1,400 Topics

Member Avatar for
Member Avatar for happygeek

Using newly registered domains with a very short lifespan to host malware websites is so last year. It would appear that these days such things are far more likely to be hosted on much older compromised web sites instead. Could this be down to a decline in domain tasting? The …

Member Avatar for Azmah
1
643
Member Avatar for davy_yg

contact_us.php [CODE] <form action="contact.php" method="POST"> <table border="0" cellpadding="2"> <tr> <td>Name : </td> <td><input name="nama" type="text" value="" size="30" /></td> </tr> <tr> <td>E-mail: </td> <td><input name="email" type="text" value="" size="20" /></td> </tr> <tr> <td>Your message : </td> <td><textarea name="comments" cols=30 rows=6></textarea></td> </tr> <tr> <td></td> <td><input name="send message" type="button" value="send message" /> </table> </form> …

Member Avatar for Stefano Mtangoo
0
140
Member Avatar for 650U

I'm currently working on a project where I need to Authenticate the Client using his/her certificate. I have created my own CA, Server and Client certificates and imported them into my browser. Then I wrote a JSP code just to read the certificate. That is the program returns the commonname, …

0
94
Member Avatar for ShadyTyrant

I have a theory about the design of a new site I am working on. If a user accounts table is in one database, and the site content tables in another database, then it would be impossible for a hacker to use SQL injections in a form unrelated to the …

Member Avatar for joehms22
0
142
Member Avatar for mementomori

Two applications, two different problems. Both of these applications worked perfectly in the test environment with SSL authentication turned off. Now that we've moved to a live environment, the applications can no longer connect to the client company's ActiveMQ messaging queue. using dlls from Spring.Net version 1.3.1. Connection string uses …

Member Avatar for mementomori
0
2K
Member Avatar for itsols

I should be actually asking this via a Google+ post but I haven't joined yet and therefore cannot post it. I hope someone here can answer it. Before joining, Google indicates that we are responsible for the loss of our 'data'. Now, the only important data I have on google …

Member Avatar for Coloradojaguar
0
198
Member Avatar for Stefano Mtangoo

Hi, I have DAL class and I have done Query Parametrization to avoid SQL injection. As you can see the weakpoing for Dynamic Query is table_name and column name. I have made small function to (hopefully) validate table variable before I can add to SQL command string. Now I was …

Member Avatar for Stefano Mtangoo
0
199
Member Avatar for happygeek

Anyone who uses Twitter, and has at some point posted a link to something interesting, will have almost certainly used a URL-shortening service such as bit.ly for example. Now the spammers are exploiting the popularity of such link-reduction services by establishing their own fake URL-shortening services in order to redirect …

Member Avatar for sufalamtech
2
496
Member Avatar for happygeek

The trouble with Kensington lock systems for laptops in the past was that they were fiddly to actually use, which is why the company took a step back and redesigned the process by introducing the new ClickSafe system. This still utilises the same Kensington lock slot that appears on everything …

0
576
Member Avatar for dw_user

Think about an antivirus software with an 1-pc license. After installation , while the user tries to upgrade it, the software recognizes that the pc rying to upgrade the antivirus is the one that bought the license so that the software when installed on another pc with the same serial …

Member Avatar for dw_user
0
215
Member Avatar for TrustyTony

Here is capital letter style caesar crypted message. We can simply try all possible shifts for first few words (ignoring punctuations, which is left as is). If both first words succeed we assume we cracked it. You could also use Vigenère encryption, but keeping non-letters is less simple, our Vigenère …

Member Avatar for TrustyTony
1
937
Member Avatar for aravind326

Hi, We are using AD 2003 server x64. Created new certificate, exported it into a file and using a simple LDAP Browser or a java code when we try to bind through SSL it fails and we are getting an error called SSL handshake failed: Simple bind failed. Please help …

0
154
Member Avatar for happygeek

[ATTACH=RIGHT]22151[/ATTACH]It would appear that a Florida bank has been the victim of a $13 million ATM heist, but just how did the cyber-robbers pull it off? Although the security breach which led to the ATM fraud itself seems to have taken place in March, and was disclosed in the first …

