1,400 Topics

Member Avatar for
Member Avatar for razzzz87

Hi all , I would really appreciate if any one will help me. i am working face recognition system for security system i am comparativly new to work on such system. i looking for code snap to start the project. project requirment is, once a person's face get recognised by …

Member Avatar for iamthwee
0
103
Member Avatar for sikander_1

lets suppose Gmail Allows one email account against one computer and they allow a desktop application to login to my email , so i created account using Chrome , now to create a second account with gmail if i Delete desktop login application alongwith all its registrery data/ dll files …

Member Avatar for Mya:)
0
551
Member Avatar for neutralfox

Hello everyone, I got a small question on encryption, actually I am trying to learn the various techniques to encrypt a message. Now I am trying AES, using the built in security package in Java. The problem is that I am having a problem with this encryption algorithm. Actually I've …

Member Avatar for JamesCherrill
0
1K
Member Avatar for john_beginner

hello, all i have query regarding how to send mail in asp.net using C#.net for that i have use the following code but still not able to send please give me your valuable suggestion [code=C#] System; using System.Configuration; using System.Web; using System.Web.Security; using System.Web.UI; using System.Web.UI.WebControls; using System.Web.UI.HtmlControls; using System.Net.Mail; …

Member Avatar for nevil120
0
1K
Member Avatar for roxanne.martos

Hi i am reworking on my password security on the register page so far it is okay apart from the fact that im getting this error: Fatal error: Call to a member function create() on a non-object ` $bcrypt = new Bcrypt; try { $email1->create(array( ` 'username' => Input::get('username'),` 'password1' …

Member Avatar for roxanne.martos
1
236
Member Avatar for happygeek

**How do passwords work?** What a password isn't, or at least really shouldn't be, is some kind of secret word or phrase that is simply compared against a table of usernames in a login database. Such plaintext systems are about as secure as a chocolate padlock on a furnace door. …

Member Avatar for Hiroshe
1
1K
Member Avatar for gilgil2

Hi everyone, I have been working on some research for at least a week but have made so little ground it is extremely frustrating. I am hoping that somewhere here has the expertise to point me in the right direction. Any help is much appreciated. Essentially I want to find …

Member Avatar for almostbob
0
318
Member Avatar for sagisgirl

Hi all, I've a problem with my insert sql..I didn'y know why. here is my insert sql $goodsDesc = $_POST['goodsDesc']; $k8goodsQty = $_POST['k8goodsQty']; $valuePerUnit = $_POST['valuePerUnit']; $sql_k8goodsIn = "INSERT INTO k8_goodsin (k8regID,goodsDesc,k8goodsQty,valuePerUnit) VALUES ( '".$k8regID."', '".addslashes(strtoupper($goodsDesc[$y]))."', '".$k8goodsQty[$y]."', '".$valuePerUnit[$y]."')"; for goodsDesc the input is like this goodsDesc = 2-1/2" suction pump …

Member Avatar for diafol
0
328
Member Avatar for kalel21

A friend of mine has asked me to invest in a proxy server to protect myself because I have no idea about security. But be4 i even think about doing this I need to know what a "proxy server" is, how they work, are they safe and is it legal?

Member Avatar for CCProxy
0
4K
Member Avatar for bharatgs7

Guys, I need your help to finish up my assignment. I have JSP application naming myProject ,which has been deployed in webapp folder in tomcat. I want to provide security for myProject folder. I mean, I want to protect it from copying by someone else. Is there any way to …

Member Avatar for peter_budo
0
124
Member Avatar for salv236

Dear members, I am relatively new to the forum, I currently do not know where to turn, i am 35 experienced in IT Security although this is not what i really want to do, im interested in web development/design and know some HTML whats currently blocking me: No experience. Limited …

Member Avatar for chrishea
0
320
Member Avatar for happygeek

The latest major online outfit to suffer from a breach is Bitly, the url shortening service beloved by users of Twitter and Facebook. According to a statement from Bitly CEO Mark Josephson, the company has "reason to believe that Bitly account credentials have been compromised." ![c385df134b645f20b10410443c05d835](/attachments/large/0/c385df134b645f20b10410443c05d835.jpg "c385df134b645f20b10410443c05d835") Although Josephson insists …

