589 Archived Topics

Remove Filter
Member Avatar for
Member Avatar for happygeek

Generally speaking, when it comes to being as secure as possible (and, just as importantly, staying as secure as possible) newer is better. This is certainly the case if we are talking mobile operating systems such as Android and iOS. As of the start of March 2017, according to [Apple's …

Member Avatar for shujat_2
4
736
Member Avatar for happygeek

In his essay '[A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/2013/12/how-does-nsa-break-ssl.html)' Matthew Green, a cryptographer and research professor at Johns Hopkins University, asks "how the hell is NSA breaking SSL?" If this is news to you, following the Edward Snowden revelations in The Guardian, then you obviously haven't read the New York …

Member Avatar for Tcll
3
939
Member Avatar for happygeek

Apparently it's Data Privacy Day tomorrow (January 28th) which, if you will allow me to quote the [Stay Safe Online](https://www.staysafeonline.org/data-privacy-day/about) website blurb, is an "international effort to empower and educate people to protect their privacy and control their digital footprint". Given the Edward Snowden NSA spying revelations that broke during …

Member Avatar for gerbil
3
672
Member Avatar for WASDted

[ATTACH=RIGHT]18413[/ATTACH]Are all [URL="http://www.hdmi.org/learningcenter/faq.aspx"]HDMI[/URL] cables created equal? Without lab equipment it is difficult to tell the difference between HDMI [or any cables] at short lengths [under 6 feet]. But signals traveling greater distances do degrade and that is a fact. The longer the wire, the greater the resistance and weaker the …

3
828
Member Avatar for Tiffany_6

With more than half of the world’s population using email, your business cannot afford to neglect email marketing. And unlike social media sites with their convoluted features and ever-changing algorithms, where no one likes your messages for some reason, email marketing is quite simple. So, how does one become an …

Member Avatar for redplanetpk
2
75
Member Avatar for happygeek

The Onion Router, better known as the Tor Network, is often thought of as being the dark-side of the web. Not least as the anonymity provided by Tor meant that sites hosted on so-called hidden service servers were free to trade in just about anything from drugs and guns through …

Member Avatar for happygeek
2
1K
Member Avatar for happygeek

One of the Internet's biggest online dating sites, eHarmony, has confirmed that security has been breached and member passwords compromised. eHarmony spokesperson Becky Teraoka says that "a small fraction of our user base has been affected" although I am led to understand that the 'small fraction' in question is actually …

Member Avatar for rubeccamatthews
2
818
Member Avatar for happygeek

Recently we have all become somewhat over-exposed to the leaking of customer data courtesy of inadequate security allowing hackers to gain access to databases. The [LinkedIn LeakedOut leak](http://www.daniweb.com/internet-marketing/social-media-and-communities/news/425019/linkedin-confirms-six-million-password-hack-check-if-yours-is-one-of-them) and [eHarmony dating data disaster](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/425118/dating-disaster-eharmony-confirms-passwords-exposed-by-linkedin-hacker#post1817377) are good examples of the genre. However, let's not forget that sometimes no hackers are required to …

Member Avatar for happygeek
2
949
Member Avatar for Sariscos

[ATTACH=RIGHT]21290[/ATTACH]The HP ProBook 6560b at first glance is not distinguishable from other laptops. However, this business rugged machine was designed for the modern day businessman. It’s sleek, charcoal black aluminum case is smooth to the touch. Weighing in at a little less than six pounds, this laptop was made to …

Member Avatar for AndrewH
2
721
Member Avatar for Lusiphur

As suggested by Duki in [URL="http://www.daniweb.com/forums/thread298488.html"]this thread[/URL] I figured I'd compile all the workable examples and explanations here towards the question of "Why do we use get/ set to change properties?" [QUOTE=pritesh2010]Properties provide the opportunity to protect a field in a class by reading and writing to it through the …

2
504
Member Avatar for sampson

This is a friends son computer. I have already uninstalled limewire as requested. HP dv8000. Originally was getting 2010 antivirus popups. Has no AV and I was going to put microsoft security essentials in it if this was thought to be a good idea. Computer is REAL REAL slow. Thanks …

Member Avatar for crunchie
2
234
Member Avatar for Bam_391

In today's digital age, businesses rely heavily on customer data to enhance their operations, personalize experiences, and drive growth. However, the increasing importance of customer data brings along significant cybersecurity challenges. Protecting this data is not only a legal and ethical obligation but also crucial for maintaining customer trust and …

Member Avatar for graceweb
1
117
Member Avatar for Johannes C.