Member Avatar for Lightninghawk
4
1K
Member Avatar for happygeek

Facebook users have been making a lot of use of the new 'like' feature which allows users to link to webpages that they, well, like funnily enough. Not so funny when Facebook users are claiming to like a site called "101 Hottest Women in the World" which features an image …

Member Avatar for rocco88
0
480
Member Avatar for tajendra

Working with dll i got into a situation where loading a dll can cause security threat. lets say for example when you load a DLL, it gets same access privilege as the calling process. So if calling process is running with Admin privilege the loaded dll gets the elevated privilege …

Member Avatar for vijayan121
0
154
Member Avatar for java_sabin

hi, I'm the student of network and IT security and i need to have my final year major project that holds the double credit. can you help me getting the topics. these are the modules i have in final year: Wide Area Networks E-commerce Applications Fundamentals of Security Management Fundamentals …

Member Avatar for suley04
0
1K
Member Avatar for megansims07

I'm attempting to create a program where the login and password will be verified on an SQL database of user information. I keep getting the error "SQL Execution was unhandled" I marked the code that was causing the error in red. I'm using Visual Studio 8. Keep in mind I …

0
117
Member Avatar for railrover

Hi all, I'm having problems getting my mobile device (Windows Mobile 6.1) to see my VB.NET application as genuine. Here are the steps I am taking - can anybody see why there is a problem? I use makecert.exe to create a new root certificate.... makecert -n "CN=McLernonsMARS" -r -sv McLernonsMARS.pvk …

Member Avatar for railrover
0
187
Member Avatar for Lisa Hoover

Although Mozilla's Firefox and Google's Chrome browsers get a lot of attention in the media, Apple's Safari browser is not too shabby in comparison. The one thing it unfortunately lacks is robust security. Given that so much computer activity revolves around the browser these days, security is the last place …

Member Avatar for rockyrat12
0
338
Member Avatar for Tomashqooo

Hi everybody, can someone help me pls finding a goot RATing tutorial for a beginner??? I wanna code a rat in python but i have no sources.

Member Avatar for JoshuaBurleson
-2
153
Member Avatar for MoZo1

This prints NULL: [CODE=Java]String sss = System.getSecurityManager() == null ? "NULL" : System.getSecurityManager().getClass().getName(); System.out.println(sss);[/CODE] And this throws exception: [CODE]ServerSocket serversocket = new ServerSocket(80);[/CODE] This one: [CODE]Exception in thread "main" java.lang.Error: java.net.BindException: Permission denied at httpserver.HTTPServer.main(HTTPServer.java:68) Caused by: java.net.BindException: Permission denied at java.net.PlainSocketImpl.socketBind(Native Method) at java.net.PlainSocketImpl.bind(PlainSocketImpl.java:383) at java.net.ServerSocket.bind(ServerSocket.java:328) at java.net.ServerSocket.<init>(ServerSocket.java:194) at …

Member Avatar for MoZo1
0
425
Member Avatar for slfisher

An Internet Service Provider (ISP) has finally been given permission to reveal that he was the recipient of an National Security Letter (NSL) from the Federal Bureau of Investigation (FBI) six years ago, demanding information about his clients. Nicholas Merrill, president of the New York ISP Calyx, still can’t say …

Member Avatar for glitchmind
0
958
Member Avatar for happygeek

[ATTACH=RIGHT]22256[/ATTACH]England just scraped to a hard fought win against a physical and enthusiastic Argentina side in their opening match of the 2011 Rugby World Cup campaign in New Zealand. But while sports fans the world over get excited about how their country is performing in the initial pool group matches, …

Member Avatar for ChrisHunter
0
457
Member Avatar for happygeek

Last year saw the overall volume of email delivered spam drop for the first, which has to be good news. Or it would be were it not for the fact that spammers have not gone away, they have merely moved with the times and adapted their business so as to …

Member Avatar for data-struction
2
721
Member Avatar for hackit

guys i just read a vulnerability in the calculator of windows. vulnerability is like this: *) open calculator *) type 4 and then take its square *) then minus two from the result shocked.... answer should be 0 but it shows a different answer.. please help me on this.

