1,118 Topics
|
|
|
Hey, before everything, sorry about my english, i will do my best I'm really new at this, i just want to know where i should start learning about security, control of ports, control the sockets already initialized for other program, viruses, spywares, hack, nukes, etc.. I'm just asking for sources(i … |
I have safari, explorer, and firefox and none of these browsers can connect to these sites. I use Noton as an anti virus and zonealarm as a firewall. All of these problems started when my Norton subscription ran out. I went to the norton site to renew it and i … |
|
Over the weekend, software development and collaboration tools specialist Atlassian suffered a security breach to an internal system, potentially exposing customer passwords. The reason? It forgot about an old legacy database which had not been taken offline. According to Atlassian spokesperson [URL="http://blogs.atlassian.com/news/2010/04/oh_man_what_a_day_an_update_on_our_security_breach.html"]Mike Cannon-Brookes[/URL] the company had migrated its customer database … |
|
so some day i want to hand code a security program(anti-virus probably). but i dont know where to start on theory and actual code. Where should i start and what language is most common? Where did you start if you have been in the same bind i have? thanks to … |
|
Hello there everyone, I need your immediate help. My relative's laptop just got infected by a rootkit in my opinion. He told me he was on a website and then the page just changed by itself and it took him to another page. Now here are the symptoms that I … |
|
A news [URL="http://www.9news.com/news/article.aspx?storyid=135404&provider=top"]article [/URL]was making the Facebook rounds today, warning about a site called [URL="http://www.spokeo.com/"]Spokeo.com [/URL]that aggregates publicly available information. "It can list your address, a picture of your home, how much it cost, how long you have lived there, your approximate age and income, your relationship status and more," … |
|
The annual [URL="http://cansecwest.com/"]CanSecWest PWN2OWN[/URL] hacking contest has [URL="http://www.daniweb.com/news/story270028.html"]done it again[/URL] and provided us news types with the perfect headline writing opportunity as the Apple iPhone falls to the hackers in just 20 seconds. The hackers in question, Vincenzo Iozzo and Ralf Weinmann, picked up the prize of $15,000 and an … |
|
As the saying goes, a man (and presumably a woman) is known by the company he keeps. In fact, last [URL="http://www.daniweb.com/news/story224479.html"]fall [/URL]some MIT students did a study where they demonstrated that they could tell someone's sexual orientation by the sexual orientation of their friends on Facebook and other social networking … |
|
With the annual Pwn2Own hacking event due to kick off tomorrow, Mozilla has confirmed that Firefox 3.6 has an unpatched critical vulnerability. The fact that Pwn2Own competitors will not be able to exploit this vulnerability to claim the Firefox hacking prize will be of no interest to the millions of … |
|
Today the cyber security experts at [URL="http://www.symantec.com/about/news/release/article.jsp?prid=20100322_01"]Norton announced the top 10 riskiest U.S. cities for cybercrime[/URL]. The next time you pay a bill or update your status on Facebook you might want to look over your shoulder [virtually]. It seems Seattle, Boston, San Francisco and Washington D.C. are the riskiest … |
|
There's a disturbing story kicking around the UK wires at the moment - young people are hacking into other people's computers purely for fun. Here's the [URL="http://news.bbc.co.uk/1/hi/technology/8574259.stm"]BBC's take on it[/URL]. I saw the PR person who organised the survey only last week and can confirm she's not a time waster, … |
|
A new survey has revealed that while 78 percent of them agree that it is wrong, a quarter of the kids asked admitted that hacking really is child's play. The survey of more than 1000 children discovered that the boy hacker stereotype no longer holds true, with 47 percent of … |
|
Hi I spent the morning hacking together the basic components of my own MVC framework, which currently only parses a url, loads the class and calls the right method... Because I obviously dont want someone to be able to access the 'add/remove' methods associated with future classes, i need to … |
|
If it were not bad enough that the Iowa Division of Homeland Security official website was hacked, defaced and forced to close down temporarily it appears that another Iowa state government resource was also compromised a few weeks before. At the end of January the Iowa Racing and Gaming Commission … |