**AI policy theorist Demetrius Floudas introduces a novel era classification for the AI epoch and reveals the hidden dangers of AGI, predicting the potential obsolescence of humanity. In retort, he proposes a provocative International Control Treaty.** ![header-agitalks-demetrius.jpg](https://static.daniweb.com/attachments/4/7653d6d6303a1d7a716bdbb6853b7428.jpg) ## About Demetrius A. Floudas ## ![portrait-daf-small.jpg](https://static.daniweb.com/attachments/4/6a470c87d1451a9cf00ce559d1ea18d9.jpg) **[Demetrius A. Floudas](http://talks.cam.ac.uk/show/index/131770)** is a transnational …

Member Avatar for rproffitt
1
561
Member Avatar for Lisa Hoover

When it comes to enterprise computer technology, everything seems to be happening in the cloud these days. Offsite storage was one of the first iterations of cloud computing and is continuing to gain traction as a smart way for companies to safely retain data. You're probably familiar with the typical …

Member Avatar for markanderson_1
1
332
Member Avatar for NewAccount

Hello everyone, I wrote data arrays at the end of the exe with delimiter. After I compiled, the app it didn't work on Chinese Windows, only on English, I want to configure the app to work on Chinese windows as well, I know it will work if I change the …

Member Avatar for rproffitt
1
294
Member Avatar for happygeek

Following the recent ransomware attacks that leveraged the WannaCrypt0r malware and NSA-developed EternalBlue vulnerability exploit, there was [plenty of advice](https://happygeek.com/?p=812) that backup, backup, backup was the best mitigation. Data backups are, of course, an important part of any business continuity strategy. However, what happens when your backups are also encrypted …

Member Avatar for Josh Ross
1
517
Member Avatar for happygeek

I've had my hands on what is being described as the 'most secure hard drive ever made' for a while now. Such are the advantages of being a well known reporter on all things security I guess, I get to play ahead of the crowd. As the first journalist to …

Member Avatar for AssertNull
1
805
Member Avatar for happygeek

So, today is '[World Paper Free Day](http://www.aiim.org/events/paper-free-day)' apparently and I'm not sure whether it's appropriate to buy a card in the circumstances. Joking aside, what I am sure of is that such Hallmark days do provide an opportunity for press releases to be thrown in my general direction. And so …

Member Avatar for RobertHDD
1
424
Member Avatar for happygeek

**How do passwords work?** What a password isn't, or at least really shouldn't be, is some kind of secret word or phrase that is simply compared against a table of usernames in a login database. Such plaintext systems are about as secure as a chocolate padlock on a furnace door. …

Member Avatar for Hiroshe
1
1K
Member Avatar for happygeek

The AR.Drone is what is known as a quadricopter device, and the Parrot drones are probably responsible for kick-starting the whole consumer drone industry. Unpacking the box you immediately notice how light it is, and how little you get by way of stuff to assemble or plug-in. Beyond the couple …

Member Avatar for Kelly Burby
1
607
Member Avatar for Vincentas

EDIT: links fixed Hello guys ! Alot of people today want or actually have a website. But do they really understand the possible risks and dagers on the internet? You can never know when hackers or other institutions will target you, and people do not realize that your personal information …

Member Avatar for M.Ledovich
1
268
Member Avatar for Troy

class_session.php is a session management and password protection class. It can be used to perform 2 major functions: 1. Create and maintain session state between page hits. The class does this using simple session cache files into which the session is stored as a serialized array. This is similar to …

Member Avatar for LastMitch
1
642
Member Avatar for happygeek

The UK Information Commissioner's Office (ICO) has slapped the Greater Manchester Police force with a £150,000 fine (reduced to £120,000 for early payment) after a memory stick containing sensitive data about serious crimes was stolen from the home of a police officer. ![dweb-police](/attachments/small/0/dweb-police.jpg "align-right") The ICO has the power to …

Member Avatar for LastMitch
1
353
Member Avatar for happygeek

Zurich Insurance in the UK has just discovered the true cost of failing to secure confidential customer data properly, as the Financial Services Authority (FSA) fines the company a record £2.275m ($3.5m) for the data loss incident in 2008 which potentially put some 46,000 customers at risk. [attach]16866[/attach]The incident occurred …

