679 Topics

Member Avatar for
Member Avatar for Bam_391

In today's digital age, businesses rely heavily on customer data to enhance their operations, personalize experiences, and drive growth. However, the increasing importance of customer data brings along significant cybersecurity challenges. Protecting this data is not only a legal and ethical obligation but also crucial for maintaining customer trust and …

Member Avatar for WilliamOG
1
126
Member Avatar for jamesalery

Hi everyone, I’m just starting out with testing and I need to generate some test data for things like names, birthdays, emails, and other basic information. I’m looking for web-based resources or tools that provide random test data for use in my testing. like i used this *<Promotional link snipped>* …

Member Avatar for gediminas.bukauskas.7
0
63
Member Avatar for Johannes C.

**AI policy theorist Demetrius Floudas introduces a novel era classification for the AI epoch and reveals the hidden dangers of AGI, predicting the potential obsolescence of humanity. In retort, he proposes a provocative International Control Treaty.** ![header-agitalks-demetrius.jpg](https://static.daniweb.com/attachments/4/7653d6d6303a1d7a716bdbb6853b7428.jpg) ## About Demetrius A. Floudas ## ![portrait-daf-small.jpg](https://static.daniweb.com/attachments/4/6a470c87d1451a9cf00ce559d1ea18d9.jpg) **[Demetrius A. Floudas](http://talks.cam.ac.uk/show/index/131770)** is a transnational …

Member Avatar for rproffitt
1
563
Member Avatar for Johannes C.

**Almost two years into the AI hype, a looming market correction may soon separate true innovators from those who are trying to capitalize on the hype. The burst of the bubble could pave the way for a more mature phase of AI development.** ![ai-bubble.jpg](https://static.daniweb.com/attachments/4/03423bc2c2c9c9522a397e8fc70b26d9.jpg) Amidst recent turmoil on the stock …

Member Avatar for meyerrluanna
0
219
Member Avatar for hazeeq
Member Avatar for Tiffany_6

With more than half of the world’s population using email, your business cannot afford to neglect email marketing. And unlike social media sites with their convoluted features and ever-changing algorithms, where no one likes your messages for some reason, email marketing is quite simple. So, how does one become an …

Member Avatar for redplanetpk
2
75
Member Avatar for Initsky

When choosing the perfect SMTP (Simple Mail Transfer Protocol) server for your business, there are several factors you should consider. Here are some important considerations: Reliability and uptime: Look for an SMTP server that offers high reliability and uptime guarantees. The server should have a stable infrastructure and a track …

-2
47
Member Avatar for Lisa Hoover

When it comes to enterprise computer technology, everything seems to be happening in the cloud these days. Offsite storage was one of the first iterations of cloud computing and is continuing to gain traction as a smart way for companies to safely retain data. You're probably familiar with the typical …

Member Avatar for markanderson_1
1
332
Member Avatar for NewAccount

Hello everyone, I wrote data arrays at the end of the exe with delimiter. After I compiled, the app it didn't work on Chinese Windows, only on English, I want to configure the app to work on Chinese windows as well, I know it will work if I change the …

Member Avatar for rproffitt
1
295
Member Avatar for trayalex812

The rise in data usage and exponential growth of remote work in recent years has increased the need for reliable data centers all around the world. Since data centers are critical for wide-scale networking, data storage, and information sharing, they require exceptional security measures to safeguard them from rapidly evolving …

0
319
Member Avatar for teatear

Thank you all for being here to help me with this problem I'm having. I've used computers for years but this is over my head. I saw a post here when you guys helped a lady a few years back having a similiar problem with her software. I hope you …

Member Avatar for haibatullahsafi
0
706
Member Avatar for Mr.M

Hi DW. Well I'm very much interested in the data protection and also giving the best privacy to the public where we protect your passwords. I've seen something that Firefox had introduced to their browsers with also their Apps. This is called LockWise which is a tool to sync your …

