1,118 Topics

Member Avatar for
Member Avatar for happygeek

[ATTACH=RIGHT]21691[/ATTACH]“Your PC may be infected” says Google, which has taken the unusual step of [URL="http://googleblog.blogspot.com/2011/07/using-data-to-protect-people-from.html"]warning users[/URL] that a couple of million or so of them have most likely been taken in by a fake AV scam. According to a post on the official Google blog by security engineer Damian Menscher, …

Member Avatar for zabalex
1
397
Member Avatar for happygeek

DaniWeb has looked at Network Attached Storage in the shape of the [URL="http://www.daniweb.com/reviews/review308073.html"]myDitto server which offers excellent value in terms of both cost and capacity[/URL]. DaniWeb has looked at a personal cloud device in the [URL="http://www.daniweb.com/reviews/review260663.html"]very pink format of PogoPlug which is great for anytime and anywhere sharing[/URL]. DaniWeb has …

Member Avatar for PeterM88
0
649
Member Avatar for calebcook

I am trying to create a licensing system where you have a license key as a variable in a file. Then, it includes a file that's on an external server. The server then does all the validating, and returns whether the key is valid or not. The problem is, an …

Member Avatar for moneeshot
0
188
Member Avatar for pallen

I am adding a page to my site that allows doctors to send me referrals. Some of the data will be highly sensitive, so I need to be sure that it is handled as securely as possible. The data doesn't get stored in a database. It is simply emailed directly …

Member Avatar for urtrivedi
0
125
Member Avatar for ppotter3

Hello! I am working on a networking project and I had some questions.... I am in the process of building a network specifically for security penetration, & exploit testing, and I looking for some of the best methods for maintaining IP anonymity. I know of the good old fashion method …

Member Avatar for ppotter3
0
517
Member Avatar for Staric

What I have is a linksys wrt54gs(dd-wrt) router assigning private ip's to my workstations. I also have a Windows Server which i need accessible for Windows Remote Desktop Connection to my remote office in Costa Rica. I'd like to have the server have one of my 5 static public ip's(so …

0
176
Member Avatar for happygeek

[ATTACH=RIGHT]22459[/ATTACH]Just how desperately are you looking for love? Unfortunately, for some the answer is all too often all too desperately; to the point where common sense leaps out of the window and is quickly followed by the bank balance. According to new research by the University of Leicester in the …

Member Avatar for Ancient Dragon
0
523
Member Avatar for happygeek

It may win the prize for being the research with the most surreal title, but the 'My dog ate my iPad' report comes with a very serious message attached and one that business would do well to listen to. The full title of the independent research report, commissioned by SecureData, …

Member Avatar for jwenting
0
413
Member Avatar for happygeek

Using newly registered domains with a very short lifespan to host malware websites is so last year. It would appear that these days such things are far more likely to be hosted on much older compromised web sites instead. Could this be down to a decline in domain tasting? The …

Member Avatar for Azmah
1
630
Member Avatar for davy_yg

contact_us.php [CODE] <form action="contact.php" method="POST"> <table border="0" cellpadding="2"> <tr> <td>Name : </td> <td><input name="nama" type="text" value="" size="30" /></td> </tr> <tr> <td>E-mail: </td> <td><input name="email" type="text" value="" size="20" /></td> </tr> <tr> <td>Your message : </td> <td><textarea name="comments" cols=30 rows=6></textarea></td> </tr> <tr> <td></td> <td><input name="send message" type="button" value="send message" /> </table> </form> …

Member Avatar for Stefano Mtangoo
0
126
Member Avatar for ShadyTyrant

I have a theory about the design of a new site I am working on. If a user accounts table is in one database, and the site content tables in another database, then it would be impossible for a hacker to use SQL injections in a form unrelated to the …

Member Avatar for joehms22
0
138
Member Avatar for itsols

I should be actually asking this via a Google+ post but I haven't joined yet and therefore cannot post it. I hope someone here can answer it. Before joining, Google indicates that we are responsible for the loss of our 'data'. Now, the only important data I have on google …

Member Avatar for Coloradojaguar
0
196
Member Avatar for Stefano Mtangoo

Hi, I have DAL class and I have done Query Parametrization to avoid SQL injection. As you can see the weakpoing for Dynamic Query is table_name and column name. I have made small function to (hopefully) validate table variable before I can add to SQL command string. Now I was …

Member Avatar for Stefano Mtangoo
0
187
Member Avatar for happygeek

Anyone who uses Twitter, and has at some point posted a link to something interesting, will have almost certainly used a URL-shortening service such as bit.ly for example. Now the spammers are exploiting the popularity of such link-reduction services by establishing their own fake URL-shortening services in order to redirect …

Member Avatar for sufalamtech
2
491
Member Avatar for happygeek

The trouble with Kensington lock systems for laptops in the past was that they were fiddly to actually use, which is why the company took a step back and redesigned the process by introducing the new ClickSafe system. This still utilises the same Kensington lock slot that appears on everything …

