This is a continuation of a Part 4 – Implementing User Account Lockout in the Customer Portal, regarding implementing account lockout in the Customer Portal. Now, I’ll go through how to do this in the vTiger CRM application.
I submitted the updates to the Trac site for vTiger as diff updates to the vtigercrm 5.2.1 code, which might be easier to use to update the code.
The current version of the vTiger Customer Portal (5.2.0) is susceptible to a brute force attack in that it doesn’t enforce strong passwords of Customer [...]
In a previous post, I outlined how to segment each port of an ASUS RT-N16. Now, I’ll go over the details of implementing uPnP on one or more segments.
First off, autobot on the DD-WRT forums posted the code and binary for MiniUPnPd (link). The script and binary provided are great. [...]
DD-WRT is really amazing in all that it can do. I have grown much more fond of it overtime. Recently, I decided that I wanted to completely segment my home network. I wanted to have multiple networks (some trusted, others completely untrusted) that could be configured through a single device. At first, one [...]
This is a continuation from Part 2 – Enforcing strong passwords in vTiger.
I submitted the updates to the Trac site for vTiger as diff updates to the 5.2.0 code, which might be easier to use to update the code.
Implementing the enforcement of strong passwords in the vTiger Customer Portal [...]
UPDATE 10/5/2010: I submitted the updates to the Trac site for vTiger as diff updates to the 5.2.0 RC code, which might be easier to use to update the code.
One of the things that really bothers me is that there are no built-in password restrictions for users in vTiger. That means if [...]
UPDATE 9/8/2010: I submitted the updates to the Trac site for vTiger as diff updates to the 5.2.0 RC code, which might be easier to use to update the code.
I preface this post with the title Part 1 in the subject, because I plan to post more information on customizations to vTiger [...]
FULL DISCLOSURE – I HAVE UPDATED THE ORIGINAL POST AND HAVE ADDED COMMENTS IN ITALIC AND RETRACTED OTHERS WITH A STRIKETHROUGH
I use the term “encryption” loosely in this article. As you read on, you’ll realize why…
I’ve been doing some work on a plugin for Microsoft Dynamics GP, which is an accounting [...]
Slashdot ran an interesting story titled: “76% Web Users Affected by Browser History Stealing“. NoScript alone can’t save you from this one. The truly amazing part is that it’s been around for 10 years and it’s STILL a known problem with modern web browsers.
After many episodes featuring the wireless pineapple on Hak5, I decide that it is time to get one and try it out (I’m way late getting to this one – about 4 years late). I actually won 2 auctions for the FON on EBay so I bought 2 of them.
Anyway, I was [...]
- October 2011
- September 2011
- July 2011
- June 2011
- March 2011
- February 2011
- December 2010
- November 2010
- October 2010
- August 2010
- July 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- October 2009
- July 2009
- June 2007
- May 2007
- April 2007
- January 2007
- June 2006
- November 2005
- October 2005