1,400 Topics

Member Avatar for
Member Avatar for P0lT10n

Hello people. I was reading severals scripts, and I saw, all the time, that they used %s... What is the application of that ??? Becuase I'm searching about that and I don't find anything about it ! I know that it's about injection codes... Can anyone give me a web …

Member Avatar for mschroeder
0
139
Member Avatar for Borzoi

I am planning to start up a new business soon and part of it is selling online. I was planning on using PayPal in the early days to handle the payments until we can afford good enough security so that we can hold data such as credit card information ourselves. …

Member Avatar for Borzoi
0
216
Member Avatar for burningflower

Hello peeps, I am currently doing a project on a system that handles online coursework submission. The project has some items there but i wanted to add more features such as security. Thereby, I am going to have to make a survey in order to get responses. So I want …

Member Avatar for burningflower
0
135
Member Avatar for babaidebnath

I want to give my application data folder kaspersky antivirus like security. Where I can add a folder but cant change any content or create any file. I even gave the current user full control security privilege but it just does not working only for this kaspersky data folder. I …

Member Avatar for kvprajapati
0
179
Member Avatar for newsguy

According to the 2009 Web Application Security Report from NTA Monitor, 90% of all web applications have at least one medium risk vulnerability and 27% have at least one high risk vulnerability. Apparently the most common vulnerabilities are those which involve SQL injection, cross-site scripting and cross-request forgery. One data …

Member Avatar for ashumiloff
2
614
Member Avatar for happygeek

Many of the biggest forum-based online communities, including DaniWeb, are powered by vBulletin software. So it came as something of a shock when the BBC reported that a [URL="http://www.bbc.co.uk/news/technology-10714192"]vBulletin security flaw means that any hacker could "easily access the main administrator username and password for a site"[/URL]. But is the …

Member Avatar for Bruce100
1
612
Member Avatar for slfisher

Along [URL="http://en.wikipedia.org/wiki/List_of_commemorative_months"]with [/URL]Vegetarian Awareness, Toilet Tank Repair, and Pet Wellness, October is National Cyber Security Awareness Month. Who knew. "The National Cyber Security Alliance, along with the U.S. Department of Homeland Security and the Multi-State Information Sharing and Analysis Center, sponsors National Cyber Security Awareness Month every October since its …

Member Avatar for slfisher
0
343
Member Avatar for slfisher

After two years of criticism against the online classified ad site Craigslist because people post ads for prostitution there, the site is now being accused of hosting ads for child prostitution as well. "Last month, two girls trafficked for sex through the website Craigslist wrote an open letter to its …

Member Avatar for iamtoogood
0
448
Member Avatar for happygeek

Most spam continues to be drugs related, yet it is aimed at workers in the automotive industry. The United States, traditionally king of malware infected email, has dropped like a lead balloon to be overtaken by the UK. And workers prefer to download stuff on the move and get their …

Member Avatar for Kieran Y5
0
481
Member Avatar for happygeek

The likes of Norton these days make much fuss about just how quick installing a security suite is, but you can forget all claims of being done in 60 seconds when it comes to Trend Micro Titanium Maximum Security. Think less of speedy rocket-powered installations and more of slow and …

1
722
Member Avatar for palaweb
Member Avatar for APatrizio

Just because security holes and vulnerabilities get reported to software vendors doesn't mean they are actually patched. A new report from IBM's X-Force security team found that of all the software holes reported in the first half of this year, more than half are still unpatched. IBM's X-Force report is …

Member Avatar for josephadeo
0
544
Member Avatar for slfisher

A number of civil liberties groups announced today that they are [URL="http://www.nacdl.org/public.nsf/NewsReleases/2010mn30/$FILE/BorderSearchComplaint09072010.pdf"]fighting [/URL]U.S. Department of Homeland Security [URL="http://www.dhs.gov/ynews/releases/pr_1251393255852.shtm"]policies [/URL]that allow them to search all electronic devices -- including laptops, cameras, and smart phones -- that cross the border. Between October 1, 2008 and June 2, 2010, more than 6,500 people …

Member Avatar for PCSAWICK829
1
238
Member Avatar for slfisher

Nations such as Russia and China who have malicious hackers should be held accountable for the actions of those criminals, according to a [URL="http://www.cfr.org/content/publications/attachments/Cybersecurity_CSR56.pdf"]report [/URL]from the [URL="http://en.wikipedia.org/wiki/Council_on_Foreign_Relations"]Council on Foreign Relations[/URL], an independent, nonpartisan membership organization. "Though the United States cannot expect countries to prevent all malicious behavior, it can expect …

