Member Avatar

Hello, I am planning to do my Thesis on SQLIA and now I am trying to understand something about SQLrand. SQLrand - a system for preventing SQLIA against web servers. The main intuition is that by using a randomized SQL query language, specific to a particular CGI application, it is possible to detect and abort queries that include injected code. Now, I do not understand how to randomized the SQL query language? https://www.w3schools.com/sql/func_sqlserver_rand.asp is that how you randomize the SELECT SQL command ? Please gives me some guidelines. Thanks in advance.

Member Avatar
+0 forum 3
Member Avatar

Recently Thunderbird asked me to login again for Gmail. It presents me a form in which I have to insert the password. It is the same form as when I login to my Google account via my browser. Only the NEXT button does not work. Do you have an idea how to solve this?

Member Avatar
+0 forum 4
Member Avatar

hello everyone.. i am a final year student. we are asked to do a project in networking.. what kind of project in networking should i do.. i confuse what kind of project should i do.. i am in need of a project topic which is feasible and can be finished within 2 months duration.. i'll be very thankful if u can suggest me a good topic.. thanks in advance..

Member Avatar
+0 forum 5
Member Avatar

I was working on C# windows application as front end and SQL as back end I have display my sql table data in dtatgridview. [B]I want to display the data in textbox whatever row i select in datagridview.[/B] I have write some code but its not showing data in textboxes. here is my code: [B]the code is on datagridview cellcontentclick event[/B] [CODE] cn.ConnectionString = "Data Source=sam-AB59A9C19;Initial Catalog=master;Integrated Security=True"; cn.Open(); SqlCommand cmd = new SqlCommand(); SqlDataReader rdr; string cd = dataGridView1.SelectedRows.ToString(); string CommandText = "select * from acc where id=@id"; cmd = new SqlCommand(CommandText); cmd.Connection = cn; cmd.Parameters.Add(new SqlParameter("@id", System.Data.SqlDbType.VarChar, 20, …

Member Avatar
+0 forum 10
Member Avatar

Here's the full notice -> https://arstechnica.com/information-technology/2018/05/fbi-tells-router-users-to-reboot-now-to-kill-malware-infecting-500k-devices/ You can read what happened if you wish but just a r̴e̴b̴o̴o̴t̴ ̴a̴n̴d̴ ̴i̴t̴'̴s̴ ̴g̴a̴m̴e̴ ̴o̴v̴e̴r̴ ̴f̴o̴r̴ ̴t̴h̴i̴s̴ ̴m̴a̴l̴w̴a̴r̴e̴.̴ **Update in new reply.**

Member Avatar
+0 forum 1
Member Avatar

Hello, I am in the middle of learning about IT Security. I wonder why sometimes people uses ASCII value for SQL injection attack? Do you know the reason why? Why not using normal ' mark.

Member Avatar
+0 forum 3
Member Avatar

Hello, I have a question about who uses https:// instead of http:// ? What is the point of encrypting the information if that is the point? Who normally uses it? Ecommerce? Bank? Who else? If am I right?

Member Avatar
+0 forum 6
Member Avatar

I think the community in general will benefit from this discussion. I have an IT horror story I would like to tell everybody about. Additionally I have discovered some solutions to some IT problems, which may have been faced by others in the community. A few years ago I started going to college, and got wholluped by a gang of social engineers in the omaha/bellevue area. Unbenounced to me they were actually preforming skits on me in order to preform black mail attacks at a later date. Now you may believe that if you aren't doing anything wrong you should …

Member Avatar
+0 forum 3
Member Avatar

In case you missed it Google has a serious problem with Symantec SSL certificates and is removing their Greenbar status in Chrome as well as rolling out "not trusted" notices for sites using mis-issued certs by Symantec. https://techcrunch.com/2017/03/27/google-is-fighting-with-symantec-over-encrypting-the-internet/ In response to the problems Namecheap is offering free replacement of the certificates - you get whatever time is left on your Symantec SSL certificate on a Comodo SSL for free. https://www.namecheap.com/security/symantec-ssl-certificate-free-replacement.aspx

Member Avatar
+0 forum 3
Member Avatar

what is SSL and HTTPS is there any major distance?

Member Avatar
-1 forum 2
Member Avatar

This is my 1st post on this Forum - Hello My Name is Michael and I'm from Poland :) I have a question about security in Internet. I'm active user of Internet and I have now some anxiety, maybe unjustified, but I have :( I'm logged in webbrowser on my Google (Gmail) account (sometimes Facebook) and in this time I use other websites: This is my Question: Is my activity on these websites (and names of these websites) saving somewhere on servers: google, facebook or others servers information about me? It worries me if in the future someone will be …

Member Avatar
+0 forum 2
Member Avatar

HELP!! I have a windows server 2012 r2 . I can still use my server until i fell asleep and now woke up, And can't log in to my administrator account. I didn't change password at all, i use the same password and i'd make sure that it is correct. But still not working. Only i can access the guest account. I research and tried some tutorials but not working. I don't have installation CD and my physical back is already affected by AMNESIA file, can't copy because it needs admin rights. I found out that all of my files …

Member Avatar
+0 forum 26
Member Avatar

Hi. I'm concerned an ex has installed spy software on my computer (and maybe iPhone, but that's for another thread). I've spent days reading about it and I'm not really any closer to figuring out if this is the case, and if so how to uninstall it. Any help would be much appreciated!

