Hello, I am in the middle of learning about IT Security. I wonder why sometimes people uses ASCII value for SQL injection attack? Do you know the reason why? Why not using normal ' mark.

Member Avatar
Member Avatar
+0 forum 3

Hello, I have a question about who uses https:// instead of http:// ? What is the point of encrypting the information if that is the point? Who normally uses it? Ecommerce? Bank? Who else? If am I right?

Member Avatar
Member Avatar
+0 forum 6

I think the community in general will benefit from this discussion. I have an IT horror story I would like to tell everybody about. Additionally I have discovered some solutions to some IT problems, which may have been faced by others in the community. A few years ago I started going to college, and got wholluped by a gang of social engineers in the omaha/bellevue area. Unbenounced to me they were actually preforming skits on me in order to preform black mail attacks at a later date. Now you may believe that if you aren't doing anything wrong you should …

Member Avatar
Member Avatar
+0 forum 3

In case you missed it Google has a serious problem with Symantec SSL certificates and is removing their Greenbar status in Chrome as well as rolling out "not trusted" notices for sites using mis-issued certs by Symantec. https://techcrunch.com/2017/03/27/google-is-fighting-with-symantec-over-encrypting-the-internet/ In response to the problems Namecheap is offering free replacement of the certificates - you get whatever time is left on your Symantec SSL certificate on a Comodo SSL for free. https://www.namecheap.com/security/symantec-ssl-certificate-free-replacement.aspx

Member Avatar
Member Avatar
+0 forum 3

what is SSL and HTTPS is there any major distance?

Member Avatar
Member Avatar
-1 forum 2

This is my 1st post on this Forum - Hello My Name is Michael and I'm from Poland :) I have a question about security in Internet. I'm active user of Internet and I have now some anxiety, maybe unjustified, but I have :( I'm logged in webbrowser on my Google (Gmail) account (sometimes Facebook) and in this time I use other websites: This is my Question: Is my activity on these websites (and names of these websites) saving somewhere on servers: google, facebook or others servers information about me? It worries me if in the future someone will be …

Member Avatar
Member Avatar
+0 forum 2

HELP!! I have a windows server 2012 r2 . I can still use my server until i fell asleep and now woke up, And can't log in to my administrator account. I didn't change password at all, i use the same password and i'd make sure that it is correct. But still not working. Only i can access the guest account. I research and tried some tutorials but not working. I don't have installation CD and my physical back is already affected by AMNESIA file, can't copy because it needs admin rights. I found out that all of my files …

Member Avatar
Member Avatar
+0 forum 26

Hi. I'm concerned an ex has installed spy software on my computer (and maybe iPhone, but that's for another thread). I've spent days reading about it and I'm not really any closer to figuring out if this is the case, and if so how to uninstall it. Any help would be much appreciated!

Member Avatar
Member Avatar
+0 forum 1

The second annual Imperva Hacker Intelligence Initiative report, this one entitled [Monitoring Hacker Forums](http://www.imperva.com/docs/HII_Monitoring_Hacker_Forums_2012.pdf), is out and reveals that the threat surfaces being discussed by the hacker community are very different from those that businesses are spending money on defending against attack. ![dweb-hackers](/attachments/small/0/dweb-hackers.jpg "align-right") The Imperva research analysed the content of a number of online hacker communities, including many lesser known forums in order to get a more accurate snapshot of what those doing the hacking are actually discussing. By looking at a total of more than 400,000 different conversational threads, Imperva was able to determine that SQL injection and …

Member Avatar
Member Avatar
+0 forum 2

Which is the most reliable free antivirus for USB flash drives that resides and runs from the device itself and doesn't need to be installed on the computer?

Member Avatar
Member Avatar
+0 forum 5

Hi. Ive actually got a problem in cmd while im trying to repair my computer. (Windows Server 2012 r2) What im trying to do is to reset my password in Admin, since i can't log in on it. What i did is, i insert the bootable usb , then "repair" and go to "CMD", it brings me to X"\Windows\System32 , now, most of the time, the OS is in D: drive now or even in C: right? I do a Diskpart, list volume but only C: drive appear, and the contents of that drive is the content of bootable drive …

Member Avatar
Member Avatar
+0 forum 20

Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it targets the people who are least likely to be in a position to do anything but pay; the people who are most likely to get infected are the same folk who are least likely to have an offsite backup or know how to get help with such a problem. This …

Member Avatar
Member Avatar
+2 forum 13

is there anyway to stop sql injection while using mysql_connect and not using PDO or mysqli ??

Member Avatar
Member Avatar
+0 forum 7

Hello, this morning my desktop was completely different. I used Malware Bytes and it found PUP.Optional.ASK. I removed the two files, restarted the computer and it's still there. Any ideas on how to completely remove it?

