With DocHub, you can easily wipe PII in LOG from anywhere. Enjoy capabilities like drag and drop fields, editable textual content, images, and comments. You can collect eSignatures safely, add an extra layer of defense with an Encrypted Folder, and work together with teammates in real-time through your DocHub account. Make changes to your LOG files online without downloading, scanning, printing or sending anything.
You can find your edited record in the Documents tab of your account. Manage, send, print out, or turn your document into a reusable template. Considering the variety of robust features, it’s easy to enjoy effortless document editing and managing with DocHub.
Hi - my name is Luke Cartey and Iamp;#39;m a member of the field engineering team here at Semmle. This video is about writing a QL query to find sensitive or personally identifiable information, so called PII, that gets written to log files and application runtime. Today, weamp;#39;ll be looking at a open source e-commerce platform called Shopizer. Itamp;#39; s written in Java and weamp;#39;ll be trying to see whether we can find any of any PII vulnerabilities in Shopizer. Now in order to do that weamp;#39;re going to need to find a way to identify personal identifiable information in the source code. Unfortunately, Shopizer as with many applications doesnamp;#39;t have any sort of semantic markers in the code that tell you what is PII. So what going to do is weamp;#39;re going to start off by writing a heuristic query that selects all fields in the program whose name matches either email percentage credit card percentage or percentage phone percentage. This percentage here is a