Member Avatar
will really love to know more about hosting a network and creating a security to it.
by wilkis123 in Networking ()
Member Avatar
Like if there are 50 people using computer to surf Facebook at the library don't the accounts gets suspended? My friend tried making 2 facebooks with his home internet the account got locked and said needed to be verified first. But at the library don't they get suspded? Since there …
by coltdog21 in Networking ()
Member Avatar
I was stumbling trough the inter net the other day when I came across a company offering Free (3 systems or less) software to help find your Laptop, Tablet, phone, etc. should it be misplaced or stolen. Not a unique idea I know but they had some interesting features besides …
by rch1231 169 in Information Security ()
Member Avatar
Nice to meet you all. I'am security expert and i want to learn and share my knowledge with forum members.
by Securex in Community Center ()
Member Avatar
Hello, I have a question about who uses https:// instead of http:// ? What is the point of encrypting the information if that is the point? Who normally uses it? Ecommerce? Bank? Who else? If am I right?
by davy_yg 16 in Web Development ()
Member Avatar
I have a question regarding user membership of groups in Active directory and grabbing such memberships with PHP. My big question/situation is that I have a site I am making and essentially I am trying to assign administrators based off of groups in Active directory and I know how to …
by toxicandy 2 in Web Development ()
Member Avatar
Good morning, I just want to get an advice from you guys regarding with permission problem. Recently when doing some cut, copy and paste action in my windows 7 pc, I encounter a problem which I cannot open a file. For some instance I cut a file from a folder …
by Emmanuel_6 in Microsoft Windows ()
Member Avatar
Hey, now I if I need to make a Security program for games by #c there are onther thing I should learn it behind #c?
by Abdelaziz_1 -1 in Programming ()
Member Avatar
HI guys, What is the best textbook for CCNA security preparation?
by twhentea in Networking ()
Member Avatar
Database systems and Administration Scenario: PEC offers several programs. Each program is supervised / chaired by a Head of the department (HoD) who is a lecturer. One HoD can lead only one program. There are several departments for each program. Many modules are offered by each department. Few departments are …
by amhoor in Databases ()
Member Avatar
I will soon start my project, but before that I need to set up my server my project is shopping website so I will need web server and database server for the custoerms information. I have couple of question: 1- Can I setup my server in the same computer that …
by luckyme_ in Networking ()
Member Avatar
Hi, I am trying to set up a 2012 Server for VPN access, this is not a domain, just a plain 2012 to store files for local access but now I would like to install VPN so we could access the files from remote sites. I have read and followed …
by hemstal in Networking ()
Member Avatar
After reading all the hype about the random ware virus I installed BufferZone Pro 64 bit. Worked o.K the first day but after booting today all my visual styles in windows 7 home premium disappeared ( aero glass etc) to make the opened windows really look poor. After uninstalling, everything …
by Minimalist 54 in Information Security ()
Member Avatar
Hello everybody i would like some worked on the field of SQL test cases generation based mutation. In fact i almost wrote the test cases mutation code and i generated mutated test cases. but now i want to validate thus inputs or test the mutation by verifiying the killed and …
by ilyes222 in Information Security ()
Member Avatar
Hi, everyone, I am an IT student, currently in 3rd year. I want to know can I select "Design of netwrok for a campus, (infrastructure CISCO)+ System Administration (microsoft)" what do you think about this. I am interested in in networking, have studed DCCN, currently studying CCNA.
by Riaz Gul in Networking ()
Member Avatar
Program 8— Social Security Number Validation In this project, you will write a program to prompt the user to enter their social security number in the format ###-##-#### and then determine if the input is properly formatted. A properly formatted social security number will have: • A length of 11 …
by Julie_2 in Software Development ()
Member Avatar
You all should raise your guard! CryptoWall 4.0 has been released and analysed by Nathan Scott: ...
by IntegratedTweak 16 in Information Security ()
Member Avatar
So I have a question and I really need some guidance for this as networking unfortunately isnt my strongest area of IT expertize. I've recently had a new client of mine approach me wanting to setup internet access for tenants at an apartment complex he owns. Attached is a very …
by Omni in Networking ()
Member Avatar
Hi there I have this problem on how to access the website/server without using IP address im using xampp as a trial for this. im always using IP's instead of names. I would like to know more on how to customize my Public Static IP(121.xxx.xxx.xxx) to name(www.mysite.localserver) like that
by joshuajames.delacruz in Hardware and Software ()
Member Avatar
Since I totally F'd up entire topic. ... , where nobody has ever known what I meant, until I realized that I said a lot of things that didn't make sense at all, nor I could make up any reasonable statements from smart people out there. By suggestion of said …
by Aeonix 39 in Software Development ()
Member Avatar
As soon as I find out exact manner of communication between the server and the software. I realized how easy it is to use programs to intercept it, analyze it and then send malicious (or rather illegal) query through. So. I was wondering is there a way to make sure …
by Aeonix 39 in Software Development ()
Member Avatar
Hello, I am facing a very tiresome problem. Whenever I click on any link (sometimes not even on link, any where on the window) on any web browser (I am using Chrome more), a new tab opens up with address "wonderlandads.com". This stays for fractions of a second and some …
by Noor_7 in Microsoft Windows ()
Member Avatar
Hi guys, something a little strange has happened. While I browsed to google.co.uk home page I've seen a message flashing on the top left of the screen, it flashed literally for about half a second and after ctrl+f5 numerous times I managed to get a screenshot and it says "Online …
by Violet_82 35 in Information Security ()
Member Avatar
If there was one computer that was badly infected as this then you'll be horrified! It was about 7PM Australian time and I just got this Lenovo Laptop from this guys house in Queensland. The laptop looked like it belonged to a kid before because it looked like someone loves …
by IntegratedTweak 16 in Information Security ()
Member Avatar
Hello everyone, This is Jeni, An online marketer. I would like to have some disscussions on digital market strategies and updates. Hope Daniweb community folks will enjoy my sharings and discussions on digital sales. Thank you.
by JeniAnderson in Community Center ()
Member Avatar
If I wrote a program which would ... a base64 code, like an easter egg ("a hidden secret" in gaming jargon) or something, for example ... And I would let a good obfuscator run through it. Now I know that crackers with enough time and knowledge can reverse engineer a …
by Aeonix 39 in Software Development ()
Member Avatar
Hi I am desperatly struggling lot to configure SMTP using iis 6 on windows 2008 server . i am following same procedure as per below ... but unable to send any mails . can any one help me?
by amit_4184 in Networking ()
Member Avatar
Is Yahoo phone (O800-O86-8676) yahoo Technical Helpline Number for UK ? What on earth do I do? Monday Midday, a spam email was sent from my account to all my contacts. I could still log on, see my emails and send new emails but no incoming mails were reaching my …
by Henry_6 in Microsoft Windows ()
Member Avatar
CryptoWall 4.0 the newest ransomware to date is been spread by Angler Exploit Kits. A new drive-by download campaign is to blame for this attack. Heimdal was the first to discover the malware nearly one month ago. It's also more stealthier than previous versions and also a lot stronger. This …
by IntegratedTweak 16 in Information Security ()
Member Avatar
I know we can go to the audit log to check who access the server but I would like to know how to configure my window server 2008 to send an push notification email or SMS immediately if it detect any unauthorised users trying to login or failed login attemps. …
by Takuniku in Information Security ()