1,118 Topics

Member Avatar for
Member Avatar for happygeek

The Apple iWork office productivity suite for the Mac has been around for ages, and was recently joined by an iOS version. iWork documents have, up until now, been seen as being pretty safe courtesy of the particular implementation of the 128-bit AES encryption Apple used to secure them. I …

Member Avatar for fahimk123
1
1K
Member Avatar for happygeek

Security researchers are warning that some 30,000 WordPress websites, 85% of them based in the US, have been compromised by a mass-injection hijack attack which sees visitors to any of more than 200,000 individual pages redirected to a Trojan infected rogue AV scam. [ATTACH=RIGHT]24076[/ATTACH]The senior security researcher with Websense Labs, …

Member Avatar for occirats
0
850
Member Avatar for Mourin @ Dell

Hey everyone, Our team at Dell SMB has recently put together a [Slideshare](http://goo.gl/oJtjH) of our most popular white papers. I hope this is helpful to the Daniweb community! Thanks, Mourin

0
329
Member Avatar for happygeek

Probably the most common Olympic Games 2012 scam is that of unofficial ticket sales. No great surprise there, but the fact that Google appears to be in on the act might come as a shock to many. So what, exactly, is going on? [ATTACH=RIGHT]23779[/ATTACH]A little known law in the UK …

Member Avatar for elitebag
0
554
Member Avatar for happygeek

The Iranian Cyber Army may be the latest elite military hacking squad to hit the headlines, but Iran has a long way to go if it's to catch up with China in terms of international data disruption. According to one newly published report into the threat from Chinese state-sponsored espionage …

Member Avatar for BruceVA
0
462
Member Avatar for joeywheels

I think my site has been hacked! I found these lines of code on all my php files and I didn't put them there. Problem is I don't know enough php to understand what this batch of code does. Could anyone please help? How bad is it? Here's the code: …

Member Avatar for weekendrockstar
0
177
Member Avatar for happygeek

Following the arrest of 25 suspected members of the Anonymous hacking collective in Europe and South America, the INTERPOL website went offline. Coincidence? I don't think so. After all, Anonymous has already proven it isn't scared, or indeed incapable. of taking down law enforcement sites. Earlier in the month it …

Member Avatar for Sam55129
3
361
Member Avatar for chelboy_jr

i was a diploma in networking, and has be in the final year and need to do some network security project.. can someone give me an idea what things should i do for my project.. because i think i just want to do something that been related with router.. i …

Member Avatar for rubberman
0
206
Member Avatar for patrick1981

I want to manually test my sites to check if they are secure against SQL injections. Whats a good way to attempt it. How do I get started? thank you

Member Avatar for patrick1981
0
183
Member Avatar for eltonpiko

hi there can anyone tell me if its possible with php to use certificate to autenticate to a web application admin area instead of using common username and password? and is there a vps web server that can encrypt the whole drive and database of my application, for it may …

Member Avatar for iamthwee
0
69
Member Avatar for happygeek

The Ainslot.L Trojan appears to be much the same as any other at first glance; logging user activity and sending Gmail and Facebook passwords to the bad guys, downloading further malware, taking over your computer and the main payload of being a Banking Trojan stealing account login data. But Ainslot.L …

Member Avatar for happygeek
4
481
Member Avatar for dantinkakkar

I want to build a network protocol analyzer, but I really don't know where to start. Obviously, I don't want the code in hand, I can think it up myself -- but the problem is a little more specific - where do I look at to get the IPs passing …

Member Avatar for dantinkakkar
0
285
Member Avatar for pchurness

Hello, I'm developing an e-commerce site in a LAMP environment. Is it advisable to separate data on to different servers (i.e. to have one server as the web server and another server to house transaction and other customer data)? In other words, from a security perspective is there any reason …

0
134
Member Avatar for happygeek

If you use, or operate, a password-free wireless network then legal action being taken in the US by the adult movie industry might just be about to rain on your parade warns one European IT threat mitigation expert. [ATTACH=RIGHT]23826[/ATTACH]The lawsuit was filed by Liberty Media Holdings, a producer of adult …

Member Avatar for WebCopywriter
1
906
Member Avatar for ryklon

Hello! Is there a way to hide the password of your database inside the source code? [CODE=vb.net]"Provider=Microsoft.ACE.OLEDB.12.0;Data Source=" & Application.StartupPath & "\Database.accdb; Jet OLEDB:Database Password = [B]MyPassword[/B]"[/CODE] As you can see the password is exposed, increasing the risk for the database to be compromise. Is there anything you can suggest …

Member Avatar for Reverend Jim
0
271
Member Avatar for happygeek

[URL="http://en.wikipedia.org/wiki/Man-in-the-middle_attack"]Man-in-the-Middle (MITM) attacks[/URL] are, sadly, not news these days; they are a fact of online life. But word of how the latest SpyEye Trojan-driven MITM attacks are using clever post transaction fraud systems to effectively erase the evidence of the crime from the victims' view certainly deserve to be. Attacking …