Member Avatar for happygeek
0
384
Member Avatar for braxdragon0

hey, my windows vista laptop keeps shutting down i ran trend micro hijack and this is the log Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 10:52:14 AM, on 6/11/2010 Platform: Windows Vista ) MSIE: Internet Explorer v7.00 () Boot mode: Normal R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = [url]http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iehome&locale=EN_US&c=73&bd=Pavilion&pf=laptop[/url] R0 …

Member Avatar for deletedaccount
0
389
Member Avatar for Tinnin

Hi All, I'm running through "Head First Java" and I'm hitting a snag with an exercise involving RMI. My Classes ---- package myremoteimpl; import java.rmi.*; import java.rmi.server.*; /** * * @author Michael */ public class MyRemoteImpl extends UnicastRemoteObject implements MyRemote { public String sayHello() { return "Server says, 'Hey'"; } …

Member Avatar for Tinnin
0
4K
Member Avatar for nagarjuna

Hi, I m Nagarjuna.I m doin my Masters in Computer Science at Indian Institute of Technology, Kharagpur. My thesis is on VANET security. I m doin a simulation using GloMoSim software. I want to broadcast messages/packets to all nodes(within the transmission range). As far as I ve understood the GloMoSim …

Member Avatar for NASEEMSHAKEEL
0
247
Member Avatar for Harikishan.J

**Q:-How To Disable inbuilted WEBCAM in your LAPTOP?** *Ans:-hi,* let us see how to disable an inbuilt camera in a laptop. 1.open control panel->system and security->system->device manager->imaging devices->integrated webcam->select properties->open 2.open *driver* tab 3.click on disable 4.it shows a *warning window*, click on *yes*. 5.now you have disabled your cam. …

Member Avatar for CimmerianX
0
133
Member Avatar for happygeek

If a week is a long time in politics, then 24 hours is an absolute age in ecommerce security terms. Which make the findings of a Tripwire survey, published today, all the more worrying. The survey, conducted by Atomic Research, questioned 102 financial organizations and 151 retail organizations which process …

0
304
Member Avatar for crystal213

internet explorer has stopped working i cant open any web pages. mozilla firefox will open the yahoo page but when i try to go to another site any site it says its untrusted i cant even check my email and i get a security warning? how do i fix this? …

Member Avatar for <\Jericho>
0
318
Member Avatar for champmanking

Hey. I need help coding a php script that receives a URL from a form then displays all the images(jpeg, png and gif) from that webpage. I don't need to images to be saved. This is what I already have: form.html <html> <head> </head> <body> <div id="form"> <form action="view.php" method="get"> …

Member Avatar for yessi_1
0
261
Member Avatar for Ancient Dragon

According to [this article](http://www.infoworld.com/t/microsoft-windows/microsoft-confirms-its-dropping-windows-81-support-240407), Microsoft will no longer issue security updates to Windows 8.1 if you don't install the update path. >Since Microsoft wants to ensure that customers benefit from the best support and servicing experience and to coordinate and simplify servicing across both Windows Server 2012 R2, Windows 8.1 …

Member Avatar for Reverend Jim
0
467
Member Avatar for davy_yg

Hallo, Does anyone knows how to secure xampp - I mean for web server ? How to place password on it ? I am just want to secure my database. Thanks before.

Member Avatar for davy_yg
0
150
Member Avatar for Zorrro

I will be hosting a website on windows 7 using Apache and a java based project tracking web application called jira on Tomcat using reverse proxy method. To secure that web application and my PC what steps should I take and from where should I start?

