Member Avatar

Hi DW. Well I'm very much interested in the data protection and also giving the best privacy to the public where we protect your passwords. I've seen something that Firefox had introduced to their browsers with also their Apps. This is called LockWise which is a tool to sync your passwords with your other devices. Now as we are in the 4IR I personally think that such information shouldn't be shared purely with other devices because what will happen when you are not in front of those devices? Worst of them all we all know that browsers don't encrypts the …

+0 forum 0
Member Avatar

For those very new to this area, please google SIM SWAP and discover a very nasty security issue with all phones we use today. At first glance the new security researcher might think I'm exaggerating. Do your own research and tell me you don't find this to be one of the most foul, nasty exploits I've seen in years. This exploit was recently used to highjack a writer's phone at https://www.zdnet.com/article/sim-swap-horror-story-ive-lost-decades-of-data-and-google-wont-lift-a-finger/ His case is still developing with loss of accounts, tax returns he stored on the Clouds, and a 25,000USD Bitcoin purchase. And we're not talking thousands of dollars in …

Member Avatar
+0 forum 3
Member Avatar

I'm using Windows Defender as full antivirus and Malwarebytes (Free version) So far. I've never had viruses malware on my computers. I started doing this 2016-2017. Are paid antivirus products not worth it now? Back then i used to use Bitdefender and it was pretty good. It had a pretty good GUI and many other protection features.

Member Avatar
+0 forum 4
Member Avatar

I am thinking about making a website on a VPS. I've read on internet that if someone hacks my website and puts a malware into links or if he steals personal information(including passwords), not only hacker but the owner of the website is responsible too and a lawsuit may be opened against him/them and may pay big fines. If this is true then I really don't understand how so many people create websites and taking this risk.There may be no lawyer in this forum but I am asking to other people too, to webdevelopers(or people who want to be a …

Member Avatar
+0 forum 3
Member Avatar

I looking to create a database form for people to create receipts to issue to customers but I need to be able to lock the record so that it can't be edited once it has been printed and saved. How can I do this?

Member Avatar
+0 forum 1
Member Avatar

I have a question for those who are looking for bugs and vulnerabilities for money. How are you looking for customers? Is it freelance or a permanent job or a hobby? I found one blockchain project that offers to find vulnerabilities for money. I will post the text of their proposal, if the administration does not mind: *In order to improve the security of the program code, we announce the beginning of bug-hunting. Anyone who finds a new critical bug (vulnerability) will get 100 000 TERA. Bug should be reported confidentially to progr76@gmail.com or telegram @progr76 TERA Foundation: https://terafoundation.org* What …

+0 forum 0
Member Avatar

Living in California, I periodically need to log into my computer that's back in my home in New York. Not that often, typically just a couple times a year. But today, when attempting to connect, I got an error message saying, "The remote TeamViewer is running an old version which is out of date. Therefore, you cannot connect ot this Version anymore." Soooo, firstly, why is TeamViewer not backwards compatible?! Secondly, I haven't updated TeamViewer on my local computer either anytime recently, so both local and remote computers should be running versions of TeamViewer that were released roughly at the …

Member Avatar
+0 forum 4
Member Avatar

A survey of attendees at Infosecurity Europe earlier this month showed 70 percent in favour of the dictionary definition (in this case the Cambridge Dictionary) of a hacker being amended. The amendment in question being to remove 'illegality' from the definition. The current definition of a hacker is "a person who is skilled in the use of computer systems, often one who illegally obtains access to private computer systems". So what do you reckon, DaniWebbers? Is it time that hacker was reclaimed entirely (rather than relying upon black and white labels) and if so what word should replace it as …

Member Avatar
+0 forum 14
Member Avatar

Let me share how I began to understand Microsoft: A long time back when I went to Microsoft Redmond's campus for a seminar. I had two things I wanted to share since I thought Microsoft would want to look into this. 1. A CD that when put into the PC would cause the PC to lock up. I didn't know why, I just thought it showed a bug. 2. A jpeg file that when copied to the desktop would render that user's account dead. Even in safe mode until the file was deleted. I waited my turn to meet with …

Member Avatar
+0 forum 2
Member Avatar

Ok, So I sell some online services basically there is no need for my clients to put in their shipping address but paypal still asks for shipping address on the checkout page they are taken to from the payapl button. Is there a way to remove that option? I I'm sorry if I am asking this at the wrong place I am kind of a newbie here. Thanks