Member Avatar for Reverend Jim
0
184
Member Avatar for hackit

hello guys. i am a student of B.Tech with Computer Science branch. i want to make my career in programming and security testing. I found this site very good. In it all the problems are solved easily and very fast. Guys help me if you any suggestions to give me …

Member Avatar for jingda
0
122
Member Avatar for happygeek

Having a professional interest in security, and a personal distrust of politicians and their promises of providing the same, I was not at all surprised by the findings of a [URL="http://www.bbc.co.uk/pressoffice/pressreleases/stories/2007/03_march/23/keylogger.shtml"]BBC TV investigation[/URL] that has just been broadcast in the UK. Inside Out, a news reporting and investigative documentary series …

Member Avatar for Denmbithi
0
1K
Member Avatar for sathya88

how to use messagedeigest class to bring security to a file...encode and decode a file... any suggestion ?????

Member Avatar for JamesCherrill
0
115
Member Avatar for ofir0803

Hi We have a lot of fan pages in facebook and Each page has its own subdomain for example: [url]http://page1.mysite.com/1.php[/url] [url]http://page2.mysite.com/2.php[/url] [url]http://page3.mysite.com/3.php[/url] "1 SSL will cover one domain and any sub-directories which you install;- but it will not cover sub-domains, each sub-domain would also require its own SSL" from october …

0
118
Member Avatar for Upoma

I am developing a desktop based software in Java using IDE Netbeans 7 and database MySQL. Now i want to distribute this software and protect it from piracy.I want to implement online licence verification.That means when user will install the software a number based on hardware configuration will be sent …

Member Avatar for hfx642
0
739
Member Avatar for TeddyBear2155

Has anyone dealt with this on their website. I am webmaster for an informational site but am becoming inadated with DDos attacks as many as 250,000 a day which I have never heard of before. Any suggestions on what to do? Please any and all help is needed!

Member Avatar for jingda
0
129
Member Avatar for Techwriter10

Last week, Google's [URL="http://www.google.com/corporate/execs.html#marissa"]Marissa Mayer [/URL]and [URL="http://www.google.com/corporate/execs.html#eric"]Eric Schmidt [/URL]appeared in separate interviews on the [URL="http://www.charlierose.com/view/interview/10129"]Charlie Rose [/URL]show, and not surprisingly they spoke in one voice where privacy and trust were concerned. They both said that when we use online services, we give up privacy in the process. There it is …

Member Avatar for Emma Johns
0
334
Member Avatar for bd338

Hello software developers :) I've decided to try and "crack" a (very simple) program I've written myself, just for the sake of it. Here's the code: [CODE] #include <stdio.h> const int serialCode = 255; int guess; int main() { printf("Please enter your serial code: "); scanf("%d", &guess); if(guess == serialCode) …

Member Avatar for Narue
-1
615
Member Avatar for manish250

Hi all i am new to web service.I am getting this exception on my server which is RHEL 5.5 [B]error Failed to access the WSDL at: [url]https://172.30.17.141:5010/SecureWebService/ActiveCampaignDetailsSecure?wsdl[/url]. It failed with: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target. [/B] I have imported the …

Member Avatar for manish250
0
249
Member Avatar for happygeek

[ATTACH=RIGHT]21852[/ATTACH]The Sun is the biggest selling newspaper in the UK, and famous for some truly scything political headlines over the years. Today the Rupert Murdoch owned red top tabloid finds itself on the wrong side of the headline writing tracks after it admitted that reader data may be at risk …

Member Avatar for happygeek
0
404
Member Avatar for happygeek

[ATTACH=RIGHT]21767[/ATTACH]An unnamed Asian company operating within what has been described as a 'high risk e-commerce industry' has been targeted by a botnet which launched a DDoS attack of unprecedented magnitude. According to Distributed Denial of Service mitigation experts Prolexic, which claims to have successfully combated the attack, the volume of …

Member Avatar for ownstlucia
0
436
Member Avatar for happygeek

[ATTACH=right]21447[/ATTACH]Penetration testing by the US Department of Homeland Security which involved dropping USB thumb drives and various data discs around the car parks of government agency buildings has revealed a not-so-shocking truth: just like most folk, government workers allow curiosity to trump security when faced with the opportunity to have …