Member Avatar for LastMitch
1
579
Member Avatar for WASDted

[ATTACH=RIGHT]21161[/ATTACH]Power, it’s a dirty word. Power corrupts, and I don’t just mean people and politicians. Power problems, impurities and inconsistencies are a huge contributor to problems with sensitive computer equipment. Power problems can damage hardware as well as your files and data. The losses and downtime that result from power …

Member Avatar for Mastaba
1
2K
Member Avatar for slfisher

"It's unbelievable, the kind of data that's out there about you," Cisco's principal security strategist Patrick Gray told a crowd in Boise, Idaho, this morning. The problem is that criminal hackers can use that kind of information to target a company, Gray said. He described one case where criminals in …

Member Avatar for jonlucas
1
861
Member Avatar for WASDted

[ATTACH=RIGHT]19603[/ATTACH]I normally begin reviews with some background of the company or product I’m writing about but in this case let me say: every I.T. professional, programmer, developer, digital artist or person that carries their data and files around on a flash drive or disk needs an Imation Defender Biometric product. …

Member Avatar for happygeek
1
345
Member Avatar for happygeek

The likes of Norton these days make much fuss about just how quick installing a security suite is, but you can forget all claims of being done in 60 seconds when it comes to Trend Micro Titanium Maximum Security. Think less of speedy rocket-powered installations and more of slow and …

1
722
Member Avatar for fishyking

First, before i start posting this thread, i just want to say I'm sorry if there is already a similar thread or exactly the same topic with same contents with mine. OK, let's start. [B]SPEED UP YOUR XP NEVER THAN BEFORE[/B] [B][U]NOTICE[/U][/B] In this XP SpeedUp, it includes XP Tweaks, …

Member Avatar for yaduks
1
2K
Member Avatar for happygeek

Back in May, I [URL="http://www.daniweb.com/blogs/entry1466.html"]broke the story[/URL] on DaniWeb in this very blog of how the online application facility for UK visas was not only insecure, but that it had potentially been so for years. The company concerned, VFS Global, which operated the visa online application form filing service on …

Member Avatar for Dani
1
458
Member Avatar for foxkueh

Hi My PC has been running extremely slow nowadays. Can you help me pls. Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 11:15:06 a.m., on 19/12/2008 Platform: Windows XP SP3 (WinNT 5.01.2600) MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe …

Member Avatar for foxkueh
1
313
Member Avatar for jamesalery

Hi everyone, I’m just starting out with testing and I need to generate some test data for things like names, birthdays, emails, and other basic information. I’m looking for web-based resources or tools that provide random test data for use in my testing. like i used this *<Promotional link snipped>* …

Member Avatar for gediminas.bukauskas.7
0
63
Member Avatar for Johannes C.

**Almost two years into the AI hype, a looming market correction may soon separate true innovators from those who are trying to capitalize on the hype. The burst of the bubble could pave the way for a more mature phase of AI development.** ![ai-bubble.jpg](https://static.daniweb.com/attachments/4/03423bc2c2c9c9522a397e8fc70b26d9.jpg) Amidst recent turmoil on the stock …

Member Avatar for meyerrluanna
0
219
Member Avatar for trayalex812

The rise in data usage and exponential growth of remote work in recent years has increased the need for reliable data centers all around the world. Since data centers are critical for wide-scale networking, data storage, and information sharing, they require exceptional security measures to safeguard them from rapidly evolving …

0
317
Member Avatar for teatear

Thank you all for being here to help me with this problem I'm having. I've used computers for years but this is over my head. I saw a post here when you guys helped a lady a few years back having a similiar problem with her software. I hope you …

Member Avatar for haibatullahsafi
0
706
Member Avatar for Mr.M

Hi DW. Well I'm very much interested in the data protection and also giving the best privacy to the public where we protect your passwords. I've seen something that Firefox had introduced to their browsers with also their Apps. This is called LockWise which is a tool to sync your …

0
1K
Member Avatar for PureManurea

CAPTCHAs, authentication codes, and click-throughs are the scourge of Internet users everywhere. Nobody wants to waste time filling out a form while they’re browsing the web, even if it takes just a few seconds. But although these systems may be a nuisance, they serve a very important purpose. Blocking bots …

