Let me share how I began to understand Microsoft: A long time back when I went to Microsoft Redmond's campus for a seminar. I had two things I wanted to share since I thought Microsoft would want to look into this. 1. A CD that when put into the PC would cause the PC to lock up. I didn't know why, I just thought it showed a bug. 2. A jpeg file that when copied to the desktop would render that user's account dead. Even in safe mode until the file was deleted. I waited my turn to meet with …

Member Avatar
Member Avatar
+0 forum 2

For those very new to this area, please google SIM SWAP and discover a very nasty security issue with all phones we use today. At first glance the new security researcher might think I'm exaggerating. Do your own research and tell me you don't find this to be one of the most foul, nasty exploits I've seen in years. This exploit was recently used to highjack a writer's phone at https://www.zdnet.com/article/sim-swap-horror-story-ive-lost-decades-of-data-and-google-wont-lift-a-finger/ His case is still developing with loss of accounts, tax returns he stored on the Clouds, and a 25,000USD Bitcoin purchase. And we're not talking thousands of dollars in …

Member Avatar
+0 forum 0

A survey of attendees at Infosecurity Europe earlier this month showed 70 percent in favour of the dictionary definition (in this case the Cambridge Dictionary) of a hacker being amended. The amendment in question being to remove 'illegality' from the definition. The current definition of a hacker is "a person who is skilled in the use of computer systems, often one who illegally obtains access to private computer systems". So what do you reckon, DaniWebbers? Is it time that hacker was reclaimed entirely (rather than relying upon black and white labels) and if so what word should replace it as …

Member Avatar
Member Avatar
+0 forum 8

Ok, So I sell some online services basically there is no need for my clients to put in their shipping address but paypal still asks for shipping address on the checkout page they are taken to from the payapl button. Is there a way to remove that option? I I'm sorry if I am asking this at the wrong place I am kind of a newbie here. Thanks

Member Avatar
Member Avatar
+0 forum 1

Hello guys, Recently my site was infected with malware, which caused me a lot of problems. In particular, many spam links have been created and indexed. I managed to get a lot out of them with Google search console, but it still appears in some key searches. Is there any chance of blocking the link prefix in robots.txt to deleting itself from google? <snip> I want somehow to block indexing all links I know i can block like this: User-agent: * Disallow: /product/categories But this one is different, its not like a parent page/category. I would appreciate very much if …

Member Avatar
Member Avatar
+0 forum 15

One of the mantras of computing and just about anything data related is "**We only lose what we don't backup**" but some are taking offense that this is still the current state of computing today. Recently some owners call this out as "blaming the user", "you're holding it wrong" or snobby. Everyone I know will try their best to help you get your machine back in working order even if people say such things. They've lost it all and upset that they can't get their stuff back. Last week's example was another smart phone, forgot their password, unlock code and …

Member Avatar
Member Avatar
+0 forum 1

The Conservative party issued a statement on Saturday which apologised for "any concern caused" and confirmed that "the technical issue has been resolved and the app is now functioning securely." However, not before Boris Johnson's profile image had been changed to a pornographic one and that of Environment Secretary, Michael Gove, swapped for a picture of Rupert Murdoch. Some ministers, and other MPs, apparently reported receiving nuisance calls following the app breach. The Information Commissioner's Office has confirmed that it is investigating the incident, and bite the Tories with a large fine. Under the EU General Data Protection Regulation (GDPR), …

Member Avatar
Member Avatar
-1 forum 1

Greetings everyone, I've been away from this forum for a long time, must be more than 10 years since my last post. That's how long I've been pretty much trouble free, as far as the Internet and data safety was concerned. Back then I was experimenting all too often with the free anti-spyware and anti-virus programs (Avast, AVG, etc.), getting in trouble in the process, as those freebies would often interfere with each other cause all sorts of headaches, mainly because those conflicts produced a breeding ground for some real nasty Internet threat. I can still remember the friendly atmosphere …

Member Avatar
Member Avatar
+1 forum 6

I've encountered an unknown user appear in my calls log and its had a 16mins airtime videocall to this person in messenger. I'm just suprised, it was appear in my call logs even though I didn't do anything Can anyone help me to track this code or identify who is owner of this account in facebook. I attached the screenshot for your reference and Here's the code that I saw in the contact information of this person. Btw, I'm using IPhone 7 , Idk if this is only a glitch or not. **EIBTUHQ9AHSwSWDqeuw9N3J2dD7KpAcTKxBTZuk8M3LkDRao2HxOnjmGeRylF5RGYOOboRGtRVrDAG** I hope someone on this group will …