Member Avatar
+0 forum 1
Member Avatar

The second annual Imperva Hacker Intelligence Initiative report, this one entitled [Monitoring Hacker Forums](http://www.imperva.com/docs/HII_Monitoring_Hacker_Forums_2012.pdf), is out and reveals that the threat surfaces being discussed by the hacker community are very different from those that businesses are spending money on defending against attack. ![dweb-hackers](/attachments/small/0/dweb-hackers.jpg "align-right") The Imperva research analysed the content of a number of online hacker communities, including many lesser known forums in order to get a more accurate snapshot of what those doing the hacking are actually discussing. By looking at a total of more than 400,000 different conversational threads, Imperva was able to determine that SQL injection and …

Member Avatar
+0 forum 2
Member Avatar

Which is the most reliable free antivirus for USB flash drives that resides and runs from the device itself and doesn't need to be installed on the computer?

Member Avatar
+0 forum 5
Member Avatar

Hi. Ive actually got a problem in cmd while im trying to repair my computer. (Windows Server 2012 r2) What im trying to do is to reset my password in Admin, since i can't log in on it. What i did is, i insert the bootable usb , then "repair" and go to "CMD", it brings me to X"\Windows\System32 , now, most of the time, the OS is in D: drive now or even in C: right? I do a Diskpart, list volume but only C: drive appear, and the contents of that drive is the content of bootable drive …

Member Avatar
+0 forum 20
Member Avatar

Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it targets the people who are least likely to be in a position to do anything but pay; the people who are most likely to get infected are the same folk who are least likely to have an offsite backup or know how to get help with such a problem. This …

Member Avatar
+2 forum 13
Member Avatar

is there anyway to stop sql injection while using mysql_connect and not using PDO or mysqli ??

Member Avatar
+0 forum 7
Member Avatar

Hello, this morning my desktop was completely different. I used Malware Bytes and it found PUP.Optional.ASK. I removed the two files, restarted the computer and it's still there. Any ideas on how to completely remove it?

Member Avatar
+0 forum 4
Member Avatar

IT Friends, Let me start by saying I am not an IT professional. Our company recently changed to a cloud based environment. We are seeing substantial efficiency loss in the calculation times of our templates (mostly excel based). It's typically only seconds per calculation, but adds up throughout the day. My current desktop has the following set up: Windows 10, Office 16, Intel(R) Core(TM) i7-4790 CPU @3.60 GHz 16.0GB RAM 64-bit operating system. I am being told that no cloud environment can match the processing speed for excel calculations of my desktop. I find that very hard to believe. Is …

Member Avatar
+0 forum 2
Member Avatar

Airlink101.com is *STILL ˆ *under construction. No reply from support@airlink101.com. Present firmware is 1.1.0 build 34. The camera has had no service. The picture is great (still have windows xp on a dedicated pc) and manually transfers files via wifi great. All I need is a firmware upgrade.

Member Avatar
+0 forum 1
Member Avatar

Generally speaking, when it comes to being as secure as possible (and, just as importantly, staying as secure as possible) newer is better. This is certainly the case if we are talking mobile operating systems such as Android and iOS. As of the start of March 2017, according to [Apple's own metrics]([https://developer.apple.com/support/app-store/) some 79% of Apple mobile devices are using the latest iOS 10. Pretty good rates of adoption considering this version of the OS is only six months old. Now compare that to [Google's official figures](https://developer.android.com/about/dashboards/index.html) which reveal that as of March 2017 just 0.3% of Android devices are …

Member Avatar
+4 forum 2
Member Avatar

According to the [Australian Federal Police](http://www.afp.gov.au/), it would appear that at least half a million credit cards 'down under' have been compromised and funds in excess of AUS $25 million (US $26 million) stolen. Although precise details are still coming in, it would seem likely that nothing more complicated than a bit of simple scanning for point of sale terminals which looked vulnerable was used to locate potential victims in the small retailer market rather than run the greater risk of detection by targeting banks or bigger business. Lessons learned from the Subway caper in the US last year no …

Member Avatar
+2 forum 4
Member Avatar

Good day! Could you guys give me link or any tutorial about using parameterized query esp. in CRUD, I'm developing an enrolment system and I'm using C#.net and Mysql database.. I hope you can help me. TIA

Member Avatar
+0 forum 5
Member Avatar

Hello every one, Please i want to write an app the will help me manage how users access my internet through the wifi. I want to build a system where any time a user connects to my wifi and launches their browser my app is the first they see and login with account details i provide them from my database. Am cool with c# a bit and PHP Laravel. Don't know where to start from. Any help pls. Thanks

Member Avatar
+0 forum 1
Member Avatar

Hi, I have one simple question; has anyone used a password generator? I found couple but are they secure - Any Ideas - they claim they are

Member Avatar
+0 forum 6
Member Avatar

i am building an ecommerce website what i am having trouble with is that for example you login, then it goes to admin.php, then if i copy the admin.php page's url and paste it on other browser then you still can go through admin.php without login..it means that my website is not secured..and what can i do to overcome this problem..i am using mysql database for the user to login..all the password and username are there..i hope you guys can help me ASAP . Thank you

Member Avatar
+0 forum 1
Member Avatar

For the longest time, every pun intended, I was a smartwatch hater. How dumb is that, a stupid-expensive smartwatch that really does nothing much at all. I mean, what's the point of wearing a watch that tells you when there's an email on the phone that's in your pocket? Or, indeed, of a watch at all when that phone in your pocket also tells you the time? The fact that smartwatches looked so bad, unless you like the kind of design on your wrist that shouts 'came free with a tankful of gasoline' that is. Even those usually uber-cool designers …

Member Avatar
+0 forum 1
Member Avatar

After outlook rebooting my password has failed. What have happened and what should i do ih this case...Any advice please!

Member Avatar
+0 forum 1
Member Avatar

Dear all, using Windows 10, I insert a USB stick in a PC, create a Word document and save it onto the USB stick. Later I edit many times the document at different times and in different days but always working on the USB stick. Eventually is there any possibility to trace the document's filename, date and time of editing? Even with sophisticated tools? Regards William

Member Avatar
+0 forum 2

The End.