For those very new to this area, please google SIM SWAP and discover a very nasty security issue with all phones we use today. At first glance the new security researcher might think I'm exaggerating. Do your own research and tell me you don't find this to be one of the most foul, nasty exploits I've seen in years. This exploit was recently used to highjack a writer's phone at https://www.zdnet.com/article/sim-swap-horror-story-ive-lost-decades-of-data-and-google-wont-lift-a-finger/ His case is still developing with loss of accounts, tax returns he stored on the Clouds, and a 25,000USD Bitcoin purchase. And we're not talking thousands of dollars in …

Member Avatar
+0 forum 0

Hi, I am trying to disable a forwarder in a mailbox under exchange server 2010 on server 2008 R2 x64 on Hyper-V. When I try to remove the forwarded email in the mailbox and click on apply or OK, I receive error which says, "you must provide a value to this property". I am getting same error in cmdlet commands. When I try to collect organizational health, I get same error in last third phase. If I try to remove mailbox, disable it or even I try to create new mailbox, I get the same error msgs says provide value …

Member Avatar
+0 forum 0

I have a question regarding user membership of groups in Active directory and grabbing such memberships with PHP. My big question/situation is that I have a site I am making and essentially I am trying to assign administrators based off of groups in Active directory and I know how to check member of status on an account but my problem is that there are some groups that aren't displayed there, and one of the groups that is not displayed is the group I need. Is there a way I can check **who is** a member of that group instead of …

Member Avatar
+0 forum 0

Hello everybody i would like some worked on the field of **SQL test cases generation based mutation**. In fact i almost wrote the test cases mutation code and i generated mutated test cases. but now i want to validate thus inputs or test the mutation by verifiying the killed and survived mutants on other softwares or web-based applications...........please any help any ideas i really i spent long time i read a lot of paper but couldn't find how to do it

Member Avatar
+0 forum 0

Hi I am desperatly struggling lot to configure SMTP using iis 6 on windows 2008 server . i am following same procedure as per below http://www.vsysad.com/2012/04/setup-and-configure-smtp-server-on-windows-server-2008-r2/ but unable to send any mails . can any one help me?

Member Avatar
+0 forum 0

Is Yahoo phone (O800-O86-8676) yahoo Technical Helpline Number for UK ? What on earth do I do? Monday Midday, a spam email was sent from my account to all my contacts. I could still log on, see my emails and send new emails but no incoming mails were reaching my mail box. Asked a quesiton on Yahoo Answers forum, but got a useless response Tuesday, by 2pm my account was suspended completely, I can;t log in? I can't reset my password? there is on line form to fill out to contact customer care, I filled it out, but no one …

Member Avatar
+0 forum 0

CryptoWall 4.0 the newest ransomware to date is been spread by Angler Exploit Kits. A new drive-by download campaign is to blame for this attack. Heimdal was the first to discover the malware nearly one month ago. It's also more stealthier than previous versions and also a lot stronger. This time the message is different and more filenames had been added to the list. Also users have to fork out $700 for the decryption key which makes it a hefty price to pay. Firstly the Pony Information Stealer scrapes the computer of usernames and passwords by scouring the victims computer. …

Member Avatar
+0 forum 0

I am have debugging some javascript code in firebug,then i have seen some strange POST thing in firebug this is worrying me? I have registration form when i reload page i see in firebug following "POST http://api.adsrun.net/post" Response Header Cache-Control no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Connection keep-alive Content-Type application/json Date Mon, 09 Nov 2015 13:25:43 GMT Expires Thu, 19 Nov 1981 08:52:00 GMT Pragma no-cache Server nginx/1.9.4 Set-Cookie PHPSESSID=a0f52694494daab764d719b907baff6b; expires=Sat, 07-Nov-2020 13:25:43 GMT; Max-Age=157680000 ; path=/ Transfer-Encoding chunked access-control-allow-cred... true access-control-allow-head... Content-Type access-control-allow-orig... http://localhost p3p CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV …

Member Avatar
+0 forum 0

Free Web Hosting with cPanel up to 1 GB for one year from WHDMS.COM Cart page :- https://goo.gl/f9boM9 Use Promo Code – FWH100 Features of Free Web Hosting by WHDMS.com: 1GB Free Space 100GB Data transfer and Bandwidth 5 E-mail contacts and FTP accounts 5 MYSQL accounts can be created Daily auto backups 50 Installation Apps Free web hosting accounts within 60 seconds 24X7 Customer support Notifications and alerts for website monitoring 2-step authentication for future security Absolutely AD free Credit card not required No Hidden Costs

Member Avatar
+0 forum 0

I found a document,which contains many key trial of Norton Internet Security. I tried on my computer and fell good with it. Let's try if you want and notifys to me your result. I'm so glad for this [Key NIS 2014 ~180 days](http://ouo.io/3Tqfa) the root website: https://sites.google.com/site/librarylinkvip/home/share-key-nis-2014

Member Avatar
-1 forum 0

Esteemed readers After updating multiple times a server with W2k8R2, the Security Update for .NET KB2894854 becomes available over and over again in WU (control panel). Apparantly it's installed 4.5.52022. Thanks for your time. Faithfully, Ivan

Member Avatar
+0 forum 0

Do you notice that APPs are facing more and more risk of privacy leaks and security threats? As an APP developer, how do you improve the security and privacy of APP?

