1,118 Topics
|
|
[ATTACH=RIGHT]21691[/ATTACH]“Your PC may be infected” says Google, which has taken the unusual step of [URL="http://googleblog.blogspot.com/2011/07/using-data-to-protect-people-from.html"]warning users[/URL] that a couple of million or so of them have most likely been taken in by a fake AV scam. According to a post on the official Google blog by security engineer Damian Menscher, … |
|
DaniWeb has looked at Network Attached Storage in the shape of the [URL="http://www.daniweb.com/reviews/review308073.html"]myDitto server which offers excellent value in terms of both cost and capacity[/URL]. DaniWeb has looked at a personal cloud device in the [URL="http://www.daniweb.com/reviews/review260663.html"]very pink format of PogoPlug which is great for anytime and anywhere sharing[/URL]. DaniWeb has … |
|
I am trying to create a licensing system where you have a license key as a variable in a file. Then, it includes a file that's on an external server. The server then does all the validating, and returns whether the key is valid or not. The problem is, an … |
|
I am adding a page to my site that allows doctors to send me referrals. Some of the data will be highly sensitive, so I need to be sure that it is handled as securely as possible. The data doesn't get stored in a database. It is simply emailed directly … |
|
Hello! I am working on a networking project and I had some questions.... I am in the process of building a network specifically for security penetration, & exploit testing, and I looking for some of the best methods for maintaining IP anonymity. I know of the good old fashion method … |
|
What I have is a linksys wrt54gs(dd-wrt) router assigning private ip's to my workstations. I also have a Windows Server which i need accessible for Windows Remote Desktop Connection to my remote office in Costa Rica. I'd like to have the server have one of my 5 static public ip's(so … |
|
[ATTACH=RIGHT]22459[/ATTACH]Just how desperately are you looking for love? Unfortunately, for some the answer is all too often all too desperately; to the point where common sense leaps out of the window and is quickly followed by the bank balance. According to new research by the University of Leicester in the … |
|
It may win the prize for being the research with the most surreal title, but the 'My dog ate my iPad' report comes with a very serious message attached and one that business would do well to listen to. The full title of the independent research report, commissioned by SecureData, … |
|
Using newly registered domains with a very short lifespan to host malware websites is so last year. It would appear that these days such things are far more likely to be hosted on much older compromised web sites instead. Could this be down to a decline in domain tasting? The … |
|
contact_us.php [CODE] <form action="contact.php" method="POST"> <table border="0" cellpadding="2"> <tr> <td>Name : </td> <td><input name="nama" type="text" value="" size="30" /></td> </tr> <tr> <td>E-mail: </td> <td><input name="email" type="text" value="" size="20" /></td> </tr> <tr> <td>Your message : </td> <td><textarea name="comments" cols=30 rows=6></textarea></td> </tr> <tr> <td></td> <td><input name="send message" type="button" value="send message" /> </table> </form> … |
|
I have a theory about the design of a new site I am working on. If a user accounts table is in one database, and the site content tables in another database, then it would be impossible for a hacker to use SQL injections in a form unrelated to the … |
|
I should be actually asking this via a Google+ post but I haven't joined yet and therefore cannot post it. I hope someone here can answer it. Before joining, Google indicates that we are responsible for the loss of our 'data'. Now, the only important data I have on google … |
|
Hi, I have DAL class and I have done Query Parametrization to avoid SQL injection. As you can see the weakpoing for Dynamic Query is table_name and column name. I have made small function to (hopefully) validate table variable before I can add to SQL command string. Now I was … |
|
Anyone who uses Twitter, and has at some point posted a link to something interesting, will have almost certainly used a URL-shortening service such as bit.ly for example. Now the spammers are exploiting the popularity of such link-reduction services by establishing their own fake URL-shortening services in order to redirect … |
|
The trouble with Kensington lock systems for laptops in the past was that they were fiddly to actually use, which is why the company took a step back and redesigned the process by introducing the new ClickSafe system. This still utilises the same Kensington lock slot that appears on everything … |
|