0
1K
Member Avatar for PureManurea

CAPTCHAs, authentication codes, and click-throughs are the scourge of Internet users everywhere. Nobody wants to waste time filling out a form while they’re browsing the web, even if it takes just a few seconds. But although these systems may be a nuisance, they serve a very important purpose. Blocking bots …

0
237
Member Avatar for Ellina_1

The insurance business was conservative quite a long time; however, the appropriation of new advances isn't only a cutting edge pattern, but a need to keep up the competition. In our computerized era, Big Data innovations help to process various data, improve work process productivity, and reduce operational expenses. Learn …

0
208
Member Avatar for Danilo22

The Conservative party issued a statement on Saturday which apologised for "any concern caused" and confirmed that "the technical issue has been resolved and the app is now functioning securely." However, not before Boris Johnson's profile image had been changed to a pornographic one and that of Environment Secretary, Michael …

0
497
Member Avatar for Frisko

Hi I am talking GDPR and Data Protection Act 2018. Can an organisation in the UK have its sales staff wearing name tags/badges with the employees' full name displayed on them? Thanks

Member Avatar for happygeek
0
441
Member Avatar for happygeek

Guardian newspaper columnist [Dawn Foster](https://twitter.com/DawnHFoster) posted images on Twitter this weekend showing how she was able to login to the official Conservative party conference app as Boris Johnson, until recently the UK Foreign Secretary. Not only was there no password required to login to the app, all that was required …

Member Avatar for pty
0
1K
Member Avatar for Reverend Jim

Does anyone know the function and origin of the wireless profile, bungle4? I've been cleaning up my numerous vbScript files and when I tidied, then tested Metered.vbs, it produced the following: D:\>metered Profiles on interface Wi-Fi: All User Profile : bungle4 All User Profile : mynet Metered.vbs is a script …

Member Avatar for Reverend Jim
0
512
Member Avatar for happygeek

Generally speaking, when it comes to being as secure as possible (and, just as importantly, staying as secure as possible) newer is better. This is certainly the case if we are talking mobile operating systems such as Android and iOS. As of the start of March 2017, according to [Apple's …

Member Avatar for shujat_2
4
736
Member Avatar for happygeek

Following the recent ransomware attacks that leveraged the WannaCrypt0r malware and NSA-developed EternalBlue vulnerability exploit, there was [plenty of advice](https://happygeek.com/?p=812) that backup, backup, backup was the best mitigation. Data backups are, of course, an important part of any business continuity strategy. However, what happens when your backups are also encrypted …

Member Avatar for Josh Ross
1
517
Member Avatar for Nathan_6

Hi everyone, I am working on a coin collection app, and I have recently started integrating core data into my app. My app is of the following format: I have a core data database which stores custom CoinCategory objects and each CoinCategory object has an array of Coin objects. This …

Member Avatar for JamesCherrill
0
768
Member Avatar for happygeek

I've had my hands on what is being described as the 'most secure hard drive ever made' for a while now. Such are the advantages of being a well known reporter on all things security I guess, I get to play ahead of the crowd. As the first journalist to …

Member Avatar for AssertNull
1
805
Member Avatar for praba_web

Hi there, Routing is not working in codeigniter hostgator shared hosting. When i login www.doamain.com/admin this redirects to www.domain.com am using below in my config.php <?php if ( ! defined('BASEPATH')) exit('No direct script access allowed'); /* |-------------------------------------------------------------------------- | Base Site URL |-------------------------------------------------------------------------- | | URL to your CodeIgniter root. Typically …

Member Avatar for praba_web
0
4K
Member Avatar for Michael_35

Hi All, I work for a college and I use their systems, which I have access to a whole host of software that for Data protection reasons that cant be installed on any other computer. The issue is, I dont like using them as I dont feel very productive as …

Member Avatar for overwraith
0
337
Member Avatar for Ahmed_64

I wish that you all are fine, My name is Ahmed Bahr From Egypt. Im 21 years old and in 2016 ill become a senior at Business Information Systems- Helwan University. So.. I have a little problem in my graduation project that my doctor decided to join an international competition …

