1,400 Topics

Member Avatar for
Member Avatar for Mr.M

Hi Dw. I know how to kill or stop a process using VB.NET. But how about temporary blocking a process from performing a task? Suppose I have a docx file located at "D:\test\" and I happen to open this file and modify it either by adding something or delete some …

Member Avatar for Mr.M
0
162
Member Avatar for happygeek

Sanjib Mitra is a man who likes to be responsible and do the right thing. A year ago he discovered, quite by accident, that a little bit of URL tweaking could reveal personal data about people other than himself within a website database. He was completing a complicated application form …

Member Avatar for happygeek
0
3K
Member Avatar for meLiel

hi programming masters! i need your help..how can i SEARCH a record in a database and display the results?? example: if i type an ID number or a name on the text box and click the search button it will look for the records and display it.. i have a …

Member Avatar for Reverend Jim
0
12K
Member Avatar for <M/>

I am working on adding security onto my contact form and I can't seem to find the reason as to why I get errors. Currently, when I test the php form, I get this error: Parse error: syntax error, unexpected T_IF in /home/content/86/5284386/html/websitenamewashere/contact.php on line 16 Here is my php: …

Member Avatar for <M/>
0
517
Member Avatar for happygeek

As [news breaks](http://www.usatoday.com/story/tech/2015/06/12/office-of-personnel-management-hack-china/71146452/) that a second breach at the federal Office of Personnel Management may have seen another set of data, potentially more valuable than that accessed during [the first](http://arstechnica.com/security/2015/06/why-the-biggest-government-hack-ever-got-past-opm-dhs-and-nsa/), Philip Lieberman, President of privileged identity management specialists [Lieberman Software](http://www.liebsoft.com/), has been talking about what went wrong. Here's what he …

Member Avatar for jwenting
2
463
Member Avatar for renato_francia

Hi, I've been having some issues with my server that at times it runs the application smoothly but lately there has been some irregularities in the performance. We run the server on Rackspace but they are telling us that the problem is in our end. Our site is running on …

Member Avatar for Kevin_18
0
208
Member Avatar for danielbalap

Hi All, Iam new to this forum, I learnt the magento basics,i want to create a shopping cart website using magento for selling old product, where and how to start like 1.how to integrate SEO 2.what payment methods should use and how to integrate them 3.what is SSL certificate,should i …

Member Avatar for advent_geek
0
294
Member Avatar for happygeek

Action video camera vendor GoPro has announced that it is riding into the Tour de France with a promotional [video](https://www.youtube.com/watch?v=X63m5r5jJlg) to celebrate being named the official camera of the world's largest annual sporting event with a worldwide television audience of some 4 billion people, but not before the BBC [reported](http://www.bbc.co.uk/news/technology-32934083) …

1
400
Member Avatar for showman13

OK, All I find all over the web is that this can't be done... What I am looking for is a functional alternative. I have a form that a client fills out with their information for a withdrawal When they finish filling out the form and submit it, I do …

Member Avatar for jkon
0
617
Member Avatar for happygeek

A couple of decades ago, in another life, I wrote a little script which would capture keystrokes and then store that data within the 'white space' of an image file. It was pretty crude, but it was also twenty years ago and to be honest nobody was really looking for …

Member Avatar for rubberman
3
508
Member Avatar for happygeek

Earlier this month, security outfit FireEye’s 'FireEye as a Service' researchers out in Singapore [discovered and reported](https://www.fireeye.com/blog/threat-research/2015/06/operation-clandestine-wolf-adobe-flash-zero-day.html) on a phishing campaign that was found to be exploiting a zero-day in Adobe Flash Player vulnerability (CVE-2015-3113). That campaign has been well and truly active for a while now, with attacking emails …

Member Avatar for diafol
2
517
Member Avatar for happygeek

The Electronic Frontier Foundation (EFF) has released the latest version of its 'Who Has Your Back?' [report](https://www.eff.org/who-has-your-back-government-data-requests-2015) and accompanying infographic, and it makes for interesting reading. Once you appreciate that what the EFF is talking about here is how good, measured as a response to a handful of yes or …

1
395
Member Avatar for vegaseat

When East Germany fell apart, one of the first things people there did was to storm the buildings that housed the much hated Stasi (Ministry for State Security), the ministry that was in charge of spying on their own population. How important is privacy to you?