Member Avatar for Agilemind
1
257
Member Avatar for slfisher

This year's version of the Cybersecurity Act was approved by the Senate Committee on Homeland Security and Governmental Affairs after amending it to limit the president's authority in the event of a cyber emergency, [URL="http://thehill.com/blogs/hillicon-valley/technology/105377-senate-homeland-security-committee-approves-cybersecurity-bill-"]reported [/URL][I]The Hill[/I]. The [URL="http://thomas.loc.gov/cgi-bin/query/z?c111:S.3480:"]bill[/URL], sponsored by Sens. Joe Lieberman (I-Conn.), Susan Collins (R-Maine), and Tom …

Member Avatar for slfisher
0
566
Member Avatar for APatrizio

[ATTACH=RIGHT]17035[/ATTACH]While security professionals constantly fear the big bad hacker breaking into their enterprise and wreaking havoc, the biggest threat to security is sitting inside the company and drawing a paycheck. Cloud and e-mail security specialist [URL="http://www.proofpoint.com/"]Proofpoint[/url] notes in its seventh annual study of data loss prevention (DLP) issues that e-mail …

Member Avatar for 1laptoprental
0
648
Member Avatar for happygeek

I will admit that I didn't stumble upon Steven Levy's classic tale of how the IT west was won, for want of a better phrase, until 1993 when it was republished some 10 years after the original book but with the addition of a handful of new pages to celebrate …

0
473
Member Avatar for itsgrace

I have a website running xcart ([url]http://www.mysite.com[/url]) and want to run it as a secure website ([url]https://www.mysite.com[/url]). The following are the solutions I have done: 1. I have tried to enforce SSL through htaccess but it gives me INTERNAL SERVER PROBLEM Error. 2. I have created a self-signed cert through …

0
141
Member Avatar for happygeek

Warnings have been issued today not to complete a customer satisfaction survey that appears to come from McDonald's and promises cash for your answers. A bit like fast food itself, something that looks appetising and promises a quick fix is often not actually that good for you. [attach]17019[/attach]IT security and …

1
351
Member Avatar for EricMack

[ATTACH=right]16930[/ATTACH]Just weeks after Research in Motion [URL="http://www.daniweb.com/news/story303272.html"]installed servers in Saudi Arabia[/URL] to allow authorities there to monitor Blackberry messaging traffic and avoid being shut down in the Kingdom, an encore of the drama is playing out in India. The Indian government has [URL="http://www.informationweek.com/news/software/operatingsystems/showArticle.jhtml?articleID=226700187"]pledged to shut down RIM's encrypted services[/URL] in …

0
244
Member Avatar for ClimateWonk

The nonprofit think tank for which I spent the last seven years working on climate and energy policy has gone bankrupt. It is no more. The server is returned to the company that rented it to us, and the offices are closed and have new tenants. As part of the …

Member Avatar for ClimateWonk
0
651
Member Avatar for happygeek

It's not the first time that Johnny Depp has died according to the Internet, but this time he is not alone. According to an ongoing online campaign, celebrities including Beyonce, Bon Jovi, Brad Pitt, Cameron Diaz and David Beckham have all been killed in tragic circumstances. Perhaps surprisingly [URL="http://www.daniweb.com/news/thread306364.html"]Lady Gaga …

0
433
Member Avatar for Glass_Joe

[ATTACH=RIGHT]16788[/ATTACH]If you’re a petty thief, an iPhone must look like a mobile Mona Lisa. Their sleek design, variety of features, portability, coveted ownership, and lofty price make for an appealing and readily available target. But scum of the earth pay heed: Apple filed for a patent yesterday (August 19th) to …

Member Avatar for Agni
0
1K
Member Avatar for Glass_Joe

[ATTACH=RIGHT]16752[/ATTACH]Intel announced on Thursday their agreement to purchase all of McAfee’s common stocks at $48 a share, a deal approximately worth $7.68 billion. McAfee will act as a wholly-owned subsidiary and report to Intel’s Software and Services Group. The endeavor marks what is sure to be a harmonious relationship for …

Member Avatar for marshal_ramdev
1
460
Member Avatar for slfisher

Not only is there a [URL="http://www.daniweb.com/news/story304425.html"]debate [/URL]about the constitutionality of using Global Positioning System units to help fight crime – now there’s concern about using Google Earth as well. The Associated Press [URL="http://news.yahoo.com/s/ap/20100814/ap_on_hi_te/us_eyes_in_the_sky"]reported [/URL]a few days ago that government officials in regions ranging from the Riverhead, N.Y., to the country …

Member Avatar for msfreeh
0
283
Member Avatar for slfisher

Geolocation features in cameras are giving thieves new information when someone proudly posts a picture of their new acquisition, whether it's a boat, a flat-screen TV, or a new car, according to an [URL="http://www.nytimes.com/2010/08/12/technology/personaltech/12basics.html?_r=1"]article [/URL]last week in the [I]New York Times[/I]. Some cameras and smart phones embed location-specific information, such …

