1,118 Topics

Member Avatar for
Member Avatar for Fernand0

Hey, before everything, sorry about my english, i will do my best I'm really new at this, i just want to know where i should start learning about security, control of ports, control the sockets already initialized for other program, viruses, spywares, hack, nukes, etc.. I'm just asking for sources(i …

0
104
Member Avatar for oodeagleoo

I have safari, explorer, and firefox and none of these browsers can connect to these sites. I use Noton as an anti virus and zonealarm as a firewall. All of these problems started when my Norton subscription ran out. I went to the norton site to renew it and i …

Member Avatar for subdewd
0
411
Member Avatar for happygeek

Over the weekend, software development and collaboration tools specialist Atlassian suffered a security breach to an internal system, potentially exposing customer passwords. The reason? It forgot about an old legacy database which had not been taken offline. According to Atlassian spokesperson [URL="http://blogs.atlassian.com/news/2010/04/oh_man_what_a_day_an_update_on_our_security_breach.html"]Mike Cannon-Brookes[/URL] the company had migrated its customer database …

1
348
Member Avatar for kyle11778

so some day i want to hand code a security program(anti-virus probably). but i dont know where to start on theory and actual code. Where should i start and what language is most common? Where did you start if you have been in the same bind i have? thanks to …

Member Avatar for vijayan121
0
76
Member Avatar for coachHinesfan

Hello there everyone, I need your immediate help. My relative's laptop just got infected by a rootkit in my opinion. He told me he was on a website and then the page just changed by itself and it took him to another page. Now here are the symptoms that I …

Member Avatar for jholland1964
0
201
Member Avatar for slfisher

A news [URL="http://www.9news.com/news/article.aspx?storyid=135404&provider=top"]article [/URL]was making the Facebook rounds today, warning about a site called [URL="http://www.spokeo.com/"]Spokeo.com [/URL]that aggregates publicly available information. "It can list your address, a picture of your home, how much it cost, how long you have lived there, your approximate age and income, your relationship status and more," …

Member Avatar for InsightsDigital
1
605
Member Avatar for happygeek

The annual [URL="http://cansecwest.com/"]CanSecWest PWN2OWN[/URL] hacking contest has [URL="http://www.daniweb.com/news/story270028.html"]done it again[/URL] and provided us news types with the perfect headline writing opportunity as the Apple iPhone falls to the hackers in just 20 seconds. The hackers in question, Vincenzo Iozzo and Ralf Weinmann, picked up the prize of $15,000 and an …

Member Avatar for happygeek
0
237
Member Avatar for slfisher

As the saying goes, a man (and presumably a woman) is known by the company he keeps. In fact, last [URL="http://www.daniweb.com/news/story224479.html"]fall [/URL]some MIT students did a study where they demonstrated that they could tell someone's sexual orientation by the sexual orientation of their friends on Facebook and other social networking …

0
216
Member Avatar for happygeek

With the annual Pwn2Own hacking event due to kick off tomorrow, Mozilla has confirmed that Firefox 3.6 has an unpatched critical vulnerability. The fact that Pwn2Own competitors will not be able to exploit this vulnerability to claim the Firefox hacking prize will be of no interest to the millions of …

Member Avatar for happygeek
0
494
Member Avatar for WASDted

Today the cyber security experts at [URL="http://www.symantec.com/about/news/release/article.jsp?prid=20100322_01"]Norton announced the top 10 riskiest U.S. cities for cybercrime[/URL]. The next time you pay a bill or update your status on Facebook you might want to look over your shoulder [virtually]. It seems Seattle, Boston, San Francisco and Washington D.C. are the riskiest …

Member Avatar for TobyGalino
0
271
Member Avatar for GuyClapperton

There's a disturbing story kicking around the UK wires at the moment - young people are hacking into other people's computers purely for fun. Here's the [URL="http://news.bbc.co.uk/1/hi/technology/8574259.stm"]BBC's take on it[/URL]. I saw the PR person who organised the survey only last week and can confirm she's not a time waster, …

0
181
Member Avatar for newsguy

A new survey has revealed that while 78 percent of them agree that it is wrong, a quarter of the kids asked admitted that hacking really is child's play. The survey of more than 1000 children discovered that the boy hacker stereotype no longer holds true, with 47 percent of …

1
235
Member Avatar for lifeworks

Hi I spent the morning hacking together the basic components of my own MVC framework, which currently only parses a url, loads the class and calls the right method... Because I obviously dont want someone to be able to access the 'add/remove' methods associated with future classes, i need to …

Member Avatar for lifeworks
0
126
Member Avatar for newsguy

If it were not bad enough that the Iowa Division of Homeland Security official website was hacked, defaced and forced to close down temporarily it appears that another Iowa state government resource was also compromised a few weeks before. At the end of January the Iowa Racing and Gaming Commission …