Member Avatar for hericles
0
261
Member Avatar for Ahmed_64

I wish that you are all fine, My name is Ahmed Bahr From Egypt. Im 21 years old and in 2016 ill become a senior at Business Information Systems- Helwan University. So.. I have a little problem in my graduation project that my doctor decided to join an international competition …

Member Avatar for rubberman
0
389
Member Avatar for naz1234

Hi, I got error in send_string(lala): how to fix it ? thnaks ... #include <p24Hxxxx.h> #include <libpic30.h> #include <stdio.h> int FBS __attribute__((space(prog), address(0xF80000))) = 0xCF ; //_FBS( // BWRP_WRPROTECT_OFF & // Boot Segment Write Protect (Boot Segment may be written) // BSS_NO_FLASH & // Boot Segment Program Flash Code Protection …

Member Avatar for rubberman
0
197
Member Avatar for naz1234

hi, I am new to C programming. I want to program a running LED on my PIC24 (PIC24HJ256GP206) I have 5 LED on my PORT G and have input PORTB (RB0) My program should, if RB0 is grounded (I put jumper on my circuit) the LED will be running faster, …

0
187
Member Avatar for Christopher_12

I want to encrypt and decrypt the password and username of my login table I already populate my login table with 5 rows Can anyone suggest some Encryption and decryption algorithms for Password protection? here is my current code Option Strict On Imports System.Data.SqlClient Public Class Frmlogin Private strCon As …

Member Avatar for Reverend Jim
0
322
Member Avatar for happygeek

Sanjib Mitra is a man who likes to be responsible and do the right thing. A year ago he discovered, quite by accident, that a little bit of URL tweaking could reveal personal data about people other than himself within a website database. He was completing a complicated application form …

Member Avatar for happygeek
0
3K
Member Avatar for happygeek

As [news breaks](http://www.usatoday.com/story/tech/2015/06/12/office-of-personnel-management-hack-china/71146452/) that a second breach at the federal Office of Personnel Management may have seen another set of data, potentially more valuable than that accessed during [the first](http://arstechnica.com/security/2015/06/why-the-biggest-government-hack-ever-got-past-opm-dhs-and-nsa/), Philip Lieberman, President of privileged identity management specialists [Lieberman Software](http://www.liebsoft.com/), has been talking about what went wrong. Here's what he …

Member Avatar for jwenting
2
463
Member Avatar for chantalrdj

Hello, My computer has been slow and having problems for the last week or so. A message popped up the other day that my son said something about my internet provider found a threat or something weird. He closed out of the internet quickly, so I never saw it, but …

Member Avatar for Reverend Jim
0
614
Member Avatar for scrapple

Hi, hoping someone might be able to help me with a possible infection. A few months ago, I started to notice some mouse lagging whenever I started chrome. I didn't think anything of it at the time because I usually start chrome with 5 tabs and 5 extensions, and figured …

Member Avatar for scrapple
0
666
Member Avatar for jazzyjaj

Hi I have been experiencing high CPU usage for the past few days. Upon investigation I found out that the iphlpsvc was constantly running at 25% alongwith gpsvc, together putting the CPU usage to frequently 100%. I ran MBAM and AVAST scans I assume they couldnt find anything to fix …

Member Avatar for jazzyjaj
0
1K
Member Avatar for happygeek

In his essay '[A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/2013/12/how-does-nsa-break-ssl.html)' Matthew Green, a cryptographer and research professor at Johns Hopkins University, asks "how the hell is NSA breaking SSL?" If this is news to you, following the Edward Snowden revelations in The Guardian, then you obviously haven't read the New York …

Member Avatar for Tcll
3
939
Member Avatar for BenWard

Hello, I thread hijacked earlier today... probably shouldn't have, sorry if that annoyed anyone. Anyway I have an issue using LookupAccountSid in a visual studio 2013 project running on Windows 7 Pro x64. First of all, it works perfectly in debug, but doesn't work when built for release. What I …

Member Avatar for BenWard
0
1K
Member Avatar for Dodgethese

I believe I got a trojan virus that has caused some damage to my computer which will no longer connect to the internet. I read several threads on here and these are the steps I have already taken: 1)I downloaded and ran Marlwarebytes and AVG. (I think it found the …