Member Avatar for slfisher
1
469
Member Avatar for Emily Banks

[ATTACH=right]16573[/ATTACH]Just as it seemed one Google Street View debacle in a foreign country came to a resolution today, another was just beginning thousands of miles away. The problems first began for Google in Germany in May, when the company's Street View vehicles collected private data that was sent across unencrypted …

Member Avatar for Fbody
1
371
Member Avatar for EricMack

[ATTACH=right]16534[/ATTACH]Alcohol remains off limits, but it looks like Saudis will still be allowed to feed their Crackberry addiction after all. The Saudi government had said that it would begin blocking Blackberry's instant messaging services on Friday - claiming that by not being allowed to monitor messages, the popular devices and …

0
569
Member Avatar for newsguy

Mac OS X is not, on the whole, known as an OS which attracts too many problems when it comes to malware. However, in the last few days there has been something of a scare involving the Immunizator Trojan. [URL="http://www.sophos.com/news/2008/03/imunizator.html"]According to IT security specialists Sophos[/URL] this may well just be …

Member Avatar for GoodLuckChuck
0
239
Member Avatar for DragerAZ

I have become infected with the Security Tool virus/trojan/malware. In normal startup mode for Windows XP SP2. I am not able to run any .exe programs without getting a message from Security Tool that the program is infected with (insert virus/trojan/malware here) and is attempting to send my credit card …

Member Avatar for DragerAZ
0
2K
Member Avatar for vibhaJ

Hi all, My site is on dedicated server by fasthosts.co.uk. i get email from host server that my site has been placed on the Spamhaus SBL. below is the content for that: [CODE] >> Web bot: port 80 >> IP address 217.174.241.205: on fasthosts.co.uk/live-servers.net >> Canadian Pharmacy spammer[s] are using …

Member Avatar for vibhaJ
0
191
Member Avatar for CatRambo

[ATTACH=RIGHT]16335[/ATTACH]On August 1, [URL="http://www.tombom.co.uk/blog/?p=262"]Defcon attendee Chris Paget showcased the vulnerability of the AT&T network[/URL] by eavesdropping on cell phone calls in front of a live audience. Paget warned attendees ahead of time what he planned to do: [I]1. If you’re in an area where your cellphone calls might be intercepted, …

0
371
Member Avatar for CatRambo

[ATTACH=RIGHT]16331[/ATTACH]A [URL="http://online.wsj.com/article/SB10001424052748703467304575383530439838568.html?"]Wall Street Journal report today[/URL] suggests that for Microsoft, customer concerns about privacy came a distant second behind ad revenue when designing browser software Internet Explorer. When Microsoft initially planned the Internet Explorer 8.0 browser, they intended to offer users functionality that would allow them to avoid being tracked …

0
639
Member Avatar for CatRambo

Security company [URL="http://www.barracudalabs.com/"]Barracuda Networks[/URL] has named Google the "king of malware," in [URL="http://www.barracudalabs.com/downloads/BarracudaLabs2010MidyearSecurityReport.pdf"]a report released this month[/URL] that shows the popular search site linking to twice as many malware sites and files as its chief competitors, Bing, Twitter, and Yahoo combined. [ATTACH]16328[/ATTACH]Barracuda points to a growing need for online reputation …

0
567
Member Avatar for EricMack

[ATTACH=right]16305[/ATTACH]No more shortcuts for hackers - that's the word from Microsoft, which plans to release a patch today that the company says will fix a security loophole. The issue is tied to the way the Windows OS handles shortcuts, or .lnk files, or as Microsoft explains it in the [URL="http://www.microsoft.com/technet/security/advisory/2286198.mspx"]official …

1
348
Member Avatar for happygeek

[attach=right]14422[/attach]File under oops. The website of The Telegraph newspaper has been defaced by hackers, apparently upset at a cult British television show and the newspaper itself for mocking their country. The 'Romania National Security' hacking group has claimed responsibility for the attack which hit a couple of third party services …

Member Avatar for hugoboss1
1
272
Member Avatar for CatRambo

[ATTACH=right]16252[/ATTACH][URL="http://mobile.venturebeat.com/2010/07/28/android-wallpaper-app-that-steals-your-data-was-downloaded-by-millions/"]Questions have been raised[/URL] about an Android wallpaper application that is collecting personal data and sending it to a site, [url]www.imnet.com[/url], in Shenzen, China. It's unclear why the data is being collected or what use might be made of it. The app Wallpaper, which originated from developer Jackeey, was uploaded …

