There can various actions that take us to the cause of Data Loss, **Intentional Action** *Intentional deletion of a file or program* **Unintentional Action** *Accidental deletion of a file or program Misplacement of CDs or Memory sticks Administration errors Inability to read unknown file format* I really found this Wiki Content useful: https://en.wikipedia.org/wiki/Data_loss

Member Avatar
Member Avatar
+0 forum 2

I looking to create a database form for people to create receipts to issue to customers but I need to be able to lock the record so that it can't be edited once it has been printed and saved. How can I do this?

Member Avatar
Member Avatar
+0 forum 1

I'm using Windows Defender as full antivirus and Malwarebytes (Free version) So far. I've never had viruses malware on my computers. I started doing this 2016-2017. Are paid antivirus products not worth it now? Back then i used to use Bitdefender and it was pretty good. It had a pretty good GUI and many other protection features.

Member Avatar
Member Avatar
+0 forum 3

PART 1 1. INTRODUCTION: When you are starting with your first SEO project, you may feel as if you have been told to empty the ocean with a teaspoon, there is so much to know and so much to do. Well, don't freak out, it is not as bad as it sounds. You simply have to look at it as a series of tasks to be done. The U.S. military works this way; they look at a goal (say "Force the unconditional surrender of Nazi Germany") and break it down to what needs to be done, how they can do …

Member Avatar
Member Avatar
+12 forum 67

A survey of attendees at Infosecurity Europe earlier this month showed 70 percent in favour of the dictionary definition (in this case the Cambridge Dictionary) of a hacker being amended. The amendment in question being to remove 'illegality' from the definition. The current definition of a hacker is "a person who is skilled in the use of computer systems, often one who illegally obtains access to private computer systems". So what do you reckon, DaniWebbers? Is it time that hacker was reclaimed entirely (rather than relying upon black and white labels) and if so what word should replace it as …

Member Avatar
Member Avatar
+0 forum 14

So I've successfully written a metaclass that gives python the functionality of private attributes in classes. Q: But what about `inst.__private`? A: >>> class A(object): __slots__ = ['__private'] def __new__(cls): inst = object.__new__(cls) inst.__private = 10 return inst def showprivate(inst): return inst.__private >>> inst = A() >>> inst.showprivate() 10 >>> inst._A__private = 20 # security through obscurity never works >>> inst.showprivate() # sorry not private 20 With my metaclass, private attributes are inaccessible outside native and super-native namespaces: class A(object, metaclass=privatetype): __slots__ = ['A'] __private__ = ['B'] # NOTE: __slots__ is enforced for security regardless of local definition def __new__(cls): …

Member Avatar
Member Avatar
+0 forum 22

Haven't programmed in a long time. Last project was a GCODE pathway generator I wrote several years back. My compiler is obviously several years out of date. Uses time(), itoa(), rand(). Current standard compliant compilers should have <chrono>, <thread>, <random>, and to_string() in suppliment to those more deprecated functions. This is a very simple, high speed method of generatinga alot of randomized junk data onto your drive. Make sure you have about 300MB of RAM available for the overhead. An older non-SSD might croak. Useful for making old files unrecoverable by overwriting the old space on a drive. Doesn't go …

Member Avatar
Member Avatar
+2 forum 1

My question is there are thousands of websites which are pursuing candidates that they have 100% real guaranteed exam questions and dumps like; * [ExamsTrainer](https://www.examstrainer.com/) * [DumpsAcademy](https://www.dumpsacademy.com/) If they are true in this regard, these certifications have lost their worth?

Member Avatar
Member Avatar
+0 forum 2

In the modern world, it’s easy to understand that data is absolutely essential to many corporations and organizations. There is an ever-growing need to understand the needs and desires of your customer base, so that you may tailor your products/services/platform as much as possible to meet these particular needs. However, we also are coming to a point where human beings are beginning to realize that the way that their data is being used can be quite harmful. One of the most obvious examples is the [Facebook-Cambridge Analytica scandal](https://www.nytimes.com/2018/03/19/technology/facebook-cambridge-analytica-explained.html), in which data from Facebook’s user base was used to influence a …

Member Avatar
Member Avatar
+2 forum 1

> Last month, Facebook admitted to storing million of Facebook passwords in plaintext. The Verge Apr 18, 2019 We see students being taught login systems here and a recurring mistake is passwords being stored in databases. It appears that CompSci courses teach bad practices early and as we know it's hard to unlearn what you learn earlier. Further reading seems to indicate these passwords may have collected via logging. "But as Krebs on Security first reported, various errors seem to have caused Facebook’s systems to log some passwords in plain text since as early as 2012." I'm been chided for …