Member Avatar
+0 forum 1
Member Avatar

Hello guys, Recently my site was infected with malware, which caused me a lot of problems. In particular, many spam links have been created and indexed. I managed to get a lot out of them with Google search console, but it still appears in some key searches. Is there any chance of blocking the link prefix in robots.txt to deleting itself from google? <snip> I want somehow to block indexing all links I know i can block like this: User-agent: * Disallow: /product/categories But this one is different, its not like a parent page/category. I would appreciate very much if …

Member Avatar
+0 forum 15
Member Avatar

One of the mantras of computing and just about anything data related is "**We only lose what we don't backup**" but some are taking offense that this is still the current state of computing today. Recently some owners call this out as "blaming the user", "you're holding it wrong" or snobby. Everyone I know will try their best to help you get your machine back in working order even if people say such things. They've lost it all and upset that they can't get their stuff back. Last week's example was another smart phone, forgot their password, unlock code and …

Member Avatar
+0 forum 1
Member Avatar

The Conservative party issued a statement on Saturday which apologised for "any concern caused" and confirmed that "the technical issue has been resolved and the app is now functioning securely." However, not before Boris Johnson's profile image had been changed to a pornographic one and that of Environment Secretary, Michael Gove, swapped for a picture of Rupert Murdoch. Some ministers, and other MPs, apparently reported receiving nuisance calls following the app breach. The Information Commissioner's Office has confirmed that it is investigating the incident, and bite the Tories with a large fine. Under the EU General Data Protection Regulation (GDPR), …

-1 forum 0
Member Avatar

Greetings everyone, I've been away from this forum for a long time, must be more than 10 years since my last post. That's how long I've been pretty much trouble free, as far as the Internet and data safety was concerned. Back then I was experimenting all too often with the free anti-spyware and anti-virus programs (Avast, AVG, etc.), getting in trouble in the process, as those freebies would often interfere with each other cause all sorts of headaches, mainly because those conflicts produced a breeding ground for some real nasty Internet threat. I can still remember the friendly atmosphere …

Member Avatar
+1 forum 7
Member Avatar

I've encountered an unknown user appear in my calls log and its had a 16mins airtime videocall to this person in messenger. I'm just suprised, it was appear in my call logs even though I didn't do anything Can anyone help me to track this code or identify who is owner of this account in facebook. I attached the screenshot for your reference and Here's the code that I saw in the contact information of this person. Btw, I'm using IPhone 7 , Idk if this is only a glitch or not. **EIBTUHQ9AHSwSWDqeuw9N3J2dD7KpAcTKxBTZuk8M3LkDRao2HxOnjmGeRylF5RGYOOboRGtRVrDAG** I hope someone on this group will …

Member Avatar
+0 forum 2
Member Avatar

I would like to inform the people here on this site (Daniwebs) community know that my account here with Daniweb was not only accessed and found to have been accessed on the Darkweb, it was hacked. I have yet figured out exactly what they were using my account for, or to do while on my account yet and from where, what IP address or hopefully who. When I do figure this out, I will update as I make progress. A note to those that are quickly thinking "I must have used an unsecure password like password, 1234, admin, etc." well …

Member Avatar
+0 forum 8
Member Avatar

Hi I am talking GDPR and Data Protection Act 2018. Can an organisation in the UK have its sales staff wearing name tags/badges with the employees' full name displayed on them? Thanks

Member Avatar
+0 forum 2
Member Avatar

I download some music songs from a website. The website gets the requests from users and then it searches through WWW and lists you hundreds of URL that may have fulfilled your requests. I got what I want, but when I doubled clicks the music files, which are of RM format, a webpage immediately popped out. Do you think if the downloaded music files had been infected by spywares?

Member Avatar
+0 forum 1
Member Avatar

Hello friends, I am facing problem related to my email service. I just want to know that How do I recover my RoadRunner email password. If anyone have good knowledge about this. Then please share with me. Thank you

Member Avatar
+0 forum 2
Member Avatar

Hey, Currently, I'm running a startup venture developing mobile applications. Such applications and websites are considered to be amongst the cheapest and perhaps the most effective advertising tools for any business. The electronic systems used in our company operates with all kinds of sensitive and confidential data. The flawed data security puts all the clients at risk, and as a consequence also the future of the business. So, the data security is vital to our venture. I have decided to hire a professional firm providing IT security services Please help me find the right choice. Your suggestions will be highly …

Member Avatar
-2 forum 1
Member Avatar

Hello, One type of SQLIA is UNION Query and I still do not completely understand what is the point. SELECT Name, Address FROM Users WHERE Id=$id by injecting the following- Id value: $id=1 UNION ALL SELECT creditCardNumber,1 FROM CreditCarTable. We will have the following query: - SELECT Name, Address FROM Users WHERE Id=1 UNION ALL SELECT creditCardNumber, 1 FROM CreditCarTable What is the point of uniting the sqlia with another table which values are being kept secret? Are main point is to be able to login to the admin for example.

