1,119 Topics

Member Avatar for
Member Avatar for Shinedevil

Got any Suggestions? I'd like to delve deeper into the topic to bring my knowledge base up. This is what I've got so far: Hacking Exposed 6 (10th Anniversary Edition) by; McClure, Scambray, and Kurtz Hacking: The Art of Exploitation 2nd Edition by, Jon Erickson Steal This Computer Book 4.0 …

Member Avatar for zinnqu
0
228
Member Avatar for Rhuck

I will be starting school this upcoming week and I am wondering which way to go in the IT field.(Security or Networking) I know that graduation is long down the road but I want to make a sound decision that leads to future possiblities. Any recommendations?

Member Avatar for Rhuck
0
180
Member Avatar for mayank143srk
Member Avatar for izzaty
0
149
Member Avatar for happygeek

Have you ever thought about measuring the Internet in terms if malware per minute? Me neither, but someone has and it makes for uncomfortable reading if you are a Microsoft Windows user. [attach]17145[/attach]How fast is the Internet? It depends on the metric being used, of course, but one new report …

Member Avatar for Chronister
1
2K
Member Avatar for stressedcomp

Recently I turned on my laptop and realized my taskbar changed by XP blue to gray with no special icons. The taskbar looks like a boring version of Windows 98. I tried everything and nothing's working. It was normal yesterday. I'm using Trend Micro Internet Security. I tried to click …

Member Avatar for r8er4ever
0
172
Member Avatar for Datsun90

Hi all, I have designed an application in MS Access 2007 that will be used in some schools (over 60 schools). Each time I start the application, it shows an alert in the message bar that the VBA macros are disabled, and gives me the option to enable it for …

Member Avatar for boblarson
0
160
Member Avatar for dreamer_lek91

[B]how can i disable the save function. The database that I am making now is being shared by many users and i do not want them to mess up with my design and programming stuff that i had done. I have tried making the file into ACCDE format but it …

Member Avatar for boblarson
0
183
Member Avatar for san_fran_crisko

Hi, Recently, I've noticed on my home router (DLink DIR 635) a lot blocked connection attempts being logged to our Windows Vista machine - roughly one every 4-5 seconds. The destination port is always UDP 15126 but the source IP addresses come from a wide range of different sources - …

Member Avatar for getnit
0
186
Member Avatar for mayank143srk

Hiii m final year b.tech student...i want some ideas for 1 yr. project on linux networking,networking and security....

Member Avatar for mcullam
-1
195
Member Avatar for feoperro

Hi, After completing a PHP website, with html, javascript and mysql connections - What can I do to ensure good security and what threats should I be aware of? Thanks, Ashton.

Member Avatar for diafol
0
95
Member Avatar for happygeek

With 2009 coming to an end, it's that time of year when security experts start predicting what the (very near) future will hold in terms of likely threat landscapes. One has bucked the trend of just picking on botnet growth and SEO poisoning, although both are on its list, and …

Member Avatar for tocopherol
0
895
Member Avatar for happygeek

Fatal System Error, subtitled 'The Hunt for the New Crime Lords Who Are Bringing Down the Internet' is that rarest of finds: an IT security book that is not only informative and fascinating, but truly gripping from start to finish. This newly published made for Kindle edition is the cheapest …

Member Avatar for happygeek
0
310
Member Avatar for happygeek

An analysis of 100 million security software installations in 144 countries claims to have determined just where the most dangerous, places to access the Internet are. The results are surprising to say the least. [attach]16939[/attach]The results of [URL="http://www.avg.com"]AVG Technologies' first ever Global Threat Index[/URL] report were published yesterday, and concentrated …

Member Avatar for dexter737
0
585
Member Avatar for P0lT10n

Hello people. I was reading severals scripts, and I saw, all the time, that they used %s... What is the application of that ??? Becuase I'm searching about that and I don't find anything about it ! I know that it's about injection codes... Can anyone give me a web …

Member Avatar for mschroeder
0
135
Member Avatar for burningflower

Hello peeps, I am currently doing a project on a system that handles online coursework submission. The project has some items there but i wanted to add more features such as security. Thereby, I am going to have to make a survey in order to get responses. So I want …

Member Avatar for burningflower
0
134
Member Avatar for babaidebnath

I want to give my application data folder kaspersky antivirus like security. Where I can add a folder but cant change any content or create any file. I even gave the current user full control security privilege but it just does not working only for this kaspersky data folder. I …

Member Avatar for kvprajapati
0
174
Member Avatar for newsguy

According to the 2009 Web Application Security Report from NTA Monitor, 90% of all web applications have at least one medium risk vulnerability and 27% have at least one high risk vulnerability. Apparently the most common vulnerabilities are those which involve SQL injection, cross-site scripting and cross-request forgery. One data …

Member Avatar for ashumiloff
2
553
Member Avatar for happygeek

Many of the biggest forum-based online communities, including DaniWeb, are powered by vBulletin software. So it came as something of a shock when the BBC reported that a [URL="http://www.bbc.co.uk/news/technology-10714192"]vBulletin security flaw means that any hacker could "easily access the main administrator username and password for a site"[/URL]. But is the …