Member Avatar for Leigh3
0
591
Member Avatar for happygeek

Speaking to TrustedReviews this week, Alexander Moiseev, Kaspersky Europe's Managing Director, has warned that your car is at serious risk of being hacked. He is, however, wrong and I'm going to explain why. ![bongosmall.jpg](/attachments/large/0/a4cebc93cab0ce6d2a6e28f218a2de8d.jpg "align-center") Kaspersky Lab and Mr Moiseev may well insist that the threats to the automotive industry …

Member Avatar for jwenting
3
609
Member Avatar for happygeek

It's been a year now since the Dyre malware family was first profiled, and there is no sign of infection rates slowing down. In fact, [reports](http://www.scmagazine.com/trend-micro-documents-new-malware-infections/article/418266/) would seem to suggest just the opposite with infections up from 4,000 at the end of last year to 9,000 at the start of …

Member Avatar for Tcll
1
521
Member Avatar for happygeek

Werner Vogel, Amazon Web Services (AWS) CTO, speaking at the AWS Summit in London yesterday has made the rather amazing claim that security in the cloud is "much stronger" than anything you can have on-premises. As someone who has been writing about information security for more than 20 years, and …

Member Avatar for dlhale
1
451
Member Avatar for happygeek

Researchers at security company AppRiver have issued a [warning](http://blog.appriver.com/2015/06/amazon-based-malware-targets-crypto-currency/) regarding a variant of the Fareit malware family which is using fake Amazon purchase confirmation emails to inject itself and steal any type of crypto currency that can be found on the target machine. ![amazonmalware.jpg](/attachments/large/0/4ed9d9dbe506fcd950aef08620e1e144.jpg "align-center") Troy Gill, manager of security …

1
364
Member Avatar for solomon_13000

I have two modules built by two developers: 1) backoffice 2) reporting However they share a single connection. The problem now is the security aspect. Both modules are independent in their respective folder(s) but they share the same connection. A developer mention that with the current architecture it is impossible …

Member Avatar for cereal
0
258
Member Avatar for rani_4

Actually, i protected my files in pendrive using usb security kakasoft but now it hidden in a bad way and i am not able to get them back.I scanned with antivirus makeing sure it is hidden and file is in pendrive.Now how to recover it?You can see scan log screenshot …

Member Avatar for tobyITguy
0
727
Member Avatar for wisedave

Hello, We had an EV SSL certificate added to our website but now looking at the GWT Analytics, our search traffic has flat lined (litteraly!). From the day it was installed, the graph bounces down, then literally flat lines. Also, is there anything we need to do in our GWT …

Member Avatar for almostbob
0
258
Member Avatar for toxicandy

With windows server 2003 losing support in the coming weeks we have upgraded our 2003 servers to virtualized 2008 servers. The only problem we are having at the moment is with Group Policy and mapping drives. Previous to this upgrade we used a logon.vbs which "worked" but was nearing 10 …

Member Avatar for toxicandy
0
789
Member Avatar for happygeek

Another month, another flaw related to the historical US export restrictions on cryptography; this time in the form of LogJam. It hits SSL 3.0 and TLS 1.0 which supported reduced-strength DHE_EXPORT ciphersuites, restricted to primes no longer than 512 bits, meaning that a man-in-the-middle attack is possible to force the …

2
337
Member Avatar for Aeonix

I don't trust my code. I really don't. I always have a feeling that something is wrong with it. Every variable looks like an enemy. Every loop, unfinished condition. Every input, possible injection. I'm kinda paranoid so to say. There's many white hat hackers out there which could make buck …

Member Avatar for ryantroop
0
213
Member Avatar for happygeek

While keen to point out that Microsoft's TechNet portal security was "in no way compromised" by the tactic, researchers with security outfit FireEye [discovered](https://www.fireeye.com/blog/threat-research/2015/05/hiding_in_plain_sigh.html) that [a well established China-based hacking campaign called Deputy Dog](https://www.fireeye.com/blog/threat-research/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html) had managed to create profiles and posts on TechNet that contained embedded Command and Control codes …