0
444
Member Avatar for dw_user

Think about an antivirus software with an 1-pc license. After installation , while the user tries to upgrade it, the software recognizes that the pc rying to upgrade the antivirus is the one that bought the license so that the software when installed on another pc with the same serial …

Member Avatar for dw_user
0
213
Member Avatar for happygeek

[ATTACH=RIGHT]22151[/ATTACH]It would appear that a Florida bank has been the victim of a $13 million ATM heist, but just how did the cyber-robbers pull it off? Although the security breach which led to the ATM fraud itself seems to have taken place in March, and was disclosed in the first …

Member Avatar for Lightninghawk
4
1K
Member Avatar for happygeek

Facebook users have been making a lot of use of the new 'like' feature which allows users to link to webpages that they, well, like funnily enough. Not so funny when Facebook users are claiming to like a site called "101 Hottest Women in the World" which features an image …

Member Avatar for rocco88
0
456
Member Avatar for tajendra

Working with dll i got into a situation where loading a dll can cause security threat. lets say for example when you load a DLL, it gets same access privilege as the calling process. So if calling process is running with Admin privilege the loaded dll gets the elevated privilege …

Member Avatar for vijayan121
0
149
Member Avatar for java_sabin

hi, I'm the student of network and IT security and i need to have my final year major project that holds the double credit. can you help me getting the topics. these are the modules i have in final year: Wide Area Networks E-commerce Applications Fundamentals of Security Management Fundamentals …

Member Avatar for suley04
0
1K
Member Avatar for megansims07

I'm attempting to create a program where the login and password will be verified on an SQL database of user information. I keep getting the error "SQL Execution was unhandled" I marked the code that was causing the error in red. I'm using Visual Studio 8. Keep in mind I …

0
115
Member Avatar for railrover

Hi all, I'm having problems getting my mobile device (Windows Mobile 6.1) to see my VB.NET application as genuine. Here are the steps I am taking - can anybody see why there is a problem? I use makecert.exe to create a new root certificate.... makecert -n "CN=McLernonsMARS" -r -sv McLernonsMARS.pvk …

Member Avatar for railrover
0
185
Member Avatar for Lisa Hoover

Although Mozilla's Firefox and Google's Chrome browsers get a lot of attention in the media, Apple's Safari browser is not too shabby in comparison. The one thing it unfortunately lacks is robust security. Given that so much computer activity revolves around the browser these days, security is the last place …

Member Avatar for rockyrat12
0
334
Member Avatar for MoZo1

This prints NULL: [CODE=Java]String sss = System.getSecurityManager() == null ? "NULL" : System.getSecurityManager().getClass().getName(); System.out.println(sss);[/CODE] And this throws exception: [CODE]ServerSocket serversocket = new ServerSocket(80);[/CODE] This one: [CODE]Exception in thread "main" java.lang.Error: java.net.BindException: Permission denied at httpserver.HTTPServer.main(HTTPServer.java:68) Caused by: java.net.BindException: Permission denied at java.net.PlainSocketImpl.socketBind(Native Method) at java.net.PlainSocketImpl.bind(PlainSocketImpl.java:383) at java.net.ServerSocket.bind(ServerSocket.java:328) at java.net.ServerSocket.<init>(ServerSocket.java:194) at …

Member Avatar for MoZo1
0
423
Member Avatar for slfisher

An Internet Service Provider (ISP) has finally been given permission to reveal that he was the recipient of an National Security Letter (NSL) from the Federal Bureau of Investigation (FBI) six years ago, demanding information about his clients. Nicholas Merrill, president of the New York ISP Calyx, still can’t say …

Member Avatar for glitchmind
0
884
Member Avatar for happygeek

[ATTACH=RIGHT]22256[/ATTACH]England just scraped to a hard fought win against a physical and enthusiastic Argentina side in their opening match of the 2011 Rugby World Cup campaign in New Zealand. But while sports fans the world over get excited about how their country is performing in the initial pool group matches, …

Member Avatar for ChrisHunter
0
455
Member Avatar for happygeek

Last year saw the overall volume of email delivered spam drop for the first, which has to be good news. Or it would be were it not for the fact that spammers have not gone away, they have merely moved with the times and adapted their business so as to …

Member Avatar for data-struction
2
704
Member Avatar for happygeek

Having a professional interest in security, and a personal distrust of politicians and their promises of providing the same, I was not at all surprised by the findings of a [URL="http://www.bbc.co.uk/pressoffice/pressreleases/stories/2007/03_march/23/keylogger.shtml"]BBC TV investigation[/URL] that has just been broadcast in the UK. Inside Out, a news reporting and investigative documentary series …

Member Avatar for Denmbithi
0
995
Member Avatar for sathya88

how to use messagedeigest class to bring security to a file...encode and decode a file... any suggestion ?????

Member Avatar for JamesCherrill
0
99
Member Avatar for Upoma

I am developing a desktop based software in Java using IDE Netbeans 7 and database MySQL. Now i want to distribute this software and protect it from piracy.I want to implement online licence verification.That means when user will install the software a number based on hardware configuration will be sent …

Member Avatar for hfx642
0
729

The End.