589 Archived Topics
Remove Filter ![]() | |
Generally speaking, when it comes to being as secure as possible (and, just as importantly, staying as secure as possible) newer is better. This is certainly the case if we are talking mobile operating systems such as Android and iOS. As of the start of March 2017, according to [Apple's … | |
In his essay '[A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/2013/12/how-does-nsa-break-ssl.html)' Matthew Green, a cryptographer and research professor at Johns Hopkins University, asks "how the hell is NSA breaking SSL?" If this is news to you, following the Edward Snowden revelations in The Guardian, then you obviously haven't read the New York … | |
Apparently it's Data Privacy Day tomorrow (January 28th) which, if you will allow me to quote the [Stay Safe Online](https://www.staysafeonline.org/data-privacy-day/about) website blurb, is an "international effort to empower and educate people to protect their privacy and control their digital footprint". Given the Edward Snowden NSA spying revelations that broke during … | |
[ATTACH=RIGHT]18413[/ATTACH]Are all [URL="http://www.hdmi.org/learningcenter/faq.aspx"]HDMI[/URL] cables created equal? Without lab equipment it is difficult to tell the difference between HDMI [or any cables] at short lengths [under 6 feet]. But signals traveling greater distances do degrade and that is a fact. The longer the wire, the greater the resistance and weaker the … | |
With more than half of the world’s population using email, your business cannot afford to neglect email marketing. And unlike social media sites with their convoluted features and ever-changing algorithms, where no one likes your messages for some reason, email marketing is quite simple. So, how does one become an … | |
The Onion Router, better known as the Tor Network, is often thought of as being the dark-side of the web. Not least as the anonymity provided by Tor meant that sites hosted on so-called hidden service servers were free to trade in just about anything from drugs and guns through … | |
One of the Internet's biggest online dating sites, eHarmony, has confirmed that security has been breached and member passwords compromised. eHarmony spokesperson Becky Teraoka says that "a small fraction of our user base has been affected" although I am led to understand that the 'small fraction' in question is actually … | |
Recently we have all become somewhat over-exposed to the leaking of customer data courtesy of inadequate security allowing hackers to gain access to databases. The [LinkedIn LeakedOut leak](http://www.daniweb.com/internet-marketing/social-media-and-communities/news/425019/linkedin-confirms-six-million-password-hack-check-if-yours-is-one-of-them) and [eHarmony dating data disaster](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/425118/dating-disaster-eharmony-confirms-passwords-exposed-by-linkedin-hacker#post1817377) are good examples of the genre. However, let's not forget that sometimes no hackers are required to … | |
[ATTACH=RIGHT]21290[/ATTACH]The HP ProBook 6560b at first glance is not distinguishable from other laptops. However, this business rugged machine was designed for the modern day businessman. It’s sleek, charcoal black aluminum case is smooth to the touch. Weighing in at a little less than six pounds, this laptop was made to … | |
As suggested by Duki in [URL="http://www.daniweb.com/forums/thread298488.html"]this thread[/URL] I figured I'd compile all the workable examples and explanations here towards the question of "Why do we use get/ set to change properties?" [QUOTE=pritesh2010]Properties provide the opportunity to protect a field in a class by reading and writing to it through the … | |
This is a friends son computer. I have already uninstalled limewire as requested. HP dv8000. Originally was getting 2010 antivirus popups. Has no AV and I was going to put microsoft security essentials in it if this was thought to be a good idea. Computer is REAL REAL slow. Thanks … | |
In today's digital age, businesses rely heavily on customer data to enhance their operations, personalize experiences, and drive growth. However, the increasing importance of customer data brings along significant cybersecurity challenges. Protecting this data is not only a legal and ethical obligation but also crucial for maintaining customer trust and … | |
**AI policy theorist Demetrius Floudas introduces a novel era classification for the AI epoch and reveals the hidden dangers of AGI, predicting the potential obsolescence of humanity. In retort, he proposes a provocative International Control Treaty.**  ## About Demetrius A. Floudas ##  **[Demetrius A. Floudas](http://talks.cam.ac.uk/show/index/131770)** is a transnational … | |
When it comes to enterprise computer technology, everything seems to be happening in the cloud these days. Offsite storage was one of the first iterations of cloud computing and is continuing to gain traction as a smart way for companies to safely retain data. You're probably familiar with the typical … | |
Hello everyone, I wrote data arrays at the end of the exe with delimiter. After I compiled, the app it didn't work on Chinese Windows, only on English, I want to configure the app to work on Chinese windows as well, I know it will work if I change the … | |
