1,400 Topics
![]() | |
Another day, another IE flaw! Just when you thought it was safe to go back in the Internet Explorer water (mainly as Microsoft told you it was after [URL="http://www.microsoft.com/technet/security/bulletin/MS10-002.mspx"]releasing[/URL] yet another [URL="http://www.itwire.com/content/view/24364/1231/"]patch[/URL] to fix yet another vulnerability) comes the news that actually, would you believe it, but Internet Explorer still … | |
Hello Everybody, I thought it'd be a great idea to share my code with people who s*ck with the same problem, maybe it'll help... :) It still needs security improovements, but since I'm not a Java guru, I'm a little slow with the solution... :) Any help would be appreciated! … | |
Hi everyone. Let me take this opportunity to introduce myself to this exclusive forum. I'm Ken Peterson and I have been in the Internet security company for 5 years. I am more than happy in sharing my knowledge with the Forum, and I hope that here you learn a lot. | |
Here's a little brain teaser for you all. A client wants a [B]secure[/B] members only area of thier website with username/password access control, however the sites web host does not support any form of server side scripting or htaccess and to complicate matters further the client will not or cannot … | |
Hello, I was reading web security stuffs and found that user can inject malicious codes mostly JS in forms. Now, What about CKFinder/TinyMCE et al? They obviously produce html and any stripping will destroy the article formatting. bad enough they have a "code mode" where user can enter html directly. … | |
I have been working on a library to interface with a USB-4704 data aquisition module for work. I have it working great, but the last thing that I need to do is add functionality to support updating a status variable when the device is plugged in or unplugged. I thought … | |
![]() | Hello everybody ;) I have written a kind of css (pre)-processor in PHP, and it uses the GET-method to acces to the file: HTML: [CODE]... <link rel="stylesheet" href="css.php?file=style.css" /> ...[/CODE] PHP: [CODE] ...$pss=file_get_contents("css/".$_GET["file"]); ...[/CODE] My problem is now, if a user types something like "css.php?file=../index.php", he gets the source codes … ![]() |
The network of South Korea's biggest bank Nonghyup broke down for 3 days after a suspected cyber attack, leaving tens of thousands of customers unable to access their money ,AFP reproted. I am in charge of a bank Internet department work which our side will be held responsible for all … | |
Everyone involved in the DaniWeb community, from the membership right through to the management, would like to offer sympathy and support to those suffering as a consequence of unfolding events in Japan. Unfortunately, some despicable types just see such tragedy as an opportunity to scam the kind-hearted majority out of … | |
I'm sorry. The correct URL for the demo upload is here: [url]http://demo.joomlatools.eu/[/url] I can't find the edit post button. Thanks, Rachel [QUOTE=msrache;1548777]Hi, This issue specifically has to do with the CMS Joomla, particularly the component Docman. Since the only available option I have for posting this was under the category … | |
some hackers are hacking my sites again and again can u tell me how to prevent those hackers from hacking my site...?? | |
Dear All, Please Help me, An E-mail was automatically sent to all contacts that were added in my accounts, That e-mail contain a malicious link inside it. I also received this e-mail on my yahoo account because my yahoo ID was also added in contacts of my AOL id, I … | |
Today as most of new windows are coming from Microsoft (Vista, Seven, etc) and Xp is going to be expire (in 2014). The main cause of ending of XP is "Low Security". Following are some Tricks to raise a little more security on your XP. [QUOTE]1. Immediately create a System … | |
In windows XP most of viruses spread through Autorun (Autorun.inf) Function in windows. It is better to Disable Autoruns in Xp. I am not sure about windows Vista but In WindowsSeven and above this feature is already blocked so you dont need to do anything. Ok Here are the Two … | |
![]() | Hey i was wondering if it would be possible to have this as a security measure. I am in the middle of creating an admin page for my website. I want them to register though. However to register, in one of the fields they must provide a secret number which … ![]() |
It's not just [URL="http://www.daniweb.com/news/story231517.html"]phishing scams[/URL] that Facebook users have to worry about right now, According to Roger Thompson, the Chief Research Officer with security vendor AVG, hacked Facebook applications are increasingly reaching out to exploit sites based in Russia. As Thompson says, this is different to the normal run of … | |