0
237
Member Avatar for Ellina_1

The insurance business was conservative quite a long time; however, the appropriation of new advances isn't only a cutting edge pattern, but a need to keep up the competition. In our computerized era, Big Data innovations help to process various data, improve work process productivity, and reduce operational expenses. Learn …

0
208
Member Avatar for Danilo22

The Conservative party issued a statement on Saturday which apologised for "any concern caused" and confirmed that "the technical issue has been resolved and the app is now functioning securely." However, not before Boris Johnson's profile image had been changed to a pornographic one and that of Environment Secretary, Michael …

0
497
Member Avatar for Frisko

Hi I am talking GDPR and Data Protection Act 2018. Can an organisation in the UK have its sales staff wearing name tags/badges with the employees' full name displayed on them? Thanks

Member Avatar for happygeek
0
441
Member Avatar for happygeek

Guardian newspaper columnist [Dawn Foster](https://twitter.com/DawnHFoster) posted images on Twitter this weekend showing how she was able to login to the official Conservative party conference app as Boris Johnson, until recently the UK Foreign Secretary. Not only was there no password required to login to the app, all that was required …

Member Avatar for pty
0
1K
Member Avatar for Reverend Jim

Does anyone know the function and origin of the wireless profile, bungle4? I've been cleaning up my numerous vbScript files and when I tidied, then tested Metered.vbs, it produced the following: D:\>metered Profiles on interface Wi-Fi: All User Profile : bungle4 All User Profile : mynet Metered.vbs is a script …

Member Avatar for Reverend Jim
0
512
Member Avatar for Nathan_6

Hi everyone, I am working on a coin collection app, and I have recently started integrating core data into my app. My app is of the following format: I have a core data database which stores custom CoinCategory objects and each CoinCategory object has an array of Coin objects. This …

Member Avatar for JamesCherrill
0
767
Member Avatar for praba_web

Hi there, Routing is not working in codeigniter hostgator shared hosting. When i login www.doamain.com/admin this redirects to www.domain.com am using below in my config.php <?php if ( ! defined('BASEPATH')) exit('No direct script access allowed'); /* |-------------------------------------------------------------------------- | Base Site URL |-------------------------------------------------------------------------- | | URL to your CodeIgniter root. Typically …

Member Avatar for praba_web
0
4K
Member Avatar for Michael_35

Hi All, I work for a college and I use their systems, which I have access to a whole host of software that for Data protection reasons that cant be installed on any other computer. The issue is, I dont like using them as I dont feel very productive as …

Member Avatar for overwraith
0
337
Member Avatar for Ahmed_64

I wish that you all are fine, My name is Ahmed Bahr From Egypt. Im 21 years old and in 2016 ill become a senior at Business Information Systems- Helwan University. So.. I have a little problem in my graduation project that my doctor decided to join an international competition …

Member Avatar for hericles
0
261
Member Avatar for Ahmed_64

I wish that you are all fine, My name is Ahmed Bahr From Egypt. Im 21 years old and in 2016 ill become a senior at Business Information Systems- Helwan University. So.. I have a little problem in my graduation project that my doctor decided to join an international competition …

Member Avatar for rubberman
0
389
Member Avatar for naz1234

Hi, I got error in send_string(lala): how to fix it ? thnaks ... #include <p24Hxxxx.h> #include <libpic30.h> #include <stdio.h> int FBS __attribute__((space(prog), address(0xF80000))) = 0xCF ; //_FBS( // BWRP_WRPROTECT_OFF & // Boot Segment Write Protect (Boot Segment may be written) // BSS_NO_FLASH & // Boot Segment Program Flash Code Protection …

Member Avatar for rubberman
0
197
Member Avatar for naz1234

hi, I am new to C programming. I want to program a running LED on my PIC24 (PIC24HJ256GP206) I have 5 LED on my PORT G and have input PORTB (RB0) My program should, if RB0 is grounded (I put jumper on my circuit) the LED will be running faster, …

0
187
Member Avatar for Christopher_12

I want to encrypt and decrypt the password and username of my login table I already populate my login table with 5 rows Can anyone suggest some Encryption and decryption algorithms for Password protection? here is my current code Option Strict On Imports System.Data.SqlClient Public Class Frmlogin Private strCon As …

Member Avatar for Reverend Jim
0
322

The End.