1
405
Member Avatar for happygeek

As any fan of the The Matrix trilogy of films will tell you, the Keymaker is a character in The Matrix Reloaded who has the keys to provide Neo access to the system mainframe and by so doing hopefully save Zion from the ongoing sentinel attack. In the movie, the …

Member Avatar for MrWonderful1961
0
473
Member Avatar for Aeonix

When you need to create a login page using PHP and MySQL, the safety of this login page relies on - Your PHP scripting abilities - How well and securely has PHP been programmed in C++. - How well C++ compiler of interpreter of PHP has been programmed. - How …

Member Avatar for ryantroop
1
259
Member Avatar for KolmisoftSwitch

As a new VOIP startup, you may find your SIP server under attack one day. These attacks can lead to tons of downtime and lost money. But panicking will not help! Instead, it’s important to understand the security aspects of VOIP so you can properly defend your servers from ruthless …

Member Avatar for rubberman
0
129
Member Avatar for anitg

I dont know whether this is the relevant forum but I dont know why I am getting the above mentioned error when I try to open website www.magicbricks.com from my laptop. I can open this on my office computer..! The error details are as below; HTTP Status 500 - error.security.userNotActive …

Member Avatar for diafol
0
332
Member Avatar for ITPT

Hi I want install phpMyAdmin but I can't!!! I do : # yum install phpmyadmin loaded plugins: fastestmirror, refresh-packagekit,security loading mirror speeds from cached hostfile Error:Cannot retrieve metalink roe repository:epel. Please verifiy its path and try again whene i see this Error what should i do?

Member Avatar for ITPT
0
154
Member Avatar for fsuren

Hi, I have a friend who has a small business and he asked me to help him setup a FileServer where they can store all their files and back up all their files. So far they have been doing all the work thru some consulting co. who has been ripping …

Member Avatar for fsuren
0
196
Member Avatar for happygeek

According to a [SecureList posting](https://securelist.com/blog/69462/darwin-nuke/) dated April 10th, researchers Anton Ivanov, Andrey Khudyakov, Maxim Zhuravlev and Andrey Rubin discovered a vulnerability in the Darwin kernel back in December 2014. Why is this of interest? Well, the Darwin kernel is an open source part of both the Apple operating systems. The …

Member Avatar for ChaoticCoder
0
479
Member Avatar for joshl_1995

Hello Daniweb Community, Would there be a reason why [Google Chrome](https://www.google.com/chrome) is striking out a bunch of HTTPS websites? Even ones that used to be green but are now red and strike out.

Member Avatar for joshl_1995
0
270
Member Avatar for JorgeM

I'm an XP lover and while I have moved on to Windows 7, my Windows 7 machines are configured to look like the XP Classic interface as much as possible. I'm pretty happy with these machines for now... I know that there is another popular DaniWeb article concerning why XP …

Member Avatar for RikTelner
0
602
Member Avatar for happygeek

Which 12 year old operating system which is still running on 11 million servers is about to die? Yep, that's the one: Microsoft Windows Server 2003 reaches 'end of life' status on July 14th. One of the longest running discussions on DaniWeb asks the question [Why does Windows XP refuse …

Member Avatar for Slavi
2
585
Member Avatar for happygeek

In what has quite possibly been one of the longest periods between security problems being revealed and action being taken, the Virginia Board of Elections voted on Tuesday to remove the certification of more than 300 AVS WINVote touchscreen voting machines. The Virginia Information Technology Agency, and consultancy Pro V&V, …

Member Avatar for Reverend Jim
2
663
Member Avatar for happygeek

According to the latest [Verizon 2015 Data Breach Investigations Report](http://www.verizonenterprise.com/DBIR/) all but four per cent of the security incidents analyzed by researchers could be accounted for by just nine basic attack types. That's pretty useful information for enterprise looking to prioritize their approach to security in terms of establishing a …

1
371
Member Avatar for squarethree

Do you notice that APPs are facing more and more risk of privacy leaks and security threats? As an APP developer, how do you improve the security and privacy of APP?