Member Avatar
+0 forum 0

using System; using System.Collections.Generic; using System.Linq; using System.Text; using System.Windows.Forms; namespace DBCsharp { class authentiction { public static int logged_user_id=0; public static bool CanAddUser = false; public static bool CanDeleteUser = false; public static TaregData db = new TaregData(); public static bool log_user(string username,string password) { var user = (from a in db.Users where a.username == username select a).DefaultIfEmpty(); if (user.First() != null) { var user_pass = (from a in db.Users where a.username == username && a.Pass == password select a).DefaultIfEmpty(); if (user_pass.First() != null) { logged_user_id = user_pass.First().user_id; var p = from a in db.user_privs where a.user_id == logged_user_id …

Member Avatar
+0 forum 0

I am working on trying to secure some coldfusion servers. I've seen the lockdown guides all over the net. But those guides are for new installs. Is there a way to lockdown coldfusion after the install?

Member Avatar
+0 forum 0

Hello Everyone, Already my web project is developed by using jsp and servlets now I would like to do security check on each and every pages. so, is there any software to check whether my all pages are robust and secure before deploying on to the live server. Eg: Like form validation on each page Sql injection etc. kindly help on this. Thanks in Advance.

Member Avatar
+0 forum 0

hi , i am unable to solve this error , am running chukwa on single node so please guide me . The error am getting is shown below, hduser@bizruntime:/usr/share/chukwa/chukwa-0.4.0/bin$ ./start-all.sh cat: /usr/share/chukwa/chukwa-0.4.0/bin/../conf/collectors: No such file or directory cat: /usr/share/chukwa/chukwa-0.4.0/bin/../conf/agents: No such file or directory starting archive, logging to /usr/share/chukwa/chukwa-0.4.0/bin/../logs/chukwa-chukwa-archive-bizruntime.out starting demux, logging to /usr/share/chukwa/chukwa-0.4.0/bin/../logs/chukwa-chukwa-demux-bizruntime.out Exception in thread "main" java.lang.NoClassDefFoundError: org/apache/commons/configuration/Configuration at org.apache.hadoop.metrics2.lib.DefaultMetricsSystem.<init>(DefaultMetricsSystem.java:37) at org.apache.hadoop.metrics2.lib.DefaultMetricsSystem.<clinit>(DefaultMetricsSystem.java:34) at org.apache.hadoop.security.UgiInstrumentation.create(UgiInstrumentation.java:51) at org.apache.hadoop.security.UserGroupInformation.initialize(UserGroupInformation.java:217) at org.apache.hadoop.security.UserGroupInformation.ensureInitialized(UserGroupInformation.java:185) at org.apache.hadoop.security.UserGroupInformation.isSecurityEnabled(UserGroupInformation.java:237) at org.apache.hadoop.security.KerberosName.<clinit>(KerberosName.java:79) at org.apache.hadoop.security.UserGroupInformation.initialize(UserGroupInformation.java:210) at org.apache.hadoop.security.UserGroupInformation.ensureInitialized(UserGroupInformation.java:185) starting dp, logging to /usr/share/chukwa/chukwa-0.4.0/bin/../logs/chukwa-chukwa-dp-bizruntime.out Exception in thread "main" java.lang.NoClassDefFoundError: org/apache/commons/configuration/Configuration at org.apache.hadoop.metrics2.lib.DefaultMetricsSystem.<init>(DefaultMetricsSystem.java:37) at org.apache.hadoop.metrics2.lib.DefaultMetricsSystem.<clinit>(DefaultMetricsSystem.java:34) at org.apache.hadoop.security.UgiInstrumentation.create(UgiInstrumentation.java:51) at org.apache.hadoop.security.UserGroupInformation.initialize(UserGroupInformation.java:217) at org.apache.hadoop.security.UserGroupInformation.ensureInitialized(UserGroupInformation.java:185) at …