Member Avatar
Member Avatar
+3 forum 3

For those very new to this area, please google SIM SWAP and discover a very nasty security issue with all phones we use today. At first glance the new security researcher might think I'm exaggerating. Do your own research and tell me you don't find this to be one of the most foul, nasty exploits I've seen in years. This exploit was recently used to highjack a writer's phone at https://www.zdnet.com/article/sim-swap-horror-story-ive-lost-decades-of-data-and-google-wont-lift-a-finger/ His case is still developing with loss of accounts, tax returns he stored on the Clouds, and a 25,000USD Bitcoin purchase. And we're not talking thousands of dollars in …

Member Avatar
+0 forum 0

Ok, So I sell some online services basically there is no need for my clients to put in their shipping address but paypal still asks for shipping address on the checkout page they are taken to from the payapl button. Is there a way to remove that option? I I'm sorry if I am asking this at the wrong place I am kind of a newbie here. Thanks

Member Avatar
Member Avatar
+0 forum 1

I try to mark content from a web-page (with pictures, hyperlinks etc) to clipboard and then paste it into Microsoft Word (belonging to the Office 365 Home suite). Then I discover problems starting with the following warning: "A potential vulnerability has been identified in Microsoft Office. This document contains fields that can share data with external files and Web sites. It is important that this file comes from a reliable source." (I do not use English as my working language, and this warning is translated to English using Google Translate... :-)) The screen is often flickering two or three times …

Member Avatar
Member Avatar
+0 forum 1

I've encountered an unknown user appear in my calls log and its had a 16mins airtime videocall to this person in messenger. I'm just suprised, it was appear in my call logs even though I didn't do anything Can anyone help me to track this code or identify who is owner of this account in facebook. I attached the screenshot for your reference and Here's the code that I saw in the contact information of this person. Btw, I'm using IPhone 7 , Idk if this is only a glitch or not. **EIBTUHQ9AHSwSWDqeuw9N3J2dD7KpAcTKxBTZuk8M3LkDRao2HxOnjmGeRylF5RGYOOboRGtRVrDAG** I hope someone on this group will …

Member Avatar
Member Avatar
+0 forum 2

It is with deep regret that I inform everyone that it just very recently came to my attention that the DaniWeb database was breached in December 2015. Over a million user profiles, including email addresses and IP addresses, were stolen. Logins and passwords were protected through an additional security layer and were **NOT** able to be stolen. While encrypted versions of passwords were stolen, without access to the old version of DaniWeb's code base, there is no way for a hacker to figure out the very unique encryption method, which included multiple unique salts, which we used. Please note this …

Member Avatar
Member Avatar
+3 forum 20

I would like to inform the people here on this site (Daniwebs) community know that my account here with Daniweb was not only accessed and found to have been accessed on the Darkweb, it was hacked. I have yet figured out exactly what they were using my account for, or to do while on my account yet and from where, what IP address or hopefully who. When I do figure this out, I will update as I make progress. A note to those that are quickly thinking "I must have used an unsecure password like password, 1234, admin, etc." well …

Member Avatar
Member Avatar
+0 forum 8

Hi I am talking GDPR and Data Protection Act 2018. Can an organisation in the UK have its sales staff wearing name tags/badges with the employees' full name displayed on them? Thanks

Member Avatar
Member Avatar
+0 forum 2

Guardian newspaper columnist [Dawn Foster](https://twitter.com/DawnHFoster) posted images on Twitter this weekend showing how she was able to login to the official Conservative party conference app as Boris Johnson, until recently the UK Foreign Secretary. Not only was there no password required to login to the app, all that was required was an email address, but once in all the details of user registration were accessible. So, in the case of Alexander Boris de Pfeffel Johnson (yes, that is his real name) that meant contact details such as his mobile phone number. It also meant that the logged in user could …

Member Avatar
Member Avatar
+0 forum 6

I could easily buy a liquid cooler and call it a day, but unfortunately this is going into a 4U rack server chassis. it has a double 120mm fan but its covered by drive bays. the only other fan is 80mm, and i dont know any liquid coolers with a radiator that small. I am thinking air cooler. It is a i7-7800X so im concerned about temps. Ideas for cooling?

Member Avatar
Member Avatar
+0 forum 1

I download some music songs from a website. The website gets the requests from users and then it searches through WWW and lists you hundreds of URL that may have fulfilled your requests. I got what I want, but when I doubled clicks the music files, which are of RM format, a webpage immediately popped out. Do you think if the downloaded music files had been infected by spywares?

