I could easily buy a liquid cooler and call it a day, but unfortunately this is going into a 4U rack server chassis. it has a double 120mm fan but its covered by drive bays. the only other fan is 80mm, and i dont know any liquid coolers with a radiator that small. I am thinking air cooler. It is a i7-7800X so im concerned about temps. Ideas for cooling?

Member Avatar
Member Avatar
+0 forum 1

I download some music songs from a website. The website gets the requests from users and then it searches through WWW and lists you hundreds of URL that may have fulfilled your requests. I got what I want, but when I doubled clicks the music files, which are of RM format, a webpage immediately popped out. Do you think if the downloaded music files had been infected by spywares?

Member Avatar
Member Avatar
+0 forum 1

Hello, After searching over the internet how to secure a web application(forms) in PHP, in most of the cases were just suggestions not a short and real example. In some cases is suggested to use strip_tags( trim( $_POST['PARAMETER'] ) ); but when you have some special inputs like comments field htmlentities ( trim ( $_POST[ ‘comment’ ] ) , ENT_NOQUOTES ); is suggest. Maybe there is a useful example (custom made function) to achieve standard safe methods without introducing complicated libraries like HTMLPurifier into the application. Thank you for your time!

Member Avatar
Member Avatar
+0 forum 5

Hello friends, I am facing problem related to my email service. I just want to know that How do I recover my RoadRunner email password. If anyone have good knowledge about this. Then please share with me. Thank you

Member Avatar
Member Avatar
+0 forum 2

Dear folks Simple task can't get it work https://www.askdavetaylor.com/enable-parental-controls-linksys-wi-fi-router/ Tried to block internet access for one of my iPhone for testing purpose (it has dummy SIM means no cellular data) Enable Parental Controls (i.e it is ON) Choose a specific home device that I want to block then choose option : "Always" ,,,,,,,,,,,,my router screenshot same as the link above Click Apply But it didn't work !!!! Tried another iphone same issue I have latest firmware and I did restart the router as well Am I missing something ? Thanks

Member Avatar
Member Avatar
+0 forum 1

Hello, One type of SQLIA is UNION Query and I still do not completely understand what is the point. SELECT Name, Address FROM Users WHERE Id=$id by injecting the following- Id value: $id=1 UNION ALL SELECT creditCardNumber,1 FROM CreditCarTable. We will have the following query: - SELECT Name, Address FROM Users WHERE Id=1 UNION ALL SELECT creditCardNumber, 1 FROM CreditCarTable What is the point of uniting the sqlia with another table which values are being kept secret? Are main point is to be able to login to the admin for example.

Member Avatar
Member Avatar
+0 forum 4

How to prevent Illegel/ Logically Incorrect Queries? Illegal/Logically Incorrect Queries 1)Original URL:http://www.arch.polimi.it/eventi/?id_nav=886 2)SQLInjection: http:/`/www.arch.polimi.it/eventi/?id_nav=8864' 3) Error message showed: SELECT name FROM Employee WHERE id =8864' from the message error we can find out name of table and fields: name; Employee; id. By the gained information attacker can arrange more strict attacks Should I hide the error message into 404 - Error instead of showing all of them? or is there any other method to prevent this?

Member Avatar
Member Avatar
+0 forum 1

Hello, I am trying to understand prepared statement and what it does. https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet#Defense_Option_1:_Prepared_Statements_.28Parameterized_Queries.29 "Prepared statements ensure that an attacker is not able to change the intent of a query, even if SQL commands are inserted by an attacker. In the safe example below, if an attacker were to enter the userID of tom' or '1'='1, the parameterized query would not be vulnerable and would instead look for a username which literally matched the entire string tom' or '1'='1. " If an attacker input: userID of tom' or '1'='1 what will prepared statement detect as a userID? userID: tom Is that …

Member Avatar
Member Avatar
+0 forum 3

I am inform every bady in bar codes

Member Avatar
Member Avatar
+0 forum 2

Hello, I am planning to do my Thesis on SQLIA and now I am trying to understand something about SQLrand. SQLrand - a system for preventing SQLIA against web servers. The main intuition is that by using a randomized SQL query language, specific to a particular CGI application, it is possible to detect and abort queries that include injected code. Now, I do not understand how to randomized the SQL query language? https://www.w3schools.com/sql/func_sqlserver_rand.asp is that how you randomize the SELECT SQL command ? Please gives me some guidelines. Thanks in advance.