Following the recent ransomware attacks that leveraged the WannaCrypt0r malware and NSA-developed EternalBlue vulnerability exploit, there was [plenty of advice](https://happygeek.com/?p=812) that backup, backup, backup was the best mitigation. Data backups are, of course, an important part of any business continuity strategy. However, what happens when your backups are also encrypted … | |
I've had my hands on what is being described as the 'most secure hard drive ever made' for a while now. Such are the advantages of being a well known reporter on all things security I guess, I get to play ahead of the crowd. As the first journalist to … | |
So, today is '[World Paper Free Day](http://www.aiim.org/events/paper-free-day)' apparently and I'm not sure whether it's appropriate to buy a card in the circumstances. Joking aside, what I am sure of is that such Hallmark days do provide an opportunity for press releases to be thrown in my general direction. And so … | |
**How do passwords work?** What a password isn't, or at least really shouldn't be, is some kind of secret word or phrase that is simply compared against a table of usernames in a login database. Such plaintext systems are about as secure as a chocolate padlock on a furnace door. … | |
The AR.Drone is what is known as a quadricopter device, and the Parrot drones are probably responsible for kick-starting the whole consumer drone industry. Unpacking the box you immediately notice how light it is, and how little you get by way of stuff to assemble or plug-in. Beyond the couple … | |
EDIT: links fixed Hello guys ! Alot of people today want or actually have a website. But do they really understand the possible risks and dagers on the internet? You can never know when hackers or other institutions will target you, and people do not realize that your personal information … ![]() | |
class_session.php is a session management and password protection class. It can be used to perform 2 major functions: 1. Create and maintain session state between page hits. The class does this using simple session cache files into which the session is stored as a serialized array. This is similar to … ![]() | |
The UK Information Commissioner's Office (ICO) has slapped the Greater Manchester Police force with a £150,000 fine (reduced to £120,000 for early payment) after a memory stick containing sensitive data about serious crimes was stolen from the home of a police officer.  The ICO has the power to … ![]() | |
Zurich Insurance in the UK has just discovered the true cost of failing to secure confidential customer data properly, as the Financial Services Authority (FSA) fines the company a record £2.275m ($3.5m) for the data loss incident in 2008 which potentially put some 46,000 customers at risk. [attach]16866[/attach]The incident occurred … ![]() | |
[ATTACH=RIGHT]21161[/ATTACH]Power, it’s a dirty word. Power corrupts, and I don’t just mean people and politicians. Power problems, impurities and inconsistencies are a huge contributor to problems with sensitive computer equipment. Power problems can damage hardware as well as your files and data. The losses and downtime that result from power … | |
"It's unbelievable, the kind of data that's out there about you," Cisco's principal security strategist Patrick Gray told a crowd in Boise, Idaho, this morning. The problem is that criminal hackers can use that kind of information to target a company, Gray said. He described one case where criminals in … | |
[ATTACH=RIGHT]19603[/ATTACH]I normally begin reviews with some background of the company or product I’m writing about but in this case let me say: every I.T. professional, programmer, developer, digital artist or person that carries their data and files around on a flash drive or disk needs an Imation Defender Biometric product. … | |
The likes of Norton these days make much fuss about just how quick installing a security suite is, but you can forget all claims of being done in 60 seconds when it comes to Trend Micro Titanium Maximum Security. Think less of speedy rocket-powered installations and more of slow and … | |
First, before i start posting this thread, i just want to say I'm sorry if there is already a similar thread or exactly the same topic with same contents with mine. OK, let's start. [B]SPEED UP YOUR XP NEVER THAN BEFORE[/B] [B][U]NOTICE[/U][/B] In this XP SpeedUp, it includes XP Tweaks, … | |
Back in May, I [URL="http://www.daniweb.com/blogs/entry1466.html"]broke the story[/URL] on DaniWeb in this very blog of how the online application facility for UK visas was not only insecure, but that it had potentially been so for years. The company concerned, VFS Global, which operated the visa online application form filing service on … | |
Hi My PC has been running extremely slow nowadays. Can you help me pls. Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 11:15:06 a.m., on 19/12/2008 Platform: Windows XP SP3 (WinNT 5.01.2600) MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe … | |
Hi everyone, I’m just starting out with testing and I need to generate some test data for things like names, birthdays, emails, and other basic information. I’m looking for web-based resources or tools that provide random test data for use in my testing. like i used this *<Promotional link snipped>* … | |
