Abstract:
Embodiments of the innovation relate to, in a webserver device, a method for identifying a logic defect in an application. The method comprises establishing a webserver instance of the webserver device with a client device, the webserver instance of the webserver device having a corresponding set of client device permissions; receiving a content request from the client device associated with the webserver instance of the webserver device; detecting a violation of a permission of the set of client device permissions associated with the webserver instance of the webserver device; identifying at least one webserver function associated with the violation of the permission of the set of client device permissions; and displaying a visual identification of the at least one webserver function associated with the violation of the permission of the set of client device permissions.
Abstract:
Embodiments of the innovation relate to a server device, comprising a controller having a memory and a processor, the controller configured to establish a first secure environment with a client device, the first secure environment having an associated server asset policy; provide the asset to the client device via the first secure environment; receive a request from the client device, via the first secure environment, to utilize the asset with a user-selected application according to a user-selected asset policy; establish a second secure environment with the client device, the second secure environment having the user-selected application and the associated user-selected asset policy and the second secure environment isolated from the first secure environment; and provide the asset to the client device via the second secure environment.
Abstract:
The techniques herein describe an approach that can quickly geolocate Internet users that are connected through a wireless (e.g., WiFi) network. To do so, one or more embodiments herein send specially-crafted signals to the user's IP address. When these signals are broadcast by the user's wireless router to the user's wireless device, they have a discernible signature. Other geolocation efforts may then be used to scope the Internet user's location (e.g., to the appropriate city or section of a city). A user or automated device may then physically traverse (e.g., drive through) the search area listening on wireless channels for the discernible wireless signature. Once it is located, directional antennas and triangulation may be used to exactly locate the user.