Member Avatar
Member Avatar
+0 forum 3

A survey of attendees at Infosecurity Europe earlier this month showed 70 percent in favour of the dictionary definition (in this case the Cambridge Dictionary) of a hacker being amended. The amendment in question being to remove 'illegality' from the definition. The current definition of a hacker is "a person who is skilled in the use of computer systems, often one who illegally obtains access to private computer systems". So what do you reckon, DaniWebbers? Is it time that hacker was reclaimed entirely (rather than relying upon black and white labels) and if so what word should replace it as …

Member Avatar
Member Avatar
+0 forum 6

Recently Thunderbird asked me to login again for Gmail. It presents me a form in which I have to insert the password. It is the same form as when I login to my Google account via my browser. Only the NEXT button does not work. Do you have an idea how to solve this?

Member Avatar
Member Avatar
+0 forum 4

hello everyone.. i am a final year student. we are asked to do a project in networking.. what kind of project in networking should i do.. i confuse what kind of project should i do.. i am in need of a project topic which is feasible and can be finished within 2 months duration.. i'll be very thankful if u can suggest me a good topic.. thanks in advance..

Member Avatar
Member Avatar
+0 forum 5

I was working on C# windows application as front end and SQL as back end I have display my sql table data in dtatgridview. [B]I want to display the data in textbox whatever row i select in datagridview.[/B] I have write some code but its not showing data in textboxes. here is my code: [B]the code is on datagridview cellcontentclick event[/B] [CODE] cn.ConnectionString = "Data Source=sam-AB59A9C19;Initial Catalog=master;Integrated Security=True"; cn.Open(); SqlCommand cmd = new SqlCommand(); SqlDataReader rdr; string cd = dataGridView1.SelectedRows.ToString(); string CommandText = "select * from acc where id=@id"; cmd = new SqlCommand(CommandText); cmd.Connection = cn; cmd.Parameters.Add(new SqlParameter("@id", System.Data.SqlDbType.VarChar, 20, …

Member Avatar
Member Avatar
+0 forum 10

Here's the full notice -> https://arstechnica.com/information-technology/2018/05/fbi-tells-router-users-to-reboot-now-to-kill-malware-infecting-500k-devices/ You can read what happened if you wish but just a r̴e̴b̴o̴o̴t̴ ̴a̴n̴d̴ ̴i̴t̴'̴s̴ ̴g̴a̴m̴e̴ ̴o̴v̴e̴r̴ ̴f̴o̴r̴ ̴t̴h̴i̴s̴ ̴m̴a̴l̴w̴a̴r̴e̴.̴ **Update in new reply.**

Member Avatar
Member Avatar
+0 forum 1

Hello, I am in the middle of learning about IT Security. I wonder why sometimes people uses ASCII value for SQL injection attack? Do you know the reason why? Why not using normal ' mark.

Member Avatar
Member Avatar
+0 forum 3

Hello, I have a question about who uses https:// instead of http:// ? What is the point of encrypting the information if that is the point? Who normally uses it? Ecommerce? Bank? Who else? If am I right?

Member Avatar
Member Avatar
+0 forum 6

I think the community in general will benefit from this discussion. I have an IT horror story I would like to tell everybody about. Additionally I have discovered some solutions to some IT problems, which may have been faced by others in the community. A few years ago I started going to college, and got wholluped by a gang of social engineers in the omaha/bellevue area. Unbenounced to me they were actually preforming skits on me in order to preform black mail attacks at a later date. Now you may believe that if you aren't doing anything wrong you should …

Member Avatar
Member Avatar
+0 forum 3

In case you missed it Google has a serious problem with Symantec SSL certificates and is removing their Greenbar status in Chrome as well as rolling out "not trusted" notices for sites using mis-issued certs by Symantec. https://techcrunch.com/2017/03/27/google-is-fighting-with-symantec-over-encrypting-the-internet/ In response to the problems Namecheap is offering free replacement of the certificates - you get whatever time is left on your Symantec SSL certificate on a Comodo SSL for free. https://www.namecheap.com/security/symantec-ssl-certificate-free-replacement.aspx

Member Avatar
Member Avatar
+0 forum 3

what is SSL and HTTPS is there any major distance?