Member Avatar
Member Avatar
+0 forum 1

Hello, After searching over the internet how to secure a web application(forms) in PHP, in most of the cases were just suggestions not a short and real example. In some cases is suggested to use strip_tags( trim( $_POST['PARAMETER'] ) ); but when you have some special inputs like comments field htmlentities ( trim ( $_POST[ ‘comment’ ] ) , ENT_NOQUOTES ); is suggest. Maybe there is a useful example (custom made function) to achieve standard safe methods without introducing complicated libraries like HTMLPurifier into the application. Thank you for your time!

Member Avatar
Member Avatar
+0 forum 5

I've been writing about various security risks in the health sector for many years now. Usually my articles cover patient privacy, data protection and health provider network insecurity issues. Occasionally, they spill over into darker territory where the cyber risk morphs into a very real one as far as the health of the patient is concerned. Take my story at SC Magazine a couple of years ago which reported how researchers at Rapid7 had uncovered vulnerabilities in an insulin pump that had the potential to change the dosage supplied. Sure, the actual risk of exploit was low given that an …

Member Avatar
Member Avatar
+1 forum 1

Hello friends, I am facing problem related to my email service. I just want to know that How do I recover my RoadRunner email password. If anyone have good knowledge about this. Then please share with me. Thank you

Member Avatar
Member Avatar
+0 forum 2

Dear folks Simple task can't get it work https://www.askdavetaylor.com/enable-parental-controls-linksys-wi-fi-router/ Tried to block internet access for one of my iPhone for testing purpose (it has dummy SIM means no cellular data) Enable Parental Controls (i.e it is ON) Choose a specific home device that I want to block then choose option : "Always" ,,,,,,,,,,,,my router screenshot same as the link above Click Apply But it didn't work !!!! Tried another iphone same issue I have latest firmware and I did restart the router as well Am I missing something ? Thanks

Member Avatar
Member Avatar
+0 forum 1

Hello, One type of SQLIA is UNION Query and I still do not completely understand what is the point. SELECT Name, Address FROM Users WHERE Id=$id by injecting the following- Id value: $id=1 UNION ALL SELECT creditCardNumber,1 FROM CreditCarTable. We will have the following query: - SELECT Name, Address FROM Users WHERE Id=1 UNION ALL SELECT creditCardNumber, 1 FROM CreditCarTable What is the point of uniting the sqlia with another table which values are being kept secret? Are main point is to be able to login to the admin for example.

Member Avatar
Member Avatar
+0 forum 4

How to prevent Illegel/ Logically Incorrect Queries? Illegal/Logically Incorrect Queries 1)Original URL:http://www.arch.polimi.it/eventi/?id_nav=886 2)SQLInjection: http:/`/www.arch.polimi.it/eventi/?id_nav=8864' 3) Error message showed: SELECT name FROM Employee WHERE id =8864' from the message error we can find out name of table and fields: name; Employee; id. By the gained information attacker can arrange more strict attacks Should I hide the error message into 404 - Error instead of showing all of them? or is there any other method to prevent this?

Member Avatar
Member Avatar
+0 forum 1

Hello, I am trying to understand prepared statement and what it does. https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet#Defense_Option_1:_Prepared_Statements_.28Parameterized_Queries.29 "Prepared statements ensure that an attacker is not able to change the intent of a query, even if SQL commands are inserted by an attacker. In the safe example below, if an attacker were to enter the userID of tom' or '1'='1, the parameterized query would not be vulnerable and would instead look for a username which literally matched the entire string tom' or '1'='1. " If an attacker input: userID of tom' or '1'='1 what will prepared statement detect as a userID? userID: tom Is that …

Member Avatar
Member Avatar
+0 forum 3

I am inform every bady in bar codes

Member Avatar
Member Avatar
+0 forum 2

Hello, I am planning to do my Thesis on SQLIA and now I am trying to understand something about SQLrand. SQLrand - a system for preventing SQLIA against web servers. The main intuition is that by using a randomized SQL query language, specific to a particular CGI application, it is possible to detect and abort queries that include injected code. Now, I do not understand how to randomized the SQL query language? https://www.w3schools.com/sql/func_sqlserver_rand.asp is that how you randomize the SELECT SQL command ? Please gives me some guidelines. Thanks in advance.

Member Avatar
Member Avatar
+0 forum 3

Recently Thunderbird asked me to login again for Gmail. It presents me a form in which I have to insert the password. It is the same form as when I login to my Google account via my browser. Only the NEXT button does not work. Do you have an idea how to solve this?

Member Avatar
Member Avatar
+0 forum 4

The End.