|
Google has today launched a new Beta version of the [URL="http://www.itpro.co.uk/blogs/daveyw/2009/03/22/google-chrome-stands-alone-at-pwn2own/"]Chrome browser[/URL], adding brand new privacy controls into the mix. You have to admit it's great timing, what with Microsoft this week making the 'browser ballot' screen available in European version of Windows giving users the option to [URL="http://www.daniweb.com/news/story253418.html"]switch from … |
|
I've seen a collection of articles about computer security breaches originating from China and would like to give a report from the ITYS Foundation. ITYS, for the unaware, is "I Told You So." I've discussed the use of Linux on the desktop for years, touting its security, stability, thousands of … |
|
Call the National Guard. On second thoughts, call someone else. After all, it is the National Guard which has somehow managed to lose an archival data disk containing five years worth of staff records covering some 15,000 personnel. The US National Guard is now recommending that any current and former … |
|
According to figures revealed with the publication of the [URL="http://www.ibm.com/security/xforce"]IBM X-Force 2009 Trend and Risk Report[/URL], not only do web application vulnerabilities remain the largest category of security disclosure for the last year but, worryingly when you consider that the number of such vulnerabilities found by organisations has not decreased … |
|
Those of us who can remember when Internet access meant slow dial-up modems connecting via pay per minute service providers will also be all too familiar with the concept of the porn dialler. For the youngsters out there, these took advantage of the fact that most punters had no idea … |
|
Chip and PIN credit card attack leaves banks on shaky ground according to one analyst, although oddly enough the banks appear to disagree. Researchers at the University of Cambridge Computer Laboratory have revealed how the Chip and PIN credit card security system is flawed and left vulnerable to fraud. Steven … |
|
Wow. That's quite a statistic, but there it is in front of me jumping off the pages of the latest [URL="http://bit.ly/b2rUFg"]global State of Enterprise Security study[/URL] from Symantec. The two lines shining so brightly and grabbing my attention read "75 percent of organizations experienced cyber attacks in the past 12 … |
|
Responses (from another site) on my recent, "[URL="http://www.daniweb.com/news/story261566.html"]Security Alert: They Should Have Used Linux[/URL]" led me to explore the conclusion that hacking is really only for those seeking the low-hanging security fruit as their prey. These folks, who tout themselves as "Linux Experts" intrigued me so much with their comments … |
|
Twitter users are being warned not to click the links in a Direct Message which has been circulating in large numbers since late Saturday. The message simply says either "LOL, is this you?" or "LOL, this is funny" or "ha ha, u look funny on here" and has a link … |
|
Botnets are bad for business, and that's the bottom line. The news that a botnet called Kneber has infected 75,000 computers including government and business machines has been spreading online. But while many, if not most, of these reports are claiming that Kneber is a new botnet the truth is … |
|
I have an .exe that I want people to be able to download and run on Vista. It needs to run as admin. I have a web page with a 'Download' button. Assume I am logged in as an admin. I click the 'Download' button and IE8 asks whether to … |
|
40 million people were without power in the eastern United States, more than 60 million cellphones were out of service, and Wall Street was closed for a week due to a terrorist cyberattack against the United States. No, it didn't really happen. But it could. Coverage of a simulated cyber … |
|
Can somebody please suggest some good institutes which provide certifies course and training in information security. |
|
I have a question, couple of years ago, I had a system failure and windows tech support help me fix it but had me do a lot of registry entries in windows recovery console. What ended up for the fix was he had me actually put the boot files on … |
|
Hello, <br /><br /> We are struggling with getting IIS 6 (Win 2003 server) to connect to a Samba share that contains some dynamically generated resources. We are able to mount the drive on the Windows server and create a Virtual Directory to that new drive using 'Connect As' with … |
|
What are the career prospects of information security? Is the job of information security expert lucrative? Somebody pls advice.. |
The End.