Menu
Menu
DaniWeb
Log In
Sign Up
Read
Contribute
Meet
Search
Search
About 1,000 results for
attacks
- Page 1
Re: Lots of new members but no one posts
Community Center
Meta DaniWeb
3 Weeks Ago
by Dani
I can confirm that's not happening. I can confirm they're just signing up and then leaving, and can also confirm they're not bots. There can't be *that* many people creating sleeper accounts for future spam
attacks
, so I'm ruling that out too. Plus, it's always been this way.
Re: Improve HAVING BY performance
Programming
Databases
1 Month Ago
by Dani
…" viewpoints, and never each other. There were no personal
attacks
. (After all, we're friends debating a controversial topic, and…
Re: Can someone please advice me for hoe can i prevent xss attacks ?
Programming
Web Development
2 Months Ago
by gottaloveit
In whatever code language is running on the server, use a well known database library that is well documented and features XSS aka sql injection prevention.
Re: Can someone please advice me for hoe can i prevent xss attacks ?
Programming
Web Development
2 Months Ago
by webhostingworld
Minimize the use of inline JavaScript within your HTML code. Instead, use external JavaScript files and scripts to separate content from functionality.Ensure that sensitive cookies have the HttpOnly and Secure flags set.
Re: attacks on firewire
Community Center
16 Years Ago
by chris5126
… info. [url]http://cyberphob1a.wordpress.com/2008/03/05/firewire-
attacks
/[/url]
Help find out many attacks were logged per day, per IP
Programming
Software Development
12 Years Ago
by welshly_2010
….items()) for result in resulting: print result,' has', resulting[result] , '
attacks
' [/CODE] currently giving me this results which is wrong [QUOTE….152.92.123 has 5
attacks
Jan 10 has 28
attacks
89.249.209.92 has 15
attacks
[/QUOTE] which the ip addresses…
Virus Bulletin Conference 2006: small scale Trojan attacks big concern
Hardware and Software
Networking
17 Years Ago
by happygeek
… overall threat landscape radar, because they are the
attacks
most likely to achieve the double damage whammy of…overall security within that business because most of these
attacks
are still reliant on unpatched systems to enable …Virus Bulletin Conference, the sophistication of some of these
attacks
was revealed: how whole email threads from a …
Avalanche gang behind 66 percent of all phishing attacks
Hardware and Software
Information Security
13 Years Ago
by happygeek
…being responsible for some two thirds of all detected phishing
attacks
carried out during the last six months of 2009.… not only apply to the gang behind the unprecedented
attacks
but also the infrastructure it is using to host…"has led to an ongoing, significant, reduction in
attacks
through April 2010". Although study co-author Greg Aaron…
Lazy script kid hackers responsible for automated web attacks
Hardware and Software
Information Security
11 Years Ago
by happygeek
…"align-right") The Hacker Intelligence 'Automation of
Attacks
' [report](http://www.imperva.com/download.asp?id=360…making money the driving force behind most web application
attacks
, why would hackers want to waste time actually studying… attack volume can be used to identify automated
attacks
and reveals how the automated tools used leave …
One year on, Raspberry Pi hit by more DDoS attacks: coincidence?
Hardware and Software
Hardware
11 Years Ago
by happygeek
…is that hacktivism rules when it comes to DDoS
attacks
, and that the victims are mainly big business and…That perception is, sadly, rather unfounded. Sure, the Anonymous
attacks
with a political agenda tend to grab the headlines but… political or hacktivist agenda is behind far more DDoS
attacks
. The most common motive is financial blackmail, pure …
Give some names of Network Attacks
Hardware and Software
Networking
13 Years Ago
by Amrinder07
… make it, first i should have some knowledge about the
attacks
on the network and the effects of different types of… network Packets. I Googled it and found some
attacks
like: * DoS Denial of service ---> like Ping Flood , IP … but that are too limited number of
attacks
. Please help me to find more
attacks
and its detail, so that i can…
Re: One year on, Raspberry Pi hit by more DDoS attacks: coincidence?
Hardware and Software
Hardware
11 Years Ago
by LastMitch
… the chances of being taken down again following the 2012
attacks
, but from what has happened this last week that would…
Malicious website attacks and how to counter them?
Programming
Web Development
16 Years Ago
by Venom Rush
… is: 1.) What different types of
attacks
are there against websites besides brute force
attacks
(been reading this thread on brute force…
attacks
: [url]http://www.daniweb.com/forums/thread82966…
Re: Malicious website attacks and how to counter them?
Programming
Web Development
16 Years Ago
by Walkere
… Rush;523376]1.) What different types of
attacks
are there against websites besides brute force
attacks
(been reading this thread on brute… force
attacks
: [url]http://www.daniweb.com/forums/thread82966…
UK PLC loses billions to hacker attacks
Hardware and Software
11 Years Ago
by happygeek
… larger organisation. That one in seven detecting hack
attacks
figure represents the highest level recorded since the PwC… understand that each large enterprise saw some 54 'significant
attacks
' by an 'unauthorised outsider' during the year, and…30,000. If you look further than just hack
attacks
, then the picture gets even worse: broaden the …
Re: Malicious website attacks and how to counter them?