Member Avatar for Netcode
2
1K
Member Avatar for happygeek

[ATTACH=RIGHT]21548[/ATTACH]Earlier this week a hacker group called Dev-Team launched a revamped website service that enables owners of the iPhone 4 and iPad 2 (amongst a myriad other iOS-powered devices) to jailbreak them in next to no time, for free, online. The [URL="http://blog.iphone-dev.org/post/890709355/the-return-of-jailbreakme-com"]JailBreakMe site exploits a vulnerability[/URL] with the way that …

Member Avatar for swebsitedesign
1
442
Member Avatar for exchequer598

Hey everyone! Users of Microsoft Security Essentials know that the right-click menu item that says "Scan with Microsoft Security Essentials.." is just too long. How do I customize it? I figured out that the file shellext.dll that comes with MSE is responsible for the context menu. I opened it with …

Member Avatar for CLN
0
238
Member Avatar for manish250

hi all, i have developed a web service(https based) client which is running on my 4 servers.i am facing a issue on a server like this. javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target while client on all other 3 server is …

0
162
Member Avatar for ppetree

Hi All! I'm apparently doing something very wrong here... I can't get my soap client to send the security certificate which a valid .pem file and because of that the subsequent calls are failing. What do I have to do to get the soap client to send the pem file? …

Member Avatar for ppetree
0
3K
Member Avatar for happygeek

[ATTACH=RIGHT]21680[/ATTACH]The British website for pop sensation Lady Gaga has been hacked, it's official. The website was targeted by the US SwagSec hacking group it would appear, a group which has a track record (if you'll excuse the pun) of hacking the official websites of pop stars having already hit Justin …

Member Avatar for Netcode
2
562
Member Avatar for Stefano Mtangoo

Hi, I'm becoming more paranoid of security issues (Not Insane anyway :)) and would like to ask you guys what do you do to prevent SQL injection apart from using parametrized query and data validation. Thanks

Member Avatar for Stefano Mtangoo
0
125
Member Avatar for newsguy

IT Week [URL="http://www.itweek.co.uk/itweek/news/2214006/firms-left-behind-criminals"]reports[/URL] that business is just too slow to respond to cyber-criminals, and as a result the hackers are simply worried about their ability to prevent them breaking in. The article quotes Dan Hubbard, the Vice President of Security Research at Websense as saying that from a purely technological …

Member Avatar for Tr0y
0
352
Member Avatar for rolfg

Installed Wordpress Multisite on Windows server 2008R2 and seems to be working fine EXCEPT: the update feature in WP fails or anytime when it tries to install something for you. I set up a valid / working FTP account as it sometimes asks for this, but that does not work …

Member Avatar for lasitha2005d
0
287
Member Avatar for MktgRob

Not really certain if this is the proper forum for this but can anyone explain what URL Harvesting is? I am asking because while reviewing the google analytics/referring sites info for my company's website I saw referral traffic from a site called trafficfaker.com. Any insight would be welcome. Thank you.

Member Avatar for MktgRob
0
180
Member Avatar for KenPeterson

HI friends, I am ken and i want to know something from your side. my friend copy images from orkut accountant of other user. Is this possible to copy image from facebook or orkut of other user a/c without login?

Member Avatar for somrita
0
174
Member Avatar for happygeek

According to reports, the [URL="http://www.telegraph.co.uk/news/worldnews/northamerica/usa/8578704/CIA-website-hacked-by-Lulz-Security.html"]LulzSec hacking group has claimed responsibility[/URL] for a denial of service hack attack on the cia.gov website resulting in it being inaccessible for a while late yesterday. [attach]21307[/attach] LulzSec appears to have taken up the baton of high profile hacking from the Anonymous group in recent …

Member Avatar for jingda
1
629
Member Avatar for happygeek

It's one of the more bizarre questions I have been asked during my twenty year involvement in the computer security business. Yet here I am, pondering whether something being called the Shrek virus could have enabled tens of thousands of butt ugly lonely people to bypass the attractiveness filtering of …

Member Avatar for manxe
0
444
Member Avatar for GuyClapperton

It's very interesting to read that the Playstation 3 [URL="http://news.bbc.co.uk/1/hi/technology/8478764.stm"]might at last have been hacked[/URL] by the same man who 'jailbroke' the iPhone for the first time. Interesting but not all that much use. I mean, who wants a hacked PS3 anyway? The report to which I've linked says there …

Member Avatar for skatamatic
0
348

The End.