Member Avatar
Member Avatar
+0 forum 2

I would like to inform the people here on this site (Daniwebs) community know that my account here with Daniweb was not only accessed and found to have been accessed on the Darkweb, it was hacked. I have yet figured out exactly what they were using my account for, or to do while on my account yet and from where, what IP address or hopefully who. When I do figure this out, I will update as I make progress. A note to those that are quickly thinking "I must have used an unsecure password like password, 1234, admin, etc." well …

Member Avatar
Member Avatar
+0 forum 8

Hi I am talking GDPR and Data Protection Act 2018. Can an organisation in the UK have its sales staff wearing name tags/badges with the employees' full name displayed on them? Thanks

Member Avatar
Member Avatar
+0 forum 2

I download some music songs from a website. The website gets the requests from users and then it searches through WWW and lists you hundreds of URL that may have fulfilled your requests. I got what I want, but when I doubled clicks the music files, which are of RM format, a webpage immediately popped out. Do you think if the downloaded music files had been infected by spywares?

Member Avatar
Member Avatar
+0 forum 1

Hello friends, I am facing problem related to my email service. I just want to know that How do I recover my RoadRunner email password. If anyone have good knowledge about this. Then please share with me. Thank you

Member Avatar
Member Avatar
+0 forum 2

Hey, Currently, I'm running a startup venture developing mobile applications. Such applications and websites are considered to be amongst the cheapest and perhaps the most effective advertising tools for any business. The electronic systems used in our company operates with all kinds of sensitive and confidential data. The flawed data security puts all the clients at risk, and as a consequence also the future of the business. So, the data security is vital to our venture. I have decided to hire a professional firm providing IT security services Please help me find the right choice. Your suggestions will be highly …

Member Avatar
Member Avatar
-2 forum 1

Hello, One type of SQLIA is UNION Query and I still do not completely understand what is the point. SELECT Name, Address FROM Users WHERE Id=$id by injecting the following- Id value: $id=1 UNION ALL SELECT creditCardNumber,1 FROM CreditCarTable. We will have the following query: - SELECT Name, Address FROM Users WHERE Id=1 UNION ALL SELECT creditCardNumber, 1 FROM CreditCarTable What is the point of uniting the sqlia with another table which values are being kept secret? Are main point is to be able to login to the admin for example.

Member Avatar
Member Avatar
+0 forum 4

How to prevent Illegel/ Logically Incorrect Queries? Illegal/Logically Incorrect Queries 1)Original URL:http://www.arch.polimi.it/eventi/?id_nav=886 2)SQLInjection: http:/`/www.arch.polimi.it/eventi/?id_nav=8864' 3) Error message showed: SELECT name FROM Employee WHERE id =8864' from the message error we can find out name of table and fields: name; Employee; id. By the gained information attacker can arrange more strict attacks Should I hide the error message into 404 - Error instead of showing all of them? or is there any other method to prevent this?

Member Avatar
Member Avatar
+0 forum 1

Hello, I am trying to understand prepared statement and what it does. https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet#Defense_Option_1:_Prepared_Statements_.28Parameterized_Queries.29 "Prepared statements ensure that an attacker is not able to change the intent of a query, even if SQL commands are inserted by an attacker. In the safe example below, if an attacker were to enter the userID of tom' or '1'='1, the parameterized query would not be vulnerable and would instead look for a username which literally matched the entire string tom' or '1'='1. " If an attacker input: userID of tom' or '1'='1 what will prepared statement detect as a userID? userID: tom Is that …

Member Avatar
Member Avatar
+0 forum 3

I am inform every bady in bar codes

Member Avatar
Member Avatar
+0 forum 2

Hello, I am trying to prevent SQL Injection on Codeigniter. I am reading this link: https://www.roytuts.com/prevent-sql-injection-in-codeigniter/ I do not understand what is the purpose of Escaping Queries, Query Binding and Active Record. Thanks in advance.

