1,400 Topics
![]() | |
Using newly registered domains with a very short lifespan to host malware websites is so last year. It would appear that these days such things are far more likely to be hosted on much older compromised web sites instead. Could this be down to a decline in domain tasting? The … | |
contact_us.php [CODE] <form action="contact.php" method="POST"> <table border="0" cellpadding="2"> <tr> <td>Name : </td> <td><input name="nama" type="text" value="" size="30" /></td> </tr> <tr> <td>E-mail: </td> <td><input name="email" type="text" value="" size="20" /></td> </tr> <tr> <td>Your message : </td> <td><textarea name="comments" cols=30 rows=6></textarea></td> </tr> <tr> <td></td> <td><input name="send message" type="button" value="send message" /> </table> </form> … | |
I'm currently working on a project where I need to Authenticate the Client using his/her certificate. I have created my own CA, Server and Client certificates and imported them into my browser. Then I wrote a JSP code just to read the certificate. That is the program returns the commonname, … | |
I have a theory about the design of a new site I am working on. If a user accounts table is in one database, and the site content tables in another database, then it would be impossible for a hacker to use SQL injections in a form unrelated to the … | |
Two applications, two different problems. Both of these applications worked perfectly in the test environment with SSL authentication turned off. Now that we've moved to a live environment, the applications can no longer connect to the client company's ActiveMQ messaging queue. using dlls from Spring.Net version 1.3.1. Connection string uses … | |
I should be actually asking this via a Google+ post but I haven't joined yet and therefore cannot post it. I hope someone here can answer it. Before joining, Google indicates that we are responsible for the loss of our 'data'. Now, the only important data I have on google … | |
Hi, I have DAL class and I have done Query Parametrization to avoid SQL injection. As you can see the weakpoing for Dynamic Query is table_name and column name. I have made small function to (hopefully) validate table variable before I can add to SQL command string. Now I was … | |
Anyone who uses Twitter, and has at some point posted a link to something interesting, will have almost certainly used a URL-shortening service such as bit.ly for example. Now the spammers are exploiting the popularity of such link-reduction services by establishing their own fake URL-shortening services in order to redirect … | |
The trouble with Kensington lock systems for laptops in the past was that they were fiddly to actually use, which is why the company took a step back and redesigned the process by introducing the new ClickSafe system. This still utilises the same Kensington lock slot that appears on everything … | |
Think about an antivirus software with an 1-pc license. After installation , while the user tries to upgrade it, the software recognizes that the pc rying to upgrade the antivirus is the one that bought the license so that the software when installed on another pc with the same serial … | |
Here is capital letter style caesar crypted message. We can simply try all possible shifts for first few words (ignoring punctuations, which is left as is). If both first words succeed we assume we cracked it. You could also use Vigenère encryption, but keeping non-letters is less simple, our Vigenère … | |
Hi, We are using AD 2003 server x64. Created new certificate, exported it into a file and using a simple LDAP Browser or a java code when we try to bind through SSL it fails and we are getting an error called SSL handshake failed: Simple bind failed. Please help … | |
[ATTACH=RIGHT]22151[/ATTACH]It would appear that a Florida bank has been the victim of a $13 million ATM heist, but just how did the cyber-robbers pull it off? Although the security breach which led to the ATM fraud itself seems to have taken place in March, and was disclosed in the first … | |
Facebook users have been making a lot of use of the new 'like' feature which allows users to link to webpages that they, well, like funnily enough. Not so funny when Facebook users are claiming to like a site called "101 Hottest Women in the World" which features an image … | |
Working with dll i got into a situation where loading a dll can cause security threat. lets say for example when you load a DLL, it gets same access privilege as the calling process. So if calling process is running with Admin privilege the loaded dll gets the elevated privilege … | |
hi, I'm the student of network and IT security and i need to have my final year major project that holds the double credit. can you help me getting the topics. these are the modules i have in final year: Wide Area Networks E-commerce Applications Fundamentals of Security Management Fundamentals … | |
I'm attempting to create a program where the login and password will be verified on an SQL database of user information. I keep getting the error "SQL Execution was unhandled" I marked the code that was causing the error in red. I'm using Visual Studio 8. Keep in mind I … | |