Member Avatar for crunchie
1
448
Member Avatar for happygeek

Google has today launched a new Beta version of the [URL="http://www.itpro.co.uk/blogs/daveyw/2009/03/22/google-chrome-stands-alone-at-pwn2own/"]Chrome browser[/URL], adding brand new privacy controls into the mix. You have to admit it's great timing, what with Microsoft this week making the 'browser ballot' screen available in European version of Windows giving users the option to [URL="http://www.daniweb.com/news/story253418.html"]switch from …

Member Avatar for Tech B
0
945
Member Avatar for khess

I've seen a collection of articles about computer security breaches originating from China and would like to give a report from the ITYS Foundation. ITYS, for the unaware, is "I Told You So." I've discussed the use of Linux on the desktop for years, touting its security, stability, thousands of …

Member Avatar for khakilang
0
1K
Member Avatar for newsguy

Call the National Guard. On second thoughts, call someone else. After all, it is the National Guard which has somehow managed to lose an archival data disk containing five years worth of staff records covering some 15,000 personnel. The US National Guard is now recommending that any current and former …

1
145
Member Avatar for newsguy

According to figures revealed with the publication of the [URL="http://www.ibm.com/security/xforce"]IBM X-Force 2009 Trend and Risk Report[/URL], not only do web application vulnerabilities remain the largest category of security disclosure for the last year but, worryingly when you consider that the number of such vulnerabilities found by organisations has not decreased …

0
297
Member Avatar for happygeek

Those of us who can remember when Internet access meant slow dial-up modems connecting via pay per minute service providers will also be all too familiar with the concept of the porn dialler. For the youngsters out there, these took advantage of the fact that most punters had no idea …

Member Avatar for skimmer911
2
486
Member Avatar for happygeek

Chip and PIN credit card attack leaves banks on shaky ground according to one analyst, although oddly enough the banks appear to disagree. Researchers at the University of Cambridge Computer Laboratory have revealed how the Chip and PIN credit card security system is flawed and left vulnerable to fraud. Steven …

Member Avatar for MsCamellia2010
0
854
Member Avatar for happygeek

Wow. That's quite a statistic, but there it is in front of me jumping off the pages of the latest [URL="http://bit.ly/b2rUFg"]global State of Enterprise Security study[/URL] from Symantec. The two lines shining so brightly and grabbing my attention read "75 percent of organizations experienced cyber attacks in the past 12 …

0
537
Member Avatar for khess

Responses (from another site) on my recent, "[URL="http://www.daniweb.com/news/story261566.html"]Security Alert: They Should Have Used Linux[/URL]" led me to explore the conclusion that hacking is really only for those seeking the low-hanging security fruit as their prey. These folks, who tout themselves as "Linux Experts" intrigued me so much with their comments …

Member Avatar for marqueue
0
369
Member Avatar for newsguy

Twitter users are being warned not to click the links in a Direct Message which has been circulating in large numbers since late Saturday. The message simply says either "LOL, is this you?" or "LOL, this is funny" or "ha ha, u look funny on here" and has a link …

0
188
Member Avatar for newsguy

Botnets are bad for business, and that's the bottom line. The news that a botnet called Kneber has infected 75,000 computers including government and business machines has been spreading online. But while many, if not most, of these reports are claiming that Kneber is a new botnet the truth is …

0
789
Member Avatar for anAppBuilder

I have an .exe that I want people to be able to download and run on Vista. It needs to run as admin. I have a web page with a 'Download' button. Assume I am logged in as an admin. I click the 'Download' button and IE8 asks whether to …

Member Avatar for anAppBuilder
0
277
Member Avatar for slfisher

40 million people were without power in the eastern United States, more than 60 million cellphones were out of service, and Wall Street was closed for a week due to a terrorist cyberattack against the United States. No, it didn't really happen. But it could. Coverage of a simulated cyber …

0
456
Member Avatar for apoorvatandon

Can somebody please suggest some good institutes which provide certifies course and training in information security.

0
84
Member Avatar for SillyBilly

I have a question, couple of years ago, I had a system failure and windows tech support help me fix it but had me do a lot of registry entries in windows recovery console. What ended up for the fix was he had me actually put the boot files on …

Member Avatar for gerbil
0
281
Member Avatar for connColl

Hello, <br /><br /> We are struggling with getting IIS 6 (Win 2003 server) to connect to a Samba share that contains some dynamically generated resources. We are able to mount the drive on the Windows server and create a Virtual Directory to that new drive using 'Connect As' with …

0
137
Member Avatar for apoorvatandon

What are the career prospects of information security? Is the job of information security expert lucrative? Somebody pls advice..

0
88

The End.