Member Avatar
+0 forum 4
Member Avatar

How to prevent Illegel/ Logically Incorrect Queries? Illegal/Logically Incorrect Queries 1)Original URL:http://www.arch.polimi.it/eventi/?id_nav=886 2)SQLInjection: http:/`/www.arch.polimi.it/eventi/?id_nav=8864' 3) Error message showed: SELECT name FROM Employee WHERE id =8864' from the message error we can find out name of table and fields: name; Employee; id. By the gained information attacker can arrange more strict attacks Should I hide the error message into 404 - Error instead of showing all of them? or is there any other method to prevent this?

Member Avatar
+0 forum 1
Member Avatar

Hello, I am trying to understand prepared statement and what it does. https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet#Defense_Option_1:_Prepared_Statements_.28Parameterized_Queries.29 "Prepared statements ensure that an attacker is not able to change the intent of a query, even if SQL commands are inserted by an attacker. In the safe example below, if an attacker were to enter the userID of tom' or '1'='1, the parameterized query would not be vulnerable and would instead look for a username which literally matched the entire string tom' or '1'='1. " If an attacker input: userID of tom' or '1'='1 what will prepared statement detect as a userID? userID: tom Is that …

Member Avatar
+0 forum 3
Member Avatar

I am inform every bady in bar codes

Member Avatar
+0 forum 2
Member Avatar

Hello, I am trying to prevent SQL Injection on Codeigniter. I am reading this link: https://www.roytuts.com/prevent-sql-injection-in-codeigniter/ I do not understand what is the purpose of Escaping Queries, Query Binding and Active Record. Thanks in advance.

Member Avatar
+0 forum 2
Member Avatar

Hello, I am planning to do my Thesis on SQLIA and now I am trying to understand something about SQLrand. SQLrand - a system for preventing SQLIA against web servers. The main intuition is that by using a randomized SQL query language, specific to a particular CGI application, it is possible to detect and abort queries that include injected code. Now, I do not understand how to randomized the SQL query language? https://www.w3schools.com/sql/func_sqlserver_rand.asp is that how you randomize the SELECT SQL command ? Please gives me some guidelines. Thanks in advance.

Member Avatar
+0 forum 3
Member Avatar

![Hello to all members! Actuall I have made an simple android app which just redirects its users to theri favorite brands' websites or online stores. I just downloaded free images of famous brands and added them in my app. When any user clicks on his favorite brand's image, app redirects the user to webiste or online store of that brand. The advantage of this app is that user would not need to search his favorite brand's website using browser, rather he can open my app and click on his favorit brand's image and will be redirected to official website or …

Member Avatar
+0 forum 1
Member Avatar

An SSL certificates are used to make your personal information protected, particularly when it comes to online transactions. It’s a mechanism that works between a user’s browser and the website the user is connecting to. In its software, the website has an SSL certificate issued by a trustworthy authority. Web browsers (i.e. Internet Explorer®, Firefox® and Chrome™) recognize these certificates. When confidential info needs to be exchanged, SSL is used to encrypt the information before it is sent, and then to decrypt it at the other end, when it has been received. This ensure that the website activity, from its …

Member Avatar
+0 forum 6
Member Avatar

Hello, I am in the middle of learning about IT Security. I wonder why sometimes people uses ASCII value for SQL injection attack? Do you know the reason why? Why not using normal ' mark.

Member Avatar
+0 forum 3
Member Avatar

I think the community in general will benefit from this discussion. I have an IT horror story I would like to tell everybody about. Additionally I have discovered some solutions to some IT problems, which may have been faced by others in the community. A few years ago I started going to college, and got wholluped by a gang of social engineers in the omaha/bellevue area. Unbenounced to me they were actually preforming skits on me in order to preform black mail attacks at a later date. Now you may believe that if you aren't doing anything wrong you should …

Member Avatar
+0 forum 3

The End.