0
111
Member Avatar for Niloofar24

Hello. i'm creating a simple CMS for myself. There is a register form, i can register as the admin of the cms and then with login form, i can enter into admin area to write a new post or edit or delete posts. But there is a problem. I typed …

Member Avatar for Niloofar24
0
1K
Member Avatar for happygeek

Security is, more often than not, a case of getting the basics right. This is certainly true of the cloud where the hyperbole surrounding insecurity far outweighs the actual risk in my opinion. Not that the cloud is an inherently secure place to store data, just that it poses similar …

Member Avatar for XP78USER
2
468
Member Avatar for happygeek

It all started pretty well, with the announcement by Mozilla at the end of last month that the Firefox web browser would make the Internet a safer place by encrypting everything. That's everything, even those connections where the servers don't even support the HTTPS protocol. Developers of the Firefox browser …

1
451
Member Avatar for happygeek

According to new research from Venafi, apparently some 74 percent of 'Forbes Global 2000 organizations' (or the big boys of business if you prefer) have yet to properly secure their public facing servers against the Heartbleed OpenSSL threat. That's a year after the thing broke for goodness sake! Venafi found …

Member Avatar for Slavi
2
374
Member Avatar for joshl_1995

Hello Community, I have recently been experiencing extream speed decrees in my internet and general laptop use. I try to load eg. this website to post this and it took just under a minute to fully load. Sometimes for somereason my laptop mouse will freeze up, it will let me …

Member Avatar for Little Relhok1
0
508
Member Avatar for happygeek

It's that time of year again, and the latest [Secunia Vulnerability Review](http://secunia.com/vr2015/) has been published. This analysed anonymous data gathered from scans right across 2014 of millions of computers which have Secunia Personal Software Inspector (PSI) installed and revealed some interesting statistics. On average, the computers used by the people …

1
321
Member Avatar for happygeek

The recently revised Facebook community standards page states that the social network is on a mission "to give people the power to share and make the world more open" however it appears that it may have been giving the wrong people the power to share stuff you thought was private. …

Member Avatar for advent_geek
1
478
Member Avatar for happygeek

As with any online service that starts to get popular traction and experiences rapid growth, social network come micro-blog platform Tumblr has been the target of just about every kind of scam and attempted cyber-criminal subversion out there [inclduing some of its own making](http://www.daniweb.com/internet-marketing/social-media-and-communities/news/459258/tumblr-warns-users-to-change-password-after-security-mess). Most of the time it's not …

Member Avatar for HostBrink
0
443
Member Avatar for happygeek

Halifax is the town in West Yorkshire where I live, and it also happens to be the name of a well known UK Bank which started life there. Best known on the this side of the pond for TV adverts featuring a friendly chap called Howard Brown, a former customer …

Member Avatar for rubberman
0
438
Member Avatar for happygeek

Content Management Systems (CMS) may not be the most interesting topic on the tech table, but oh boy does WordPress liven things up in this sector. Not, it has to be said, always in a good way. I've lost count of the number of WordPress vulnerability stories that I've read …

Member Avatar for happygeek
3
427
Member Avatar for happygeek

I don't usually write about acquisitions and all that financial stuff, but news that PayPal has acquired CyActive caught my eye as apparently this brings the promise of 'bio-inspired predictive security' into the online payments provider threat protection mix. Which made me think, just what the heck is bio-inspired predictive …

2
386
Member Avatar for happygeek

In his essay '[A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/2013/12/how-does-nsa-break-ssl.html)' Matthew Green, a cryptographer and research professor at Johns Hopkins University, asks "how the hell is NSA breaking SSL?" If this is news to you, following the Edward Snowden revelations in The Guardian, then you obviously haven't read the New York …

Member Avatar for Tcll
3
939
Member Avatar for happygeek

Windows is, according to just about any security expert you ask, the operating system most vulnerable to attack. Unless the security expert happens to be from Microsoft, that is. So it was quite refreshing to see Microsoft admitting to a spike in attacks on Windows this week. [attach]15849[/attach]According to [URL="http://blogs.technet.com/b/mmpc/archive/2010/07/13/update-on-the-windows-help-and-support-center-vulnerability-cve-2010-1885.aspx"]a …

Member Avatar for Tcll
0
872

The End.