Member Avatar
Member Avatar
+0 forum 2

Hello, I am planning to do my Thesis on SQLIA and now I am trying to understand something about SQLrand. SQLrand - a system for preventing SQLIA against web servers. The main intuition is that by using a randomized SQL query language, specific to a particular CGI application, it is possible to detect and abort queries that include injected code. Now, I do not understand how to randomized the SQL query language? https://www.w3schools.com/sql/func_sqlserver_rand.asp is that how you randomize the SELECT SQL command ? Please gives me some guidelines. Thanks in advance.

Member Avatar
Member Avatar
+0 forum 3

![Hello to all members! Actuall I have made an simple android app which just redirects its users to theri favorite brands' websites or online stores. I just downloaded free images of famous brands and added them in my app. When any user clicks on his favorite brand's image, app redirects the user to webiste or online store of that brand. The advantage of this app is that user would not need to search his favorite brand's website using browser, rather he can open my app and click on his favorit brand's image and will be redirected to official website or …

Member Avatar
Member Avatar
+0 forum 1

An SSL certificates are used to make your personal information protected, particularly when it comes to online transactions. It’s a mechanism that works between a user’s browser and the website the user is connecting to. In its software, the website has an SSL certificate issued by a trustworthy authority. Web browsers (i.e. Internet Explorer®, Firefox® and Chrome™) recognize these certificates. When confidential info needs to be exchanged, SSL is used to encrypt the information before it is sent, and then to decrypt it at the other end, when it has been received. This ensure that the website activity, from its …

Member Avatar
Member Avatar
+0 forum 6

Hello, I am in the middle of learning about IT Security. I wonder why sometimes people uses ASCII value for SQL injection attack? Do you know the reason why? Why not using normal ' mark.

Member Avatar
Member Avatar
+0 forum 3

I think the community in general will benefit from this discussion. I have an IT horror story I would like to tell everybody about. Additionally I have discovered some solutions to some IT problems, which may have been faced by others in the community. A few years ago I started going to college, and got wholluped by a gang of social engineers in the omaha/bellevue area. Unbenounced to me they were actually preforming skits on me in order to preform black mail attacks at a later date. Now you may believe that if you aren't doing anything wrong you should …

Member Avatar
Member Avatar
+0 forum 3

In case you missed it Google has a serious problem with Symantec SSL certificates and is removing their Greenbar status in Chrome as well as rolling out "not trusted" notices for sites using mis-issued certs by Symantec. https://techcrunch.com/2017/03/27/google-is-fighting-with-symantec-over-encrypting-the-internet/ In response to the problems Namecheap is offering free replacement of the certificates - you get whatever time is left on your Symantec SSL certificate on a Comodo SSL for free. https://www.namecheap.com/security/symantec-ssl-certificate-free-replacement.aspx

Member Avatar
Member Avatar
+0 forum 3

what is SSL and HTTPS is there any major distance?

Member Avatar
Member Avatar
-1 forum 2

This is my 1st post on this Forum - Hello My Name is Michael and I'm from Poland :) I have a question about security in Internet. I'm active user of Internet and I have now some anxiety, maybe unjustified, but I have :( I'm logged in webbrowser on my Google (Gmail) account (sometimes Facebook) and in this time I use other websites: This is my Question: Is my activity on these websites (and names of these websites) saving somewhere on servers: google, facebook or others servers information about me? It worries me if in the future someone will be …

Member Avatar
Member Avatar
+0 forum 2

Tell me the best antivirus that protect my PC from malware issues and keep secure all the data that i have in my computer.

Member Avatar
Member Avatar
+0 forum 43

HELP!! I have a windows server 2012 r2 . I can still use my server until i fell asleep and now woke up, And can't log in to my administrator account. I didn't change password at all, i use the same password and i'd make sure that it is correct. But still not working. Only i can access the guest account. I research and tried some tutorials but not working. I don't have installation CD and my physical back is already affected by AMNESIA file, can't copy because it needs admin rights. I found out that all of my files …

Member Avatar
Member Avatar
+0 forum 26

Hi. I'm concerned an ex has installed spy software on my computer (and maybe iPhone, but that's for another thread). I've spent days reading about it and I'm not really any closer to figuring out if this is the case, and if so how to uninstall it. Any help would be much appreciated!

Member Avatar
Member Avatar
+0 forum 1

The End.