Member Avatar for iamthwee
0
416
Member Avatar for logicslab

Dear Friends, I am looking for the topic "Virtualization techniques for Security" and got 3 points 1.Isolation and Protection of hypervisor from external entities eg; Privileged management VMs 2. Recursive addition of additional virtualization layers eg: by running commodity hypervisors on top of special "Secure" hypervisors 3. Through hardware trusted …

Member Avatar for logicslab
0
175
Member Avatar for happygeek

Feedly app left attack window open for malicious JavaScript hackers according to one security researcher. Security consultant and blogger Jeremy S [revealed](http://breaktoprotect.blogspot.in/2014/04/feedly-android-application-zero-day.html) that the Feedly Android app, or at least the version prior to the update on March 17th 2014, had been subject to a zero-day JavaScript code injection vulnerability. …

0
370
Member Avatar for new_2_java

Hello everyone, I am writing a Java program to reset LDAP account password. I know the password should be quoted passwrod and then encoded in UTF-16. I have a question, if someone can confirm please. I am getting encoded password as follow: String oldPassword = "Password1234"; String newPassword = "Password9999"; …

Member Avatar for new_2_java
0
1K
Member Avatar for punith_1

I have a form which shows results if a proper roll number is entered... the results are fetched from http://results.vtu.ac.in and only the table is shown... now i want to add the data of the table to my database using php. Is there a way to do it..? for example …

Member Avatar for punith_1
0
442
Member Avatar for Gen_2

hi, i'm wondering how can i make my project running in to another computer without changing the connectionstring. i am using this connectionstring("Server=GEN-PC;Data Source=GEN-PC/SQLEXPRESS;Initial Catalog=Brgy;Persist Security Info=True;")

Member Avatar for Reverend Jim
0
778
Member Avatar for new_2_java

Hi all, I have a J2EE web application that I am integrating with LDAP to implment Password Reset functionality to allow AD users to change their own password. My code works at times, and sometimes it stops working throwing [code]LDAP error code 52, initializing SSL/TLS error.[/code] I don't know why …

Member Avatar for new_2_java
0
2K
Member Avatar for sharlyx

hi daniweb, I'm trying to work on a project regarding building a data mining software using software security tools. the essence of the project to address the security issues in data mining software. can these two aspects really be combined? i also need help on the languages i could use …

0
125
Member Avatar for ziggystarman

Hi I've written this small program to demonstrate the Diffie–Hellman key exchange algorithm. The desired output from the program is for most runs correct. However occasionally there are some discrepancies in output of the shared secret keys values in that they don't match, when they should. I've found that certain …

Member Avatar for logicslab
0
993
Member Avatar for happygeek

Android-driven devices, including smartphones and tablets manufactured by the likes of Asus, LG, Motorola and Samsung, are being sold with pre-installed malware according to claims made by the CTO and Founder of Marble Security. David Jevans made the claim following complaints from a potential client that a mobile security platform …

Member Avatar for creamtown
0
842
Member Avatar for happygeek

It has been [officially confirmed](http://php.net/archive/2013.php#id2013-10-24-2) that the php.net website of the open-source PHP programming language has been hacked and infected with malware. The successful breach of the site came to light yesterday morning when the Google Safe Browsing service started flagging php.net as serving up malicious scripts. This was, at …

Member Avatar for Mohammed_9
13
797
Member Avatar for happygeek

Today is another of those 'Hallmark' IT security days; in the case of Tuesday the 11th of February 2014 that means 'Safer Internet Day'. I'm not going to start yet another rant about the pointlessness of this, and why every day should be Safer Internet Day. If you want to …

Member Avatar for Shrike72
0
494
Member Avatar for happygeek

News headlines screaming that yet another Microsoft Windows vulnerability has been discovered, is in the wild or has just been patched are two a penny. Such has it ever been. News headlines declaring that a 'major security problem' has been found with Linux are a different kettle of fish. So …

Member Avatar for happygeek
2
600
Member Avatar for Curious Gorge

Hi again guys this time I have a question about computer security that's related to my programming hobby. I hope this isn't against the rules. I am asking this out of curiosity and concern, not because I want to do evil. However thanks to some knowledge I gained from a …

Member Avatar for mike_2000_17
0
205
Member Avatar for happygeek

The average DaniWeb member if not already au fait with Pastebin.com is almost certainly aware of something like it. A pastebin has become, for many programmers, a default tool in the coding box and for very good reason: it makes sharing large quantities of code very easy indeed. Of course, …

Member Avatar for happygeek
0
1K
Member Avatar for LukeJWhitworth

Hello, Can someone please point me in the right direction for using the Digital Persona Fingerprint system, the u.are.u 4500 one. I have imported the following statements; Imports GrFingerXLib Imports Microsoft.VisualBasic But then I don't know where to go from there. All I want to do is scan the fingerprint, …

0
147
Member Avatar for jesicawillss

What is White Hat SEO? How many things or techniques are included in it? Can anyone tell me how it proves better for getting search engine result? Guide me on this subject.

