Have you ever had trouble with modifying your LOG document while on the go? Well, DocHub has an excellent solution for that! Access this online editor from any internet-connected device. It enables users to Faint PII in LOG files rapidly and anytime needed.
DocHub will surprise you with what it provides you with. It has powerful capabilities to make whatever changes you want to your forms. And its interface is so easy-to-use that the whole process from start to finish will take you only a few clicks.
After you finish adjusting and sharing, you can save your updated LOG file on your device or to the cloud as it is or with an Audit Trail that includes all alterations applied. Also, you can save your paperwork in its original version or turn it into a multi-use template - complete any document management task from anywhere with DocHub. Subscribe today!
Hi - my name is Luke Cartey and Im a member of the field engineering team here at Semmle. This video is about writing a QL query to find sensitive or personally identifiable information, so called PII, that gets written to log files and application runtime. Today, well be looking at a open source e-commerce platform called Shopizer. It s written in Java and well be trying to see whether we can find any of any PII vulnerabilities in Shopizer. Now in order to do that were going to need to find a way to identify personal identifiable information in the source code. Unfortunately, Shopizer as with many applications doesnt have any sort of semantic markers in the code that tell you what is PII. So what going to do is were going to start off by writing a heuristic query that selects all fields in the program whose name matches either email percentage credit card percentage or percentage phone percentage. This percentage here is a wildcard character. Basically were saying here were l