Member Avatar
Member Avatar
-1 forum 2

This is my 1st post on this Forum - Hello My Name is Michael and I'm from Poland :) I have a question about security in Internet. I'm active user of Internet and I have now some anxiety, maybe unjustified, but I have :( I'm logged in webbrowser on my Google (Gmail) account (sometimes Facebook) and in this time I use other websites: This is my Question: Is my activity on these websites (and names of these websites) saving somewhere on servers: google, facebook or others servers information about me? It worries me if in the future someone will be …

Member Avatar
Member Avatar
+0 forum 2

HELP!! I have a windows server 2012 r2 . I can still use my server until i fell asleep and now woke up, And can't log in to my administrator account. I didn't change password at all, i use the same password and i'd make sure that it is correct. But still not working. Only i can access the guest account. I research and tried some tutorials but not working. I don't have installation CD and my physical back is already affected by AMNESIA file, can't copy because it needs admin rights. I found out that all of my files …

Member Avatar
Member Avatar
+0 forum 26

Hi. I'm concerned an ex has installed spy software on my computer (and maybe iPhone, but that's for another thread). I've spent days reading about it and I'm not really any closer to figuring out if this is the case, and if so how to uninstall it. Any help would be much appreciated!

Member Avatar
Member Avatar
+0 forum 1

The second annual Imperva Hacker Intelligence Initiative report, this one entitled [Monitoring Hacker Forums](http://www.imperva.com/docs/HII_Monitoring_Hacker_Forums_2012.pdf), is out and reveals that the threat surfaces being discussed by the hacker community are very different from those that businesses are spending money on defending against attack. ![dweb-hackers](/attachments/small/0/dweb-hackers.jpg "align-right") The Imperva research analysed the content of a number of online hacker communities, including many lesser known forums in order to get a more accurate snapshot of what those doing the hacking are actually discussing. By looking at a total of more than 400,000 different conversational threads, Imperva was able to determine that SQL injection and …

Member Avatar
Member Avatar
+0 forum 2

Which is the most reliable free antivirus for USB flash drives that resides and runs from the device itself and doesn't need to be installed on the computer?

Member Avatar
Member Avatar
+0 forum 5

Hi. Ive actually got a problem in cmd while im trying to repair my computer. (Windows Server 2012 r2) What im trying to do is to reset my password in Admin, since i can't log in on it. What i did is, i insert the bootable usb , then "repair" and go to "CMD", it brings me to X"\Windows\System32 , now, most of the time, the OS is in D: drive now or even in C: right? I do a Diskpart, list volume but only C: drive appear, and the contents of that drive is the content of bootable drive …

Member Avatar
Member Avatar
+0 forum 20

Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it targets the people who are least likely to be in a position to do anything but pay; the people who are most likely to get infected are the same folk who are least likely to have an offsite backup or know how to get help with such a problem. This …

Member Avatar
Member Avatar
+2 forum 13

is there anyway to stop sql injection while using mysql_connect and not using PDO or mysqli ??

Member Avatar
Member Avatar
+0 forum 7

Hello, this morning my desktop was completely different. I used Malware Bytes and it found PUP.Optional.ASK. I removed the two files, restarted the computer and it's still there. Any ideas on how to completely remove it?

Member Avatar
Member Avatar
+0 forum 4

IT Friends, Let me start by saying I am not an IT professional. Our company recently changed to a cloud based environment. We are seeing substantial efficiency loss in the calculation times of our templates (mostly excel based). It's typically only seconds per calculation, but adds up throughout the day. My current desktop has the following set up: Windows 10, Office 16, Intel(R) Core(TM) i7-4790 CPU @3.60 GHz 16.0GB RAM 64-bit operating system. I am being told that no cloud environment can match the processing speed for excel calculations of my desktop. I find that very hard to believe. Is …

Member Avatar
Member Avatar
+0 forum 2

The End.