679 Topics
![]() | |
In today's digital age, businesses rely heavily on customer data to enhance their operations, personalize experiences, and drive growth. However, the increasing importance of customer data brings along significant cybersecurity challenges. Protecting this data is not only a legal and ethical obligation but also crucial for maintaining customer trust and … | |
Hi everyone, I’m just starting out with testing and I need to generate some test data for things like names, birthdays, emails, and other basic information. I’m looking for web-based resources or tools that provide random test data for use in my testing. like i used this *<Promotional link snipped>* … | |
**AI policy theorist Demetrius Floudas introduces a novel era classification for the AI epoch and reveals the hidden dangers of AGI, predicting the potential obsolescence of humanity. In retort, he proposes a provocative International Control Treaty.**  ## About Demetrius A. Floudas ##  **[Demetrius A. Floudas](http://talks.cam.ac.uk/show/index/131770)** is a transnational … | |
**Almost two years into the AI hype, a looming market correction may soon separate true innovators from those who are trying to capitalize on the hype. The burst of the bubble could pave the way for a more mature phase of AI development.**  Amidst recent turmoil on the stock … | |
Can a website be made to act as a proxy? | |
With more than half of the world’s population using email, your business cannot afford to neglect email marketing. And unlike social media sites with their convoluted features and ever-changing algorithms, where no one likes your messages for some reason, email marketing is quite simple. So, how does one become an … | |
When choosing the perfect SMTP (Simple Mail Transfer Protocol) server for your business, there are several factors you should consider. Here are some important considerations: Reliability and uptime: Look for an SMTP server that offers high reliability and uptime guarantees. The server should have a stable infrastructure and a track … | |
When it comes to enterprise computer technology, everything seems to be happening in the cloud these days. Offsite storage was one of the first iterations of cloud computing and is continuing to gain traction as a smart way for companies to safely retain data. You're probably familiar with the typical … | |
Hello everyone, I wrote data arrays at the end of the exe with delimiter. After I compiled, the app it didn't work on Chinese Windows, only on English, I want to configure the app to work on Chinese windows as well, I know it will work if I change the … | |
The rise in data usage and exponential growth of remote work in recent years has increased the need for reliable data centers all around the world. Since data centers are critical for wide-scale networking, data storage, and information sharing, they require exceptional security measures to safeguard them from rapidly evolving … | |
Thank you all for being here to help me with this problem I'm having. I've used computers for years but this is over my head. I saw a post here when you guys helped a lady a few years back having a similiar problem with her software. I hope you … | |
Hi DW. Well I'm very much interested in the data protection and also giving the best privacy to the public where we protect your passwords. I've seen something that Firefox had introduced to their browsers with also their Apps. This is called LockWise which is a tool to sync your … | |
CAPTCHAs, authentication codes, and click-throughs are the scourge of Internet users everywhere. Nobody wants to waste time filling out a form while they’re browsing the web, even if it takes just a few seconds. But although these systems may be a nuisance, they serve a very important purpose. Blocking bots … | |
The insurance business was conservative quite a long time; however, the appropriation of new advances isn't only a cutting edge pattern, but a need to keep up the competition. In our computerized era, Big Data innovations help to process various data, improve work process productivity, and reduce operational expenses. Learn … | |
The Conservative party issued a statement on Saturday which apologised for "any concern caused" and confirmed that "the technical issue has been resolved and the app is now functioning securely." However, not before Boris Johnson's profile image had been changed to a pornographic one and that of Environment Secretary, Michael … | |
Hi I am talking GDPR and Data Protection Act 2018. Can an organisation in the UK have its sales staff wearing name tags/badges with the employees' full name displayed on them? Thanks | |
Guardian newspaper columnist [Dawn Foster](https://twitter.com/DawnHFoster) posted images on Twitter this weekend showing how she was able to login to the official Conservative party conference app as Boris Johnson, until recently the UK Foreign Secretary. Not only was there no password required to login to the app, all that was required … | |
Does anyone know the function and origin of the wireless profile, bungle4? I've been cleaning up my numerous vbScript files and when I tidied, then tested Metered.vbs, it produced the following: D:\>metered Profiles on interface Wi-Fi: All User Profile : bungle4 All User Profile : mynet Metered.vbs is a script … | |