Member Avatar
Member Avatar
+0 forum 4

IT Friends, Let me start by saying I am not an IT professional. Our company recently changed to a cloud based environment. We are seeing substantial efficiency loss in the calculation times of our templates (mostly excel based). It's typically only seconds per calculation, but adds up throughout the day. My current desktop has the following set up: Windows 10, Office 16, Intel(R) Core(TM) i7-4790 CPU @3.60 GHz 16.0GB RAM 64-bit operating system. I am being told that no cloud environment can match the processing speed for excel calculations of my desktop. I find that very hard to believe. Is …

Member Avatar
Member Avatar
+0 forum 2

Airlink101.com is *STILL ˆ *under construction. No reply from support@airlink101.com. Present firmware is 1.1.0 build 34. The camera has had no service. The picture is great (still have windows xp on a dedicated pc) and manually transfers files via wifi great. All I need is a firmware upgrade.

Member Avatar
Member Avatar
+0 forum 1

Generally speaking, when it comes to being as secure as possible (and, just as importantly, staying as secure as possible) newer is better. This is certainly the case if we are talking mobile operating systems such as Android and iOS. As of the start of March 2017, according to [Apple's own metrics]([https://developer.apple.com/support/app-store/) some 79% of Apple mobile devices are using the latest iOS 10. Pretty good rates of adoption considering this version of the OS is only six months old. Now compare that to [Google's official figures](https://developer.android.com/about/dashboards/index.html) which reveal that as of March 2017 just 0.3% of Android devices are …

Member Avatar
Member Avatar
+4 forum 2

According to the [Australian Federal Police](http://www.afp.gov.au/), it would appear that at least half a million credit cards 'down under' have been compromised and funds in excess of AUS $25 million (US $26 million) stolen. Although precise details are still coming in, it would seem likely that nothing more complicated than a bit of simple scanning for point of sale terminals which looked vulnerable was used to locate potential victims in the small retailer market rather than run the greater risk of detection by targeting banks or bigger business. Lessons learned from the Subway caper in the US last year no …

Member Avatar
Member Avatar
+2 forum 4

Good day! Could you guys give me link or any tutorial about using parameterized query esp. in CRUD, I'm developing an enrolment system and I'm using C#.net and Mysql database.. I hope you can help me. TIA

Member Avatar
Member Avatar
+0 forum 5

Hello every one, Please i want to write an app the will help me manage how users access my internet through the wifi. I want to build a system where any time a user connects to my wifi and launches their browser my app is the first they see and login with account details i provide them from my database. Am cool with c# a bit and PHP Laravel. Don't know where to start from. Any help pls. Thanks

Member Avatar
Member Avatar
+0 forum 1

Hi, I have one simple question; has anyone used a password generator? I found couple but are they secure - Any Ideas - they claim they are

Member Avatar
Member Avatar
+0 forum 6

i am building an ecommerce website what i am having trouble with is that for example you login, then it goes to admin.php, then if i copy the admin.php page's url and paste it on other browser then you still can go through admin.php without login..it means that my website is not secured..and what can i do to overcome this problem..i am using mysql database for the user to login..all the password and username are there..i hope you guys can help me ASAP . Thank you

Member Avatar
Member Avatar
+0 forum 1

For the longest time, every pun intended, I was a smartwatch hater. How dumb is that, a stupid-expensive smartwatch that really does nothing much at all. I mean, what's the point of wearing a watch that tells you when there's an email on the phone that's in your pocket? Or, indeed, of a watch at all when that phone in your pocket also tells you the time? The fact that smartwatches looked so bad, unless you like the kind of design on your wrist that shouts 'came free with a tankful of gasoline' that is. Even those usually uber-cool designers …

Member Avatar
Member Avatar
+0 forum 1

After outlook rebooting my password has failed. What have happened and what should i do ih this case...Any advice please!

Member Avatar
Member Avatar
+0 forum 1

Dear all, using Windows 10, I insert a USB stick in a PC, create a Word document and save it onto the USB stick. Later I edit many times the document at different times and in different days but always working on the USB stick. Eventually is there any possibility to trace the document's filename, date and time of editing? Even with sophisticated tools? Regards William

Member Avatar
Member Avatar
+0 forum 2

People, I am sure you've heard of social bookmarking sites like del.icio.us. You can now upload your bookmarks on a third party site to host your bookmarks so you can have access to your bookmarks from any part of the world when you are away from your home computer. No need to rush back to your computer to find your bookmarks saved by your web browser. Now, that is an honest service. But look, how marketers and your competitions can take advantage of your traffic and visitors. No doubt, a lot of your visitors would bookmark your pages on their …

Member Avatar
Member Avatar
+0 forum 18

Have anyone tried using Privatoria VPN provider. Is it worth using ?

Member Avatar
Member Avatar
-1 forum 10

Accidentally downloaded an update for adobe flash. Moments later, Bytefence installed itself onto my laptop, as well as an app called 'weatherbuddy'. My browser was also hijacked by Palikan. Finally, I was able to restore my default browser and I installed Malwarebytes and ESET. Both had found and deleted files relating to these apps, but they are still running in the background and appear on my taskbar icon tray but cannot be found in the control panel. Thanks for your help!

Member Avatar
Member Avatar
+0 forum 3

admin

Member Avatar
Member Avatar
-1 forum 3

What’s the worst that could happen if someone’s account credentials within your organisation fell into a hacker’s hands?

Member Avatar
Member Avatar
+0 forum 2

The End.