Hello I have a question: Suppose I own a site, and a domain, 'mysite.com'. I provide services to different clients, so clients open sub-domains under my site. For example, the site 'test.com' will be at my site, at 'mysite.com/test.com', so the clients of 'test.com' will enter this sub-domain. What I … | |
A new botnet has been discovered which is not only targeting users of UK banks, but doing so in a new and worrying manner. Said to comprise of in excess of 100,000 infected machines, the Zeus 2 botnet is operated and controlled from Eastern Europe according to [URL="http://www.trusteer.com/company-overview"]secure browsing security … | |
Im looking to find out what distinguishes content as unique content in Google's eyes. If I've got a web page selling different items, and want to separate these items onto different web pages so that i can have the exact keywords in the domain name, will Google frown upon this? … | |
The Maine State Bureau of Consumer Credit Protection reported today that it has received a query from an unnamed out-of-state finance company about placing Global Positioning System units into vehicles it finances or that its customers used as collateral, according to an [URL="http://www.bangordailynews.com/story/Statewide/GPS-data-intruding-on-privacy,151289"]article [/URL]in the [I]Bangor Daily News[/I]. Such GPSes … | |
So I have an Xbox 360 and it is NOT hacked in any way. I am a gamer but I do mostly PC gaming therefore I do not my Xbox for gaming much, at least not online. My xbox is used primarily as a Media Center extender and I love … | |
I have been trying to figure out how to build this library on Windows for damn near 6 hours, and I am at a complete loss. I have found a lot of answers on these forums before, so I joined up hoping someone might have some idea. The INSTALL file, … | |
My boss wants me to research weather or not someone can "tell on a company" with unethical seo tactics. Can people make reports to google, or other search engines? If a company creates multiple domains with like content etc... any input? | |
"It's unbelievable, the kind of data that's out there about you," Cisco's principal security strategist Patrick Gray told a crowd in Boise, Idaho, this morning. The problem is that criminal hackers can use that kind of information to target a company, Gray said. He described one case where criminals in … | |
Hi Look at your source and see if you can find <iframe> tags in it with a value of 1 that links to the search site. | |
Hi, guys! My project is to create a chat software in Java. For security i must use Digital signatures+ Java Postgre sql... How to do it? Steps, codes, references, etc... HELP ME! | |
For some reason I was looking for hackers to do some legal ethical hacking jobs.Someone recommended me this site <SNIP> they are hardcore hackers and I have heard good things about them,but the question is; how safe is to hire hackers?They will know everything about the network and it could … | |
![]() | Hi all. Not sure if this is the right forum, but it seemed the most appropriate from the list. I'm helping to develop a ghost-themed site. As it deals with an urban legend, we're pretty sure that kids will come across it, but don't want them to visit. There's really … ![]() |
22 Year old, Jon Lech Johansen who previously hacked DVD encryption in his teens has now hacked through the iPod copy protection. This copy protection stops iPod users from playing downloaded music from online music stores other than iTunes. This "copy protection" also stops music that has been bought off … | |
i'm doing a rpg for fun but this one function is giving me problems. it compiles without problems, but when i test it, the hp stats done change. this is the code for the function. [CODE=c]void attack(dragon *d1, dragon *d2) { if(d1->getdef() < d2->getatk()) { d1->changehp(- ( d2->getatk() - d1->getdef() … | |
Microsoft [URL="http://www.zdnet.co.uk/blogs/davey-winder-10015443/microsoft-staying-silent-over-security-patching-10015776/"]recently admitted[/URL], via the Director of it's Security Response Centre, that it doesn't report every Windows security vulnerability discovered and subsequently fixed via patches and updates. No big deal you might think, as long as the holes get fixed that's all that matter. I happen to agree, however that … | |
[ATTACH=RIGHT]16283[/ATTACH]An [URL="http://online.wsj.com/article/SB10001424052748703977004575393173432219064.html"]investigation by the Wall Street Journal[/URL] found that many of the largest websites in the U.S. are installing technologies on the computers of visitors - sometimes tracking them in over a hundred ways. The Journal examined the 50 most popular websites in the United States in order to see … | |