Member Avatar for nathanmcgill
0
604
Member Avatar for happygeek

British software developer Conseal Security has just launched a rather clever solution to the problem of securing the data on your portable media such as USB thumb drives and portable hard drives while at the same time maintaining fully centralized control of the management of those devices without breaking the …

Member Avatar for 07knev
1
597
Member Avatar for unikorndesigns

hey fellow PHP developer, Is there any way we could protect our PHP source code from being modified after a 3rd person receives the code? I had developed a web application and when i give the source code to another person i want it to be write protected. Currently i …

Member Avatar for edwinhermann
0
923
Member Avatar for Octet

I know this question is extremelly hard to answer without actually checking how I setup my server, but I wondered if anyone could give me a quick rundown and/or information as to how I could check and protect it further. I am running a Web Hosting Server using old computer …

Member Avatar for rubberman
0
243
Member Avatar for Octet

I have the following PHP: [CODE]<?php define('DB_NAME', 'database'); define('DB_USER', 'root'); define('DB_PASSWORD', 'password'); define('DB_HOST', 'localhost'); $link = mysql_connect(DB_HOST, DB_USER, DB_PASSWORD); if (!link){ die('Could not connect to database'); } $db_selected = mysql_select_db(DB_NAME, $link); if (!$db_selected) { die('Could not connect to the database'); } $value = htmlspecialchars($_POST['Name']); $value2 = htmlspecialchars($_POST['Email']); $value3 = htmlspecialchars($_POST['Subject']); …

Member Avatar for Octet
0
158
Member Avatar for Octet

I am currently using MySQL so people can send my a message that shall be stored in the database. The only issue is I have no idea how to protect against SQL Injection, below is my HTML: [CODE]<form action="Action.php" method="POST" /> <p>Name: <input type="text" name="Name" /> </p> <p>Comment: <input type="text" …

Member Avatar for diafol
0
146
Member Avatar for happygeek

How will Microsoft differentiate Windows 8 in an already crowded Windows OS user space? How about, for one, with the use of a photographic gesture security system for logging in? The idea of using a photo to identify and authenticate the user is not without some pretty obvious problems (ambient …

Member Avatar for jwenting
0
686
Member Avatar for Octet

I am wanting to set up a home server using an old computer, after doing some costs it would work out considerably cheaper than using a hosting service, and although less reliable I feel it would be some good and valuable experience. I have installed Ubuntu server edition onto my …

Member Avatar for Habitual
0
208
Member Avatar for happygeek

Sykipot is not a new Trojan Horse by any means, but the variation found to be attacking Department of Defense smart cards is certainly something that government agencies need to be worried about. United States government agencies, that is. It's doubtful the Chinese government will be too worried about them, …

Member Avatar for diafol
0
688
Member Avatar for secret-code

Hii I have a work network and all computers have the same workgroup name, but the workgroup is a part of whole bulding network. I wanted to restrict access to on of the computers to only employees at the office and I enabled guest account on that computer an set …

Member Avatar for secret-code
0
203
Member Avatar for toddthirtyone

Recently, I removed Windows XP Security 2012 and was left with a process called ping.exe which uses enormous amounts of CPU. I am in the process of completing the sticky guide ([url]http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/threads/134865[/url]) and am currently running scan #2 using GMER. I have ran the Windows Malicious Software Removal Tool, ATF-Cleaner, …

Member Avatar for PhilliePhan
0
418
Member Avatar for EddieC

Most of the reports out yesterday about the release of [URL=http://www.microsoft.com/ie8]Internet Explorer 8[/URL]Beta 2 focused on its so-calledInPrivate Browsing, which leaves no trace of the Web sites you visit and protects anonymity. And while that's certainly useful, developers are likely to be more interested in its improvements in DOM and …

Member Avatar for AleMonteiro
0
344
Member Avatar for Johnbonono

(This is my first post.) As the title suggests, I want to know of any security vulnerabilities there are in Windows 98. I have just installed Windows 98 on a virtual machine, and I wanted to see if I could exploit it somehow. The reason why I want to do …

Member Avatar for Ezzaral
0
193
Member Avatar for anthonyjpv

Hi! Im new to php web development. I am developing an online shopping system where theres an admin page that allows him to add, edit, delete category and products. to cut the story short, what I want to know is, is it safe to save the table for admin username …

Member Avatar for chrishea
0
149
Member Avatar for happygeek

With the recent announcement of an easy way to gain root access for Android phones running 2.3.4, to add to the list of similar exploits for earlier versions and 3.0 and beyond, it should come as no real surprise that the bad guys are taking advantage of the relative weakness …

Member Avatar for Trigle
0
444

The End.