Member Avatar for mantis.wang
0
231
Member Avatar for Ketsuekiame

Hello, here's the setup for the project. I have a WCF Service that is hosted on a net.tcp binding in buffered mode and ReliableSession enabled. The binding is configured to use TransportWithMessageCredential security. The certificate is a self signed certificate that I am identifying using the Thumbprint. The UserNameValidator is …

Member Avatar for Ketsuekiame
0
170
Member Avatar for happygeek

Netbooks remain hugely popular courtesy of their small form factor and low price, both achieved partly due to the relatively limited technical specs of the average device. Low computing power and Internet security suite software do not, it has to be said, traditionally make for good bed-fellows. Which leaves netbook …

0
302
Member Avatar for Niki_Fears

At the [URL="http://www.blackhat.com/"]Black Hat[/URL] conference in Las Vegas, Barnaby Jack gave a demonstration of how he learned to crack the security of various stand alone ATM's. While they have long been at risk for physical theft (someone stealing or physically breaking into the internal safe of the ATM itself), this …

0
1K
Member Avatar for blackbelt27

***RUNNING:windows xp sp 2 ok i ridded a computer of 1021 infected files 23 viruses and 3 droppers. after disinfection internet axcess was damaged , so i re-installed the TCP/IP to the LAN connection and deleted the WinSock and WinSock2 entries and rebooted, (automatically rewriting the entries correctly) and bam …

Member Avatar for blackbelt27
0
195
Member Avatar for CatRambo

[ATTACH=right]16134[/ATTACH]At [URL="http://googleblog.blogspot.com/2010/07/introducing-google-apps-for-government.html"]today's press conference[/URL], Google announced a new version of its Google Apps productivity suite, [URL="http://www.google.com/apps/intl/en/government/trust.html"]Google Apps For Government[/URL]. The software has been certified as meeting U.S. Government security requirements. Like the Premier version of their suite, the cost is a yearly charge of $50 per user, and includes applications …

0
561
Member Avatar for happygeek

The 48,727 [URL="http://twitter.com/nasa_astronauts"]followers of the NASA Astronaut account on Twitter[/URL] expect to hear about updates on astronaut activity and get some personal insight from the astronauts themselves. They probably were not expecting to be bombarded by spacemen offering to sell them plasma and LCD flat-screen TVs at bargain prices however. …

Member Avatar for happygeek
0
738
Member Avatar for matwe

hi.. can anybody help me to list a few java security problems and its solution? i hope somebody will help me.. thanksss..

Member Avatar for tong1
0
88
Member Avatar for Joel Ferman

[ATTACH=right]16006[/ATTACH][I]Part dedicated professional, part creative thinker and part con man.[/I] On a weekly basis a major corporation’s data is compromised in a most public fashion – in an instant slaughtering consumer confidence and bringing immediate disgrace. Who doesn’t remember the Google Aurora attacks and AT&T’s iPad data leak exposing 114,000 …

Member Avatar for Ndoom
0
306
Member Avatar for Niki_Fears

Security researchers have been looking at Safari, the standard browser for Apple's Mac computers, and have found a troublesome security problem. It seems that there is a feature that could reveal your personal information. The problem is with the Auto Fill feature which is designed as a part of the …

0
825
Member Avatar for Rickay

why doesn't this work? [CODE]int main() { fstream file; char output[100], pasword[100]; int a; const string x("Yes"); const string y("No"); string z; char b; cout << "\nEnter correct password to continue: \n" << endl; cin.getline(output, 15); if(output == "file.txt") { cout << "Change password? Type Yes or No. \n" << …

Member Avatar for Ancient Dragon
0
145
Member Avatar for Niki_Fears

Blogetery.com, a free WordPress blog provider, was shut down earlier this month when their [URL="http://www.daniweb.com/news/story297729.html"]entire server was mysteriously yanked [/URL]without warning or explanation. When the site went dark, over 73,000 user generated blogs disappeared and since then there has been little to no information as who was responsible for pulling …

Member Avatar for Major Variola
0
423
Member Avatar for happygeek

The good news is that security savvy Windows users will, more than likely, have already disabled the AutoRun and AutoPlay features. The bad news is that a new zero-day vulnerability could care less, and executes automatically anyway. [attach]15918[/attach]The zero-day vulnerability in question was first spotted by Sergey Ulase, a researcher …

0
246
Member Avatar for blackbelt27

***RUNNING:windows xp sp 2 ok i ridded a computer of 1021 infected files 23 viruses and 3 droppers. after disinfection internet axcess was damaged , so i re-installed the TCP/IP to the LAN connection and deleted the WinSock and WinSock2 entries and rebooted, (automatically rewriting the entries correctly) and bam …

Member Avatar for avadhraj12
0
141

The End.