Generally speaking, when it comes to being as secure as possible (and, just as importantly, staying as secure as possible) newer is better. This is certainly the case if we are talking mobile operating systems such as Android and iOS. As of the start of March 2017, according to [Apple's … | |
Following the recent ransomware attacks that leveraged the WannaCrypt0r malware and NSA-developed EternalBlue vulnerability exploit, there was [plenty of advice](https://happygeek.com/?p=812) that backup, backup, backup was the best mitigation. Data backups are, of course, an important part of any business continuity strategy. However, what happens when your backups are also encrypted … | |
![]() | Hi everyone, I am working on a coin collection app, and I have recently started integrating core data into my app. My app is of the following format: I have a core data database which stores custom CoinCategory objects and each CoinCategory object has an array of Coin objects. This … |
I've had my hands on what is being described as the 'most secure hard drive ever made' for a while now. Such are the advantages of being a well known reporter on all things security I guess, I get to play ahead of the crowd. As the first journalist to … | |
Hi there, Routing is not working in codeigniter hostgator shared hosting. When i login www.doamain.com/admin this redirects to www.domain.com am using below in my config.php <?php if ( ! defined('BASEPATH')) exit('No direct script access allowed'); /* |-------------------------------------------------------------------------- | Base Site URL |-------------------------------------------------------------------------- | | URL to your CodeIgniter root. Typically … | |
Hi All, I work for a college and I use their systems, which I have access to a whole host of software that for Data protection reasons that cant be installed on any other computer. The issue is, I dont like using them as I dont feel very productive as … | |
I wish that you all are fine, My name is Ahmed Bahr From Egypt. Im 21 years old and in 2016 ill become a senior at Business Information Systems- Helwan University. So.. I have a little problem in my graduation project that my doctor decided to join an international competition … | |
I wish that you are all fine, My name is Ahmed Bahr From Egypt. Im 21 years old and in 2016 ill become a senior at Business Information Systems- Helwan University. So.. I have a little problem in my graduation project that my doctor decided to join an international competition … | |
Hi, I got error in send_string(lala): how to fix it ? thnaks ... #include <p24Hxxxx.h> #include <libpic30.h> #include <stdio.h> int FBS __attribute__((space(prog), address(0xF80000))) = 0xCF ; //_FBS( // BWRP_WRPROTECT_OFF & // Boot Segment Write Protect (Boot Segment may be written) // BSS_NO_FLASH & // Boot Segment Program Flash Code Protection … | |
hi, I am new to C programming. I want to program a running LED on my PIC24 (PIC24HJ256GP206) I have 5 LED on my PORT G and have input PORTB (RB0) My program should, if RB0 is grounded (I put jumper on my circuit) the LED will be running faster, … | |
I want to encrypt and decrypt the password and username of my login table I already populate my login table with 5 rows Can anyone suggest some Encryption and decryption algorithms for Password protection? here is my current code Option Strict On Imports System.Data.SqlClient Public Class Frmlogin Private strCon As … | |
Sanjib Mitra is a man who likes to be responsible and do the right thing. A year ago he discovered, quite by accident, that a little bit of URL tweaking could reveal personal data about people other than himself within a website database. He was completing a complicated application form … | |
As [news breaks](http://www.usatoday.com/story/tech/2015/06/12/office-of-personnel-management-hack-china/71146452/) that a second breach at the federal Office of Personnel Management may have seen another set of data, potentially more valuable than that accessed during [the first](http://arstechnica.com/security/2015/06/why-the-biggest-government-hack-ever-got-past-opm-dhs-and-nsa/), Philip Lieberman, President of privileged identity management specialists [Lieberman Software](http://www.liebsoft.com/), has been talking about what went wrong. Here's what he … | |
Hello, My computer has been slow and having problems for the last week or so. A message popped up the other day that my son said something about my internet provider found a threat or something weird. He closed out of the internet quickly, so I never saw it, but … Information Security amazon-web-services api apple apple-hardware audio data-protection file-stream google-api microsoft-office microsoft-windows office-suite pdf printer user-interface vbscript video-card virus-malware visual-basic visual-studio web-browser webcam windows-api windows-virus windows-vista wireless-networking | |
