¡@

Home 

2014/10/15 ¤U¤È 10:11:15

iphone Programming Glossary: malicious

Architectural and design question about uploading photos from iPhone app and S3

http://stackoverflow.com/questions/4481311/architectural-and-design-question-about-uploading-photos-from-iphone-app-and-s3

sent to Amazon Web Services AWS in order to validate the identity of the AWS account making the request. Otherwise a malicious developer could easily make requests to another developer's infrastructure. The requests are signed using an AWS Access.. credentials . Embedding credentials in source code is problematic for software including mobile applications because malicious users can de compile the software or view the source code to retrieve the Secret Access Key. Does anyone have any advice..

How can I design a secure API/Authentication for mobile apps to access a service?

http://stackoverflow.com/questions/5340252/how-can-i-design-a-secure-api-authentication-for-mobile-apps-to-access-a-service

his requests against my website. So far so good... Is there a mechanism to protect the end user of a mobile app from malicious apps E.g. a 3rd party developer could build an app and capture all username passwords from the end user so that he can do..

How to read objective-c stack traces

http://stackoverflow.com/questions/6462214/how-to-read-objective-c-stack-traces

with a crash somewhere else. However without knowing more about the parser I'd question whether it is hardened against malicious input which could certainly cause a crash like this . 3 0x00000002 0x0 2 Stack was undecodable. Ignore. Meaningless. Best..

How to protect app IPA from hacks if reverse engineering is possible

http://stackoverflow.com/questions/6939222/how-to-protect-app-ipa-from-hacks-if-reverse-engineering-is-possible

introduce vulnerabilities yourself the platform may allow for exploits which in the end may offer an entry point for a malicious attacker. As to your question It is not safe to assume that a hardcoded URL even if obfuscated beyond belief can't be peeled..

How to ensure access to my web service from my code only?

http://stackoverflow.com/questions/848788/how-to-ensure-access-to-my-web-service-from-my-code-only

can't really do this. Your application can be disassembled and whatever secret is in the binary can be replicated in a malicious application. Another attack you should be aware of is people settings the hosts file to a location they control and then..

How to put user authentication into a mobile application

http://stackoverflow.com/questions/8954569/how-to-put-user-authentication-into-a-mobile-application

is that then the api accepts a user id and not a username and password. A user id will be much easier to guess at and malicious persons would be able to submit a req to the api with randomly selected user id's performing actions under their account...