Hi all, I'm having problems getting my mobile device (Windows Mobile 6.1) to see my VB.NET application as genuine. Here are the steps I am taking - can anybody see why there is a problem? I use makecert.exe to create a new root certificate.... makecert -n "CN=McLernonsMARS" -r -sv McLernonsMARS.pvk … | |
Although Mozilla's Firefox and Google's Chrome browsers get a lot of attention in the media, Apple's Safari browser is not too shabby in comparison. The one thing it unfortunately lacks is robust security. Given that so much computer activity revolves around the browser these days, security is the last place … | |
Hi everybody, can someone help me pls finding a goot RATing tutorial for a beginner??? I wanna code a rat in python but i have no sources. | |
This prints NULL: [CODE=Java]String sss = System.getSecurityManager() == null ? "NULL" : System.getSecurityManager().getClass().getName(); System.out.println(sss);[/CODE] And this throws exception: [CODE]ServerSocket serversocket = new ServerSocket(80);[/CODE] This one: [CODE]Exception in thread "main" java.lang.Error: java.net.BindException: Permission denied at httpserver.HTTPServer.main(HTTPServer.java:68) Caused by: java.net.BindException: Permission denied at java.net.PlainSocketImpl.socketBind(Native Method) at java.net.PlainSocketImpl.bind(PlainSocketImpl.java:383) at java.net.ServerSocket.bind(ServerSocket.java:328) at java.net.ServerSocket.<init>(ServerSocket.java:194) at … | |
An Internet Service Provider (ISP) has finally been given permission to reveal that he was the recipient of an National Security Letter (NSL) from the Federal Bureau of Investigation (FBI) six years ago, demanding information about his clients. Nicholas Merrill, president of the New York ISP Calyx, still can’t say … | |
[ATTACH=RIGHT]22256[/ATTACH]England just scraped to a hard fought win against a physical and enthusiastic Argentina side in their opening match of the 2011 Rugby World Cup campaign in New Zealand. But while sports fans the world over get excited about how their country is performing in the initial pool group matches, … | |
Last year saw the overall volume of email delivered spam drop for the first, which has to be good news. Or it would be were it not for the fact that spammers have not gone away, they have merely moved with the times and adapted their business so as to … | |
guys i just read a vulnerability in the calculator of windows. vulnerability is like this: *) open calculator *) type 4 and then take its square *) then minus two from the result shocked.... answer should be 0 but it shows a different answer.. please help me on this. | |
hello guys. i am a student of B.Tech with Computer Science branch. i want to make my career in programming and security testing. I found this site very good. In it all the problems are solved easily and very fast. Guys help me if you any suggestions to give me … | |
Having a professional interest in security, and a personal distrust of politicians and their promises of providing the same, I was not at all surprised by the findings of a [URL="http://www.bbc.co.uk/pressoffice/pressreleases/stories/2007/03_march/23/keylogger.shtml"]BBC TV investigation[/URL] that has just been broadcast in the UK. Inside Out, a news reporting and investigative documentary series … | |
how to use messagedeigest class to bring security to a file...encode and decode a file... any suggestion ????? | |
Hi We have a lot of fan pages in facebook and Each page has its own subdomain for example: [url]http://page1.mysite.com/1.php[/url] [url]http://page2.mysite.com/2.php[/url] [url]http://page3.mysite.com/3.php[/url] "1 SSL will cover one domain and any sub-directories which you install;- but it will not cover sub-domains, each sub-domain would also require its own SSL" from october … | |
I am developing a desktop based software in Java using IDE Netbeans 7 and database MySQL. Now i want to distribute this software and protect it from piracy.I want to implement online licence verification.That means when user will install the software a number based on hardware configuration will be sent … ![]() | |
Has anyone dealt with this on their website. I am webmaster for an informational site but am becoming inadated with DDos attacks as many as 250,000 a day which I have never heard of before. Any suggestions on what to do? Please any and all help is needed! | |
Last week, Google's [URL="http://www.google.com/corporate/execs.html#marissa"]Marissa Mayer [/URL]and [URL="http://www.google.com/corporate/execs.html#eric"]Eric Schmidt [/URL]appeared in separate interviews on the [URL="http://www.charlierose.com/view/interview/10129"]Charlie Rose [/URL]show, and not surprisingly they spoke in one voice where privacy and trust were concerned. They both said that when we use online services, we give up privacy in the process. There it is … | |
Hello software developers :) I've decided to try and "crack" a (very simple) program I've written myself, just for the sake of it. Here's the code: [CODE] #include <stdio.h> const int serialCode = 255; int guess; int main() { printf("Please enter your serial code: "); scanf("%d", &guess); if(guess == serialCode) … | |