Member Avatar for brevo.martin
0
842
Member Avatar for Blueie

Hello I have what looks like a serious compiler error, serious in that I cannot see any of my files in the browser. When I click on 'View in Browser', I get this compiler error: **BC30451: 'DefaultAuthenticationTypes' is not declared. It may be inaccessible due to its protection level.** That …

0
102
Member Avatar for Nirmala_1

Hi, all. Currently i am facing some problem with my coding. I am used this code to insert data from multiple checkbox values into database. but its still not happen anything. Sorry, i am new to php. Please can anyone help me on this? I would be more appreciate if …

Member Avatar for Isaac_4
0
2K
Member Avatar for happygeek

So, today is '[World Paper Free Day](http://www.aiim.org/events/paper-free-day)' apparently and I'm not sure whether it's appropriate to buy a card in the circumstances. Joking aside, what I am sure of is that such Hallmark days do provide an opportunity for press releases to be thrown in my general direction. And so …

Member Avatar for RobertHDD
1
424
Member Avatar for Blueie

Hello I am trying to build a file upload page where a user can upload files and different messages appear on screen to the user of, for example, the name and size of the file successfully uploaded, whether or not he has even selected a file to be uploaded, and …

Member Avatar for Blueie
0
371
Member Avatar for cobra16

Hi I use Firefox as my browser and whenever I enter a search on the "search the web" box I'm diverted momentarily to [url]www.goonsearch.com[/url] then to [url]www.plusnetwork.com[/url] I have tried to eradicate the virus using many tools without success. I have completed all 8 steps in the sticky and included …

Member Avatar for RobertHDD
0
378
Member Avatar for Tazman1058

Hello it seems like my IExplorer has been hijacked. I use Firefox for my browsing. My computer was running slow so i check Task manager and saw that Iexplorer was running in processes but not applications. Also noticed it mutiple IE processes running at same time. I end them but …

Member Avatar for Tcll
0
291
Member Avatar for happygeek

The Onion Router, better known as the Tor Network, is often thought of as being the dark-side of the web. Not least as the anonymity provided by Tor meant that sites hosted on so-called hidden service servers were free to trade in just about anything from drugs and guns through …

Member Avatar for happygeek
2
1K
Member Avatar for happygeek

**How do passwords work?** What a password isn't, or at least really shouldn't be, is some kind of secret word or phrase that is simply compared against a table of usernames in a login database. Such plaintext systems are about as secure as a chocolate padlock on a furnace door. …

Member Avatar for Hiroshe
1
1K
Member Avatar for Moe1981

Hi! Its been a while since i've been here but this place was always good to me before. Well my computer was really slow and 100% usage, i also noticed mysearchdial popup through firefox and i thought it was like an addon so i actually used that it silly me …

Member Avatar for Moe1981
0
948
Member Avatar for Geekitygeek

Hi, I have tried googling and searching for this but just find endless information about why software/hardware based encryption is the better option; what I need to know is whether there are any problems using BOTH. We want our offsite backups have to be as secure as possible. We previously …

Member Avatar for Geekitygeek
0
411
Member Avatar for amadeus47

This may be a bit more complex situation than someone wants to take on. I am not looking for the simple solution of reinstalling. There is something simple I am overlooking. The system boots to the point of selecting the OS. The only one is Windows 7. Win 7 was …

Member Avatar for Uchmantee
0
4K
Member Avatar for CarterLangley

I have got this code from an article on secure login systems. I know basically nothing about php so I would like to know if this is good code to use? Part 1 of 8: Configure Your Server 1. 1 Install a Web Server, PHP and MySQL on your server. …

Member Avatar for kidmizere
0
3K
Member Avatar for Michael_SB

Hello; I got some kind of infection or something last week, which caused my virus software not to update, and finally my computer to totally crash and would not reboot. I successfully recovered my system from an image (it was one level up of messy from actual system restore - …

Member Avatar for JohnKing420
0
942

The End.