Member Avatar for John_60
0
656
Member Avatar for happygeek

The photo messaging application Snapchat, which allows users to post images, video and text on a time limited basis to a group of recipient users, has been hacked. The attraction of Snapchat, apart from not being Facebook and therefore somewhere teenagers can meet online without their parents having a clue …

Member Avatar for John_60
1
625
Member Avatar for yogeetha

We need to ensure that the connection is secure. The python version we use is 2.6. Trying to call prot_p() explicitly errors out. How do we ensure that the connection is secure. >>> from M2Crypto import ftpslib >>> ftps = ftpslib.FTP_TLS(host) >>> ftps.login(username, password) '230 User logged in.' >>> ftps.prot_p() …

0
166
Member Avatar for happygeek

As a gamer myself, I thought that last year was a pretty good one. After all, not only did I get to play both GTA V and Call of Duty: Ghosts (indeed, I'm still playing it and working my may through the prestige levels) but if I had enough spare …

Member Avatar for DarkSealer
0
661
Member Avatar for happygeek

Apparently it's Data Privacy Day tomorrow (January 28th) which, if you will allow me to quote the [Stay Safe Online](https://www.staysafeonline.org/data-privacy-day/about) website blurb, is an "international effort to empower and educate people to protect their privacy and control their digital footprint". Given the Edward Snowden NSA spying revelations that broke during …

Member Avatar for gerbil
3
672
Member Avatar for cpchc

Hi there - I had written some php for users to login to a password protected part of our site. Today an SSL certificate was installed. Previous to the SSL being installed the pages would timeout and kick the user out to the login screen after a certain period of …

Member Avatar for patk570
0
285
Member Avatar for Reverend Jim

CESG, the UK government's arm that assesses operating systems and software security, has published its findings for ‘End User Device’ operating systems. The most secure of the lot? Ubuntu 12.04. For the full article see [here](http://www.zdnet.com/uks-security-branch-says-ubuntu-most-secure-end-user-os-7000025312/)

Member Avatar for rch1231
0
310
Member Avatar for happygeek

That's the surprising consensus reached at a meeting of 30 CSOs representing some of the UK's leading enterprises held in London during the past week. This despite a poll at the bi-annual [URL="http://www.csointerchange.org"]CSO Interchange[/URL] event revealing that those same CSOs view social networking as the most over-hyped threat. When it …

Member Avatar for kategirdlelock
1
595
Member Avatar for happygeek

[ATTACH=RIGHT]22094[/ATTACH]Facebook Vice-President Chris Cox has [announced](https://blog.facebook.com/blog.php?post=10150251867797131) the latest in a seemingly never ending run of privacy updates for the worlds' biggest social network. The improvements can be summed up as tightening up the question most often asked by those users worried about their privacy, namely "who can see this?" Unless …

Member Avatar for kategirdlelock
0
480
Member Avatar for happygeek

I have been turning my USB thumb drives into fully encrypted data containers for years now, but readily admit that the prospect of rolling up your sleeves and getting down and dirty with encryption software is not as exciting to everyone as it is to me. However, with removable USB …

0
605
Member Avatar for maketick

Hello, What is gray hat SEO technic in SEO? Is it valid technic in Google? Please post your opinion on this important issue. Thanks, Maketick

Member Avatar for luvseo
0
320
Member Avatar for happygeek

The Distributed Denial of Service (DDoS) attack is becoming the crowbar of the online criminal. In the past we have got rather used to DDoS attacks being one of the favoured approaches of hacktivists, with perhaps the Low Orbit Ion Cannon (LOIC) and later the High Orbit Ion Cannon (HOIC) …

Member Avatar for robert02
1
902
Member Avatar for mallo

dear sir/madam Please suggest me , leading seminar topics on network or web security. plz help me Thank you

Member Avatar for rubberman
0
74

The End.