Hi all i am new to web service.I am getting this exception on my server which is RHEL 5.5 [B]error Failed to access the WSDL at: [url]https://172.30.17.141:5010/SecureWebService/ActiveCampaignDetailsSecure?wsdl[/url]. It failed with: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target. [/B] I have imported the … | |
[ATTACH=RIGHT]21852[/ATTACH]The Sun is the biggest selling newspaper in the UK, and famous for some truly scything political headlines over the years. Today the Rupert Murdoch owned red top tabloid finds itself on the wrong side of the headline writing tracks after it admitted that reader data may be at risk … | |
[ATTACH=RIGHT]21767[/ATTACH]An unnamed Asian company operating within what has been described as a 'high risk e-commerce industry' has been targeted by a botnet which launched a DDoS attack of unprecedented magnitude. According to Distributed Denial of Service mitigation experts Prolexic, which claims to have successfully combated the attack, the volume of … | |
[ATTACH=right]21447[/ATTACH]Penetration testing by the US Department of Homeland Security which involved dropping USB thumb drives and various data discs around the car parks of government agency buildings has revealed a not-so-shocking truth: just like most folk, government workers allow curiosity to trump security when faced with the opportunity to have … | |
[ATTACH=RIGHT]21548[/ATTACH]Earlier this week a hacker group called Dev-Team launched a revamped website service that enables owners of the iPhone 4 and iPad 2 (amongst a myriad other iOS-powered devices) to jailbreak them in next to no time, for free, online. The [URL="http://blog.iphone-dev.org/post/890709355/the-return-of-jailbreakme-com"]JailBreakMe site exploits a vulnerability[/URL] with the way that … | |
Hey everyone! Users of Microsoft Security Essentials know that the right-click menu item that says "Scan with Microsoft Security Essentials.." is just too long. How do I customize it? I figured out that the file shellext.dll that comes with MSE is responsible for the context menu. I opened it with … | |
hi all, i have developed a web service(https based) client which is running on my 4 servers.i am facing a issue on a server like this. javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target while client on all other 3 server is … | |
Hi All! I'm apparently doing something very wrong here... I can't get my soap client to send the security certificate which a valid .pem file and because of that the subsequent calls are failing. What do I have to do to get the soap client to send the pem file? … | |
[ATTACH=RIGHT]21680[/ATTACH]The British website for pop sensation Lady Gaga has been hacked, it's official. The website was targeted by the US SwagSec hacking group it would appear, a group which has a track record (if you'll excuse the pun) of hacking the official websites of pop stars having already hit Justin … | |
Hi, I'm becoming more paranoid of security issues (Not Insane anyway :)) and would like to ask you guys what do you do to prevent SQL injection apart from using parametrized query and data validation. Thanks | |
IT Week [URL="http://www.itweek.co.uk/itweek/news/2214006/firms-left-behind-criminals"]reports[/URL] that business is just too slow to respond to cyber-criminals, and as a result the hackers are simply worried about their ability to prevent them breaking in. The article quotes Dan Hubbard, the Vice President of Security Research at Websense as saying that from a purely technological … | |
Installed Wordpress Multisite on Windows server 2008R2 and seems to be working fine EXCEPT: the update feature in WP fails or anytime when it tries to install something for you. I set up a valid / working FTP account as it sometimes asks for this, but that does not work … | |
Not really certain if this is the proper forum for this but can anyone explain what URL Harvesting is? I am asking because while reviewing the google analytics/referring sites info for my company's website I saw referral traffic from a site called trafficfaker.com. Any insight would be welcome. Thank you. | |
HI friends, I am ken and i want to know something from your side. my friend copy images from orkut accountant of other user. Is this possible to copy image from facebook or orkut of other user a/c without login? | |
According to reports, the [URL="http://www.telegraph.co.uk/news/worldnews/northamerica/usa/8578704/CIA-website-hacked-by-Lulz-Security.html"]LulzSec hacking group has claimed responsibility[/URL] for a denial of service hack attack on the cia.gov website resulting in it being inaccessible for a while late yesterday. [attach]21307[/attach] LulzSec appears to have taken up the baton of high profile hacking from the Anonymous group in recent … | |
It's one of the more bizarre questions I have been asked during my twenty year involvement in the computer security business. Yet here I am, pondering whether something being called the Shrek virus could have enabled tens of thousands of butt ugly lonely people to bypass the attractiveness filtering of … | |
It's very interesting to read that the Playstation 3 [URL="http://news.bbc.co.uk/1/hi/technology/8478764.stm"]might at last have been hacked[/URL] by the same man who 'jailbroke' the iPhone for the first time. Interesting but not all that much use. I mean, who wants a hacked PS3 anyway? The report to which I've linked says there … |
The End.