project.
Static analysis (or static code analysis) is a field full of
contradictions and misconceptions. It's been...
Static Analysis versus Dynamic Analysis
December 23, 2011Buffer Overflow, Embedded, Personal Opinion, Software Development, Software Security, Static Analysis
1 comment:

Paul Andersen from GrammaTech (the company that develop CodeSonar) share his thought on using both, static and dynamic analysis, to detect vulnerabilities. (read the articles here)
Lots of comments given which share the same thought as me. However, if I were to choose one, I'll definitely use static analysis. As I'm doing research in that area, I...
Using C to Blend Mathematics and Art (When Math goes Beautiful)
A 'how to' article by MarkDaniel on developing a program to produce beautiful geometrical diagram using C.
Check it out at http://www.codeproject.com/KB/mcpp/CBlendMathematicsArt.a...
Thursday, December 22, 2011
Top security incidents of 2011
Although vendor-written, this contributed piece
does not advocate a position that is particular to the author's employer
and has been edited and approved by Network World editors.
Everyone will agree that 2011 was a busy year in the field of data security,
so as the year draws to a close it seems appropriate to begin the
process of distilling...
Attack in Quantum Network - Is it possible?
A paper written by Chinese researcher demonstrate the possibility of attack in optical network (read here).
The question raised now is that will there be possible attack on quantum network or it remain as theory and only proven in lab with control parameter implement...
Wednesday, December 21, 2011
Conference List as of Dec 2011
DRDO sponsored National Workshop on Latest Trends in Networking, Communication & Security
22 December 2011 Chennai India
3rd Working with Ministers and Parliament on Legislation
01 February 2012 Ottawa Canada
TM Forum Management World Asia
07 February 2012 Marina Square Singapore
2nd Public Sector Media Relations
...
Decide - When and What to buy Electronic gadget
I'm not sure how good this website are you can take a look and decide on your own :)
http://www.decide.c...
Sunday, December 18, 2011
The 10 Most Important Open Source Projects of 2011 - From Joe 'Zonker' Brockmeier's Perspective

Well, here we are, another year almost done for. Time to look back and
take stock of the year that was. You know what? It turns out that 2011
was a banner year for open source projects. So much so, that picking the
10 most important was pretty difficult.
So what do I mean...
Linux Job Demand (as of December 2011)
Taken from https://www.linux.com/news/featured-blogs/185-jennifer-cloer/520760-linux-job-opportunities-a-snaps...