Programming
Web Development
16 Years Ago
by ShawnCplus
SQL Injection is probably your biggest threat with logins since it's pretty simple to defeat brute force
attacks
with lockout. addslashes() only goes so far, the same goes for magic_quotes_gpc
Re: Malicious website attacks and how to counter them?
Programming
Web Development
16 Years Ago
by Venom Rush
> SQL Injection is probably your biggest threat with logins since it's pretty simple to defeat brute force
attacks
with lockout. `addslashes()` only goes so far, the same goes for `magic_quotes_gpc` Could you explain a bit more about SQL injection? EDIT: I just found [a link to SQL injection](http://en.wikipedia.org/wiki/SQL_injection)
Re: Malicious website attacks and how to counter them?
Programming
Web Development
16 Years Ago
by anthmaina
There are a number of
attacks
beside sql injections,others are like cross scripting flaws,session …
Re: Malicious website attacks and how to counter them?
Programming
Web Development
16 Years Ago
by nav33n
[QUOTE=anthmaina;523481]There are a number of
attacks
beside sql injections,others are like cross scripting flaws,session …
75 percent of enterprises have been hit by multi-million dollar cyber attacks
Digital Media
Digital Marketing
14 Years Ago
by happygeek
… my attention read "75 percent of organizations experienced cyber
attacks
in the past 12 months" and "these…
attacks
cost enterprise businesses an average of $2 million per year&…
Drupal 7 SQL injection prevention API vulnerable to SQL injection attacks
Programming
Databases
9 Years Ago
by happygeek
… executed against the database are sanitized to prevent SQL injection
attacks
. A vulnerability in this API allows an attacker to send… can lead to privilege escalation, arbitrary PHP execution, or other
attacks
. This vulnerability can be exploited by anonymous users. I think…
Firewall attacks, how many is normal?
Hardware and Software
Information Security
19 Years Ago
by Turnip
…, it shows I'm getting on average 4 or 5
attacks
per minute. Is this normal, and if so what's…
SQL Injection Attacks
Programming
Databases
16 Years Ago
by trudge
I've mentioned SQL Injection
attacks
a few times in this forum and the Database Design …
Want to create a DoS attacks Simulation LAb
Community Center
Say Hello!
15 Years Ago
by jabran
Hi guys,i am doing my project in DoS
attacks
and now i want to create the simulation Lab on DoS attack i need to show them.Can you plese tell me which simulator i can use for this and from where i can get the labs to do this project.i'll be very thankfull to you.
Find attacks in sampled sound data (algorithm ideas)
Programming
Computer Science
15 Years Ago
by death_oclock
… data. My first step is to find where all the
attacks
are, or where the starts of notes are. I want…
Lazy-ass multi-lingual spamming attacks
Hardware and Software
Information Security
14 Years Ago
by newsguy
… templates enable the spammers to push out multiple-language spam
attacks
and some dubious translations through the use of poor online…
SQL Injection Attacks
Programming
Web Development
14 Years Ago
by whisper_101
… my code in asp to make it more difficult for
attacks
to occur through the login (username+password) fields? Is there…
Multiple attacks on VISTA (Koobface, Errorsmart, Drivercure, Antispyware).. Removal?
Hardware and Software
Information Security
14 Years Ago
by jimbailey
… to rid my friends and myself of a barrage of
attacks
from facebook,twitter,bebo and myspace based trojans. I have…
PHP and MYSQL injection attacks
Programming
Web Development
14 Years Ago
by whiteyoh
Hi All, Can anybody give me some good pointers on cause, effect and workarounds for injection
attacks
please? Id really like to know actual commands that people use, where they use them and how to stop them. Answers on a postcard...............:-)
Have problem with DDoS attacks?
Community Center
12 Years Ago
by TeddyBear2155
Has anyone dealt with this on their website. I am webmaster for an informational site but am becoming inadated with DDos
attacks
as many as 250,000 a day which I have never heard of before. Any suggestions on what to do? Please any and all help is needed!
1
2
3
17
Next
Last
Search
Search
Forum Categories
Hardware/Software
Programming
Digital Media
Community Center
Latest Content
Newest Topics
Latest Topics
Latest Posts
Latest Comments
Top Tags
Topics Feed
Social
Meet People
Forums
Top Members
Community Functions
DaniWeb Premium
Newsletter Archive
Markdown Syntax
Community Rules
Developer APIs
Connect API
Forum API Docs
Tools
SEO Backlink Checker
Legal
Terms of Service
Privacy Policy
FAQ
About Us
Advertise
Contact Us
© 2024 DaniWeb® LLC