**Almost two years into the AI hype, a looming market correction may soon separate true innovators from those who are trying to capitalize on the hype. The burst of the bubble could pave the way for a more mature phase of AI development.**  Amidst recent turmoil on the stock … | |
The rise in data usage and exponential growth of remote work in recent years has increased the need for reliable data centers all around the world. Since data centers are critical for wide-scale networking, data storage, and information sharing, they require exceptional security measures to safeguard them from rapidly evolving … | |
Thank you all for being here to help me with this problem I'm having. I've used computers for years but this is over my head. I saw a post here when you guys helped a lady a few years back having a similiar problem with her software. I hope you … | |
Hi DW. Well I'm very much interested in the data protection and also giving the best privacy to the public where we protect your passwords. I've seen something that Firefox had introduced to their browsers with also their Apps. This is called LockWise which is a tool to sync your … | |
CAPTCHAs, authentication codes, and click-throughs are the scourge of Internet users everywhere. Nobody wants to waste time filling out a form while they’re browsing the web, even if it takes just a few seconds. But although these systems may be a nuisance, they serve a very important purpose. Blocking bots … | |
The insurance business was conservative quite a long time; however, the appropriation of new advances isn't only a cutting edge pattern, but a need to keep up the competition. In our computerized era, Big Data innovations help to process various data, improve work process productivity, and reduce operational expenses. Learn … | |
The Conservative party issued a statement on Saturday which apologised for "any concern caused" and confirmed that "the technical issue has been resolved and the app is now functioning securely." However, not before Boris Johnson's profile image had been changed to a pornographic one and that of Environment Secretary, Michael … | |
Hi I am talking GDPR and Data Protection Act 2018. Can an organisation in the UK have its sales staff wearing name tags/badges with the employees' full name displayed on them? Thanks | |
Guardian newspaper columnist [Dawn Foster](https://twitter.com/DawnHFoster) posted images on Twitter this weekend showing how she was able to login to the official Conservative party conference app as Boris Johnson, until recently the UK Foreign Secretary. Not only was there no password required to login to the app, all that was required … | |
Does anyone know the function and origin of the wireless profile, bungle4? I've been cleaning up my numerous vbScript files and when I tidied, then tested Metered.vbs, it produced the following: D:\>metered Profiles on interface Wi-Fi: All User Profile : bungle4 All User Profile : mynet Metered.vbs is a script … | |
![]() | Hi everyone, I am working on a coin collection app, and I have recently started integrating core data into my app. My app is of the following format: I have a core data database which stores custom CoinCategory objects and each CoinCategory object has an array of Coin objects. This … |
Hi there, Routing is not working in codeigniter hostgator shared hosting. When i login www.doamain.com/admin this redirects to www.domain.com am using below in my config.php <?php if ( ! defined('BASEPATH')) exit('No direct script access allowed'); /* |-------------------------------------------------------------------------- | Base Site URL |-------------------------------------------------------------------------- | | URL to your CodeIgniter root. Typically … | |
Hi All, I work for a college and I use their systems, which I have access to a whole host of software that for Data protection reasons that cant be installed on any other computer. The issue is, I dont like using them as I dont feel very productive as … | |
I wish that you all are fine, My name is Ahmed Bahr From Egypt. Im 21 years old and in 2016 ill become a senior at Business Information Systems- Helwan University. So.. I have a little problem in my graduation project that my doctor decided to join an international competition … | |
I wish that you are all fine, My name is Ahmed Bahr From Egypt. Im 21 years old and in 2016 ill become a senior at Business Information Systems- Helwan University. So.. I have a little problem in my graduation project that my doctor decided to join an international competition … | |
Hi, I got error in send_string(lala): how to fix it ? thnaks ... #include <p24Hxxxx.h> #include <libpic30.h> #include <stdio.h> int FBS __attribute__((space(prog), address(0xF80000))) = 0xCF ; //_FBS( // BWRP_WRPROTECT_OFF & // Boot Segment Write Protect (Boot Segment may be written) // BSS_NO_FLASH & // Boot Segment Program Flash Code Protection … | |
hi, I am new to C programming. I want to program a running LED on my PIC24 (PIC24HJ256GP206) I have 5 LED on my PORT G and have input PORTB (RB0) My program should, if RB0 is grounded (I put jumper on my circuit) the LED will be running faster, … | |
I want to encrypt and decrypt the password and username of my login table I already populate my login table with 5 rows Can anyone suggest some Encryption and decryption algorithms for Password protection? here is my current code Option Strict On Imports System.Data.SqlClient Public Class Frmlogin Private strCon As … |
The End.