Think about an antivirus software with an 1-pc license. After installation , while the user tries to upgrade it, the software recognizes that the pc rying to upgrade the antivirus is the one that bought the license so that the software when installed on another pc with the same serial … |
|
[ATTACH=RIGHT]22151[/ATTACH]It would appear that a Florida bank has been the victim of a $13 million ATM heist, but just how did the cyber-robbers pull it off? Although the security breach which led to the ATM fraud itself seems to have taken place in March, and was disclosed in the first … |
|
Facebook users have been making a lot of use of the new 'like' feature which allows users to link to webpages that they, well, like funnily enough. Not so funny when Facebook users are claiming to like a site called "101 Hottest Women in the World" which features an image … |
|
Working with dll i got into a situation where loading a dll can cause security threat. lets say for example when you load a DLL, it gets same access privilege as the calling process. So if calling process is running with Admin privilege the loaded dll gets the elevated privilege … |
|
hi, I'm the student of network and IT security and i need to have my final year major project that holds the double credit. can you help me getting the topics. these are the modules i have in final year: Wide Area Networks E-commerce Applications Fundamentals of Security Management Fundamentals … |
|
I'm attempting to create a program where the login and password will be verified on an SQL database of user information. I keep getting the error "SQL Execution was unhandled" I marked the code that was causing the error in red. I'm using Visual Studio 8. Keep in mind I … |
|
Hi all, I'm having problems getting my mobile device (Windows Mobile 6.1) to see my VB.NET application as genuine. Here are the steps I am taking - can anybody see why there is a problem? I use makecert.exe to create a new root certificate.... makecert -n "CN=McLernonsMARS" -r -sv McLernonsMARS.pvk … |
|
Although Mozilla's Firefox and Google's Chrome browsers get a lot of attention in the media, Apple's Safari browser is not too shabby in comparison. The one thing it unfortunately lacks is robust security. Given that so much computer activity revolves around the browser these days, security is the last place … |
|
This prints NULL: [CODE=Java]String sss = System.getSecurityManager() == null ? "NULL" : System.getSecurityManager().getClass().getName(); System.out.println(sss);[/CODE] And this throws exception: [CODE]ServerSocket serversocket = new ServerSocket(80);[/CODE] This one: [CODE]Exception in thread "main" java.lang.Error: java.net.BindException: Permission denied at httpserver.HTTPServer.main(HTTPServer.java:68) Caused by: java.net.BindException: Permission denied at java.net.PlainSocketImpl.socketBind(Native Method) at java.net.PlainSocketImpl.bind(PlainSocketImpl.java:383) at java.net.ServerSocket.bind(ServerSocket.java:328) at java.net.ServerSocket.<init>(ServerSocket.java:194) at … |
|
An Internet Service Provider (ISP) has finally been given permission to reveal that he was the recipient of an National Security Letter (NSL) from the Federal Bureau of Investigation (FBI) six years ago, demanding information about his clients. Nicholas Merrill, president of the New York ISP Calyx, still can’t say … |
|
[ATTACH=RIGHT]22256[/ATTACH]England just scraped to a hard fought win against a physical and enthusiastic Argentina side in their opening match of the 2011 Rugby World Cup campaign in New Zealand. But while sports fans the world over get excited about how their country is performing in the initial pool group matches, … |
|
Last year saw the overall volume of email delivered spam drop for the first, which has to be good news. Or it would be were it not for the fact that spammers have not gone away, they have merely moved with the times and adapted their business so as to … |
|
Having a professional interest in security, and a personal distrust of politicians and their promises of providing the same, I was not at all surprised by the findings of a [URL="http://www.bbc.co.uk/pressoffice/pressreleases/stories/2007/03_march/23/keylogger.shtml"]BBC TV investigation[/URL] that has just been broadcast in the UK. Inside Out, a news reporting and investigative documentary series … |
|
how to use messagedeigest class to bring security to a file...encode and decode a file... any suggestion ????? |
|
I am developing a desktop based software in Java using IDE Netbeans 7 and database MySQL. Now i want to distribute this software and protect it from piracy.I want to implement online licence verification.That means when user will install the software a number based on hardware configuration will be sent … |
The End.