Hi, hoping someone might be able to help me with a possible infection. A few months ago, I started to notice some mouse lagging whenever I started chrome. I didn't think anything of it at the time because I usually start chrome with 5 tabs and 5 extensions, and figured … Information Security api app-store audio chrome-os data-protection dns google-api home-theater http-protocol microsoft-access microsoft-office microsoft-windows os-x pci-card pdf peer-to-peer printer sharepoint storage user-interface vbscript video-card visual-studio window-manager windows-api windows-virus windows-vista | |
Hi I have been experiencing high CPU usage for the past few days. Upon investigation I found out that the iphlpsvc was constantly running at 25% alongwith gpsvc, together putting the CPU usage to frequently 100%. I ran MBAM and AVAST scans I assume they couldnt find anything to fix … | |
In his essay '[A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/2013/12/how-does-nsa-break-ssl.html)' Matthew Green, a cryptographer and research professor at Johns Hopkins University, asks "how the hell is NSA breaking SSL?" If this is news to you, following the Edward Snowden revelations in The Guardian, then you obviously haven't read the New York … | |
Hello, I thread hijacked earlier today... probably shouldn't have, sorry if that annoyed anyone. Anyway I have an issue using LookupAccountSid in a visual studio 2013 project running on Windows 7 Pro x64. First of all, it works perfectly in debug, but doesn't work when built for release. What I … | |
I believe I got a trojan virus that has caused some damage to my computer which will no longer connect to the internet. I read several threads on here and these are the steps I have already taken: 1)I downloaded and ran Marlwarebytes and AVG. (I think it found the … | |
Hello I have what looks like a serious compiler error, serious in that I cannot see any of my files in the browser. When I click on 'View in Browser', I get this compiler error: **BC30451: 'DefaultAuthenticationTypes' is not declared. It may be inaccessible due to its protection level.** That … | |
Hi, all. Currently i am facing some problem with my coding. I am used this code to insert data from multiple checkbox values into database. but its still not happen anything. Sorry, i am new to php. Please can anyone help me on this? I would be more appreciate if … | |
So, today is '[World Paper Free Day](http://www.aiim.org/events/paper-free-day)' apparently and I'm not sure whether it's appropriate to buy a card in the circumstances. Joking aside, what I am sure of is that such Hallmark days do provide an opportunity for press releases to be thrown in my general direction. And so … | |
Hello I am trying to build a file upload page where a user can upload files and different messages appear on screen to the user of, for example, the name and size of the file successfully uploaded, whether or not he has even selected a file to be uploaded, and … | |
Hi I use Firefox as my browser and whenever I enter a search on the "search the web" box I'm diverted momentarily to [url]www.goonsearch.com[/url] then to [url]www.plusnetwork.com[/url] I have tried to eradicate the virus using many tools without success. I have completed all 8 steps in the sticky and included … | |
Hello it seems like my IExplorer has been hijacked. I use Firefox for my browsing. My computer was running slow so i check Task manager and saw that Iexplorer was running in processes but not applications. Also noticed it mutiple IE processes running at same time. I end them but … | |
The Onion Router, better known as the Tor Network, is often thought of as being the dark-side of the web. Not least as the anonymity provided by Tor meant that sites hosted on so-called hidden service servers were free to trade in just about anything from drugs and guns through … | |
**How do passwords work?** What a password isn't, or at least really shouldn't be, is some kind of secret word or phrase that is simply compared against a table of usernames in a login database. Such plaintext systems are about as secure as a chocolate padlock on a furnace door. … | |
![]() | Hi! Its been a while since i've been here but this place was always good to me before. Well my computer was really slow and 100% usage, i also noticed mysearchdial popup through firefox and i thought it was like an addon so i actually used that it silly me … ![]() |
Hi, I have tried googling and searching for this but just find endless information about why software/hardware based encryption is the better option; what I need to know is whether there are any problems using BOTH. We want our offsite backups have to be as secure as possible. We previously … | |
This may be a bit more complex situation than someone wants to take on. I am not looking for the simple solution of reinstalling. There is something simple I am overlooking. The system boots to the point of selecting the OS. The only one is Windows 7. Win 7 was … | |
I have got this code from an article on secure login systems. I know basically nothing about php so I would like to know if this is good code to use? Part 1 of 8: Configure Your Server 1. 1 Install a Web Server, PHP and MySQL on your server. … | |
Hello; I got some kind of infection or something last week, which caused my virus software not to update, and finally my computer to totally crash and would not reboot. I successfully recovered my system from an image (it was one level up of messy from actual system restore - … |
The End.