Want to know how to fix an election without resorting to bribery and corruption? Ever thought about throwing some Return Oriented Programming into the voting equation? Ordinarily, the hacking into of an electronic voting machine might spark a little bit of interest if there were an election looming perhaps. That … | |
Got any Suggestions? I'd like to delve deeper into the topic to bring my knowledge base up. This is what I've got so far: Hacking Exposed 6 (10th Anniversary Edition) by; McClure, Scambray, and Kurtz Hacking: The Art of Exploitation 2nd Edition by, Jon Erickson Steal This Computer Book 4.0 … | |
I will be starting school this upcoming week and I am wondering which way to go in the IT field.(Security or Networking) I know that graduation is long down the road but I want to make a sound decision that leads to future possiblities. Any recommendations? | |
hiiii.i need some gd ideas for my final yr project on networking/networking security.... | |
Have you ever thought about measuring the Internet in terms if malware per minute? Me neither, but someone has and it makes for uncomfortable reading if you are a Microsoft Windows user. [attach]17145[/attach]How fast is the Internet? It depends on the metric being used, of course, but one new report … | |
Recently I turned on my laptop and realized my taskbar changed by XP blue to gray with no special icons. The taskbar looks like a boring version of Windows 98. I tried everything and nothing's working. It was normal yesterday. I'm using Trend Micro Internet Security. I tried to click … | |
Hi!! I recently discovered that someone been hacking my wireless network. I do have WPA encryption and I think I now have locked him out. My question is; can he /she have gotten so far that they opened up my computer and searched my files? Or is the main purpose … | |
Hi all, I have designed an application in MS Access 2007 that will be used in some schools (over 60 schools). Each time I start the application, it shows an alert in the message bar that the VBA macros are disabled, and gives me the option to enable it for … | |
[B]how can i disable the save function. The database that I am making now is being shared by many users and i do not want them to mess up with my design and programming stuff that i had done. I have tried making the file into ACCDE format but it … | |
![]() | Hi, Recently, I've noticed on my home router (DLink DIR 635) a lot blocked connection attempts being logged to our Windows Vista machine - roughly one every 4-5 seconds. The destination port is always UDP 15126 but the source IP addresses come from a wide range of different sources - … |
Google Buzz has been the center of attention this week to anyone who has a Gmail account. I have to say that Google Buzz took me by complete surprise, so of course I wrote a blog anout how it is Google's new spam system. Well now I'm writing this article … | |
Hiii m final year b.tech student...i want some ideas for 1 yr. project on linux networking,networking and security.... | |
Source: [U][url]http://www.lost-password.net/products/passwordrecovery.html[/url][/U] Do you have a outlook e-mail? Microsoft Outlook 2010 offers premium business and personal e-mail management tools to more than 500 million Microsoft Office users worldwide. With the release of Outlook 2010, you get a richer set of experiences to meet your communication needs at work, home, and … | |
![]() | Hi, After completing a PHP website, with html, javascript and mysql connections - What can I do to ensure good security and what threats should I be aware of? Thanks, Ashton. ![]() |
With 2009 coming to an end, it's that time of year when security experts start predicting what the (very near) future will hold in terms of likely threat landscapes. One has bucked the trend of just picking on botnet growth and SEO poisoning, although both are on its list, and … | |
Fatal System Error, subtitled 'The Hunt for the New Crime Lords Who Are Bringing Down the Internet' is that rarest of finds: an IT security book that is not only informative and fascinating, but truly gripping from start to finish. This newly published made for Kindle edition is the cheapest … | |
Checking the SERP of my site against many of my target keywords and looking at the #1 position for each of them. In each case but one, it's a really ugly page with sub par information and then looking in Yahoo Site Explorer, it has tens of thousands or even … | |
An analysis of 100 million security software installations in 144 countries claims to have determined just where the most dangerous, places to access the Internet are. The results are surprising to say the least. [attach]16939[/attach]The results of [URL="http://www.avg.com"]AVG Technologies' first ever Global Threat Index[/URL] report were published yesterday, and concentrated … |
The End.