Member Avatar for Bruce100
1
601
Member Avatar for slfisher

Along [URL="http://en.wikipedia.org/wiki/List_of_commemorative_months"]with [/URL]Vegetarian Awareness, Toilet Tank Repair, and Pet Wellness, October is National Cyber Security Awareness Month. Who knew. "The National Cyber Security Alliance, along with the U.S. Department of Homeland Security and the Multi-State Information Sharing and Analysis Center, sponsors National Cyber Security Awareness Month every October since its …

Member Avatar for slfisher
0
337
Member Avatar for happygeek

Most spam continues to be drugs related, yet it is aimed at workers in the automotive industry. The United States, traditionally king of malware infected email, has dropped like a lead balloon to be overtaken by the UK. And workers prefer to download stuff on the move and get their …

Member Avatar for Kieran Y5
0
476
Member Avatar for happygeek

The likes of Norton these days make much fuss about just how quick installing a security suite is, but you can forget all claims of being done in 60 seconds when it comes to Trend Micro Titanium Maximum Security. Think less of speedy rocket-powered installations and more of slow and …

1
719
Member Avatar for APatrizio

Just because security holes and vulnerabilities get reported to software vendors doesn't mean they are actually patched. A new report from IBM's X-Force security team found that of all the software holes reported in the first half of this year, more than half are still unpatched. IBM's X-Force report is …

Member Avatar for josephadeo
0
520
Member Avatar for slfisher

A number of civil liberties groups announced today that they are [URL="http://www.nacdl.org/public.nsf/NewsReleases/2010mn30/$FILE/BorderSearchComplaint09072010.pdf"]fighting [/URL]U.S. Department of Homeland Security [URL="http://www.dhs.gov/ynews/releases/pr_1251393255852.shtm"]policies [/URL]that allow them to search all electronic devices -- including laptops, cameras, and smart phones -- that cross the border. Between October 1, 2008 and June 2, 2010, more than 6,500 people …

Member Avatar for PCSAWICK829
1
233
Member Avatar for slfisher

Nations such as Russia and China who have malicious hackers should be held accountable for the actions of those criminals, according to a [URL="http://www.cfr.org/content/publications/attachments/Cybersecurity_CSR56.pdf"]report [/URL]from the [URL="http://en.wikipedia.org/wiki/Council_on_Foreign_Relations"]Council on Foreign Relations[/URL], an independent, nonpartisan membership organization. "Though the United States cannot expect countries to prevent all malicious behavior, it can expect …

Member Avatar for Agilemind
1
255
Member Avatar for slfisher

This year's version of the Cybersecurity Act was approved by the Senate Committee on Homeland Security and Governmental Affairs after amending it to limit the president's authority in the event of a cyber emergency, [URL="http://thehill.com/blogs/hillicon-valley/technology/105377-senate-homeland-security-committee-approves-cybersecurity-bill-"]reported [/URL][I]The Hill[/I]. The [URL="http://thomas.loc.gov/cgi-bin/query/z?c111:S.3480:"]bill[/URL], sponsored by Sens. Joe Lieberman (I-Conn.), Susan Collins (R-Maine), and Tom …

Member Avatar for slfisher
0
511
Member Avatar for APatrizio

[ATTACH=RIGHT]17035[/ATTACH]While security professionals constantly fear the big bad hacker breaking into their enterprise and wreaking havoc, the biggest threat to security is sitting inside the company and drawing a paycheck. Cloud and e-mail security specialist [URL="http://www.proofpoint.com/"]Proofpoint[/url] notes in its seventh annual study of data loss prevention (DLP) issues that e-mail …

Member Avatar for 1laptoprental
0
289
Member Avatar for happygeek

Warnings have been issued today not to complete a customer satisfaction survey that appears to come from McDonald's and promises cash for your answers. A bit like fast food itself, something that looks appetising and promises a quick fix is often not actually that good for you. [attach]17019[/attach]IT security and …

1
349
Member Avatar for EricMack

[ATTACH=right]16930[/ATTACH]Just weeks after Research in Motion [URL="http://www.daniweb.com/news/story303272.html"]installed servers in Saudi Arabia[/URL] to allow authorities there to monitor Blackberry messaging traffic and avoid being shut down in the Kingdom, an encore of the drama is playing out in India. The Indian government has [URL="http://www.informationweek.com/news/software/operatingsystems/showArticle.jhtml?articleID=226700187"]pledged to shut down RIM's encrypted services[/URL] in …

0
242
Member Avatar for ClimateWonk

The nonprofit think tank for which I spent the last seven years working on climate and energy policy has gone bankrupt. It is no more. The server is returned to the company that rented it to us, and the offices are closed and have new tenants. As part of the …

Member Avatar for ClimateWonk
0
617
Member Avatar for happygeek

It's not the first time that Johnny Depp has died according to the Internet, but this time he is not alone. According to an ongoing online campaign, celebrities including Beyonce, Bon Jovi, Brad Pitt, Cameron Diaz and David Beckham have all been killed in tragic circumstances. Perhaps surprisingly [URL="http://www.daniweb.com/news/thread306364.html"]Lady Gaga …

0
422

The End.