Tags » Access-Control

Can my building be hacked? – 5 key questions to ask

By Chris Grundy

Modern standalone or networked buildings forming estates often have a ‘building data network’ running numerous interconnected systems, such as:

IT And Audiovisual

AMAG Earns the Title of Technology Leader

By AMAG Technology, President, Matt Barnette

Coming off another successful ASIS and heading full speed into the fourth quarter of 2015, it’s been a year full of exciting adventures.  525 more words

All Blog Posts


In the last issue I highlighted on how fire is a major risk to both households and business. In this issue I will look a bit deeper into building fire safety and the different systems you need to put in place in order to safely and effectively mitigate this risk. 288 more words

Access Control


While Security against thievery and fraud is a major security concern in Zimbabwe, fire nevertheless is a major risk to both households and business. Due to constant power cuts and as seen with recent events, fire risk in Zimbabwe has increased. 208 more words

Access Control

Is your SDK the Unwelcome House Guest?

Some manufacturers provide SDKs (software development kits) that feel a lot like a visiting cousin who outstays his welcome after a few days.  All the pleasantries are there, the special towels are out and the good sheets have been fitted on the bed. 481 more words

Access Control

OBIEE 10g and 11g: Comparing Repository And Catalog Security Models And Changes With Upgrade

How are security settings enabled / controlled in OBIEE 10g and 11g?

In OBIEE 10g, security is controlled at the following points: permissions on the OBIEE Presentation catalog, via the repository (users and passwords) and optionally via an external LDAP, or external tables. 499 more words


Web Application Security Basics – Safe file upload and File I/O

File upload and file i/o is a common feature which most of the web applications allow. It’s a critical part of any web application which should be carefully crafted and implemented since a single mistake could cause lot of trouble to an application. 1,669 more words

Web Security