Member Avatar
+0 forum 0

Good Day, I am thinking of building a diary that has entries based on the dates of the year as inputed via a calendar/ date-time picker. Its security is in the fact that it can only be read from the program. Opening the original text is a different encoding. Based on the above I am thinking I might need to create my own file extension. This is a program for experimentation with security purposes. I am trying to play out a fun challenge for me. Ideas and suggestions on how to go about it will be gladly recieved. Thanks in …

Member Avatar
+0 forum 0

hey, I need help with this code, I have made database and code for inserting data, now I need code that will display data for group, in database I have groupnaziv, and id, here is code for inserting which works great, after that I will post code that I need help with <p align="center"><font color="#0000FF">Registracija koncerata</font></p> <p align="center">Naziv koncerta: <input type="text" name="enter_koncert" id="enter_koncert" /> </p> <p align="center"><font color="#0000FF">Broj prodatih karata</font></p> <p align="center">Broj: <input type="text" name="enter_karte" id="enter_karte" /> </p> <p align="center"><font color="#0000FF">Mesto</font></p> <p align="center">Mesto: <input type="text" name="enter_mesto" id="enter_mesto" /> </p> <p align="center"><font color="#0000FF">Datum</font></p> <p align="center">Datum: <input type="text" name="enter_datum" id="enter_datum" /> </p> …

Member Avatar
+0 forum 0

hi daniweb, I'm trying to work on a project regarding building a data mining software using software security tools. the essence of the project to address the security issues in data mining software. can these two aspects really be combined? i also need help on the languages i could use to create a data mining software. thanks, Sharon

Member Avatar
+0 forum 0

Hello, Can someone please point me in the right direction for using the Digital Persona Fingerprint system, the u.are.u 4500 one. I have imported the following statements; Imports GrFingerXLib Imports Microsoft.VisualBasic But then I don't know where to go from there. All I want to do is scan the fingerprint, check a list of stored users, so I'll have to figure out how to save a fingerprint against a person's profile, and confirm the identity of the user. Any help would be greatly appreciated! I have no idea where to go with this, I have installed the RTE setup and …

Member Avatar
+0 forum 0

I'm very much interested to develop Network IDS for my final year project , but I'm beginner to this Network security domain.Need some suggestion and some resources to develop this project.please help me .

Member Avatar
+0 forum 0

We're looking into the Enterprise Library, to see if the security part will fit our needs. We want to use application roles/rights, so we probably need to write our own security provider. What I'm looking for are decent resources on this specific topic. I've found several books already on the library, but I'd like something that focuses on security specifically.

Member Avatar
+0 forum 0

what are the drawbacks of Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing.

Member Avatar
+0 forum 0

Hello, I'm developing an e-commerce site in a LAMP environment. Is it advisable to separate data on to different servers (i.e. to have one server as the web server and another server to house transaction and other customer data)? In other words, from a security perspective is there any reason why I should not house all the data both for the e-commerce webshop and all backend customer and transaction data on a single machine and even in a single database)? [with daily backups of course]. Thanks in advance... Peter

Member Avatar
+0 forum 0

What I have is a linksys wrt54gs(dd-wrt) router assigning private ip's to my workstations. I also have a Windows Server which i need accessible for Windows Remote Desktop Connection to my remote office in Costa Rica. I'd like to have the server have one of my 5 static public ip's(so i can use a host on one of my domains) but the only way i was able to set this up properly was by putting the server on the modem directly not behind the router. When i tried using NAT, it would assign the public static ip but Windows would …

Member Avatar
+0 forum 0

I'm attempting to create a program where the login and password will be verified on an SQL database of user information. I keep getting the error "SQL Execution was unhandled" I marked the code that was causing the error in red. I'm using Visual Studio 8. Keep in mind I am pretty unsure of what I'm doing, and I am probably no where to even close to the right track. [CODE]Public Class Form1 Private Sub btnLogin_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnLogin.Click pnlLogin.Visible = False GroupBox1.Visible = True PanelSales.Visible = True End Sub Private Sub btnInventory_Click(ByVal sender …

Member Avatar
+0 forum 0

In windows XP most of viruses spread through Autorun (Autorun.inf) Function in windows. It is better to Disable Autoruns in Xp. I am not sure about windows Vista but In WindowsSeven and above this feature is already blocked so you dont need to do anything. Ok Here are the Two Mathods that show you "How to block autorun files". [B][INDENT][INDENT][INDENT]Mathode 1 (Easy)[/INDENT][/INDENT][/INDENT][/B] Use A Software to Block Autoruns. I recommend [B][URL="http://download.cnet.com/Panda-USB-Vaccine/3000-2239_4-10909938.html"]Panda USB Vaccine[/URL][/B] [B][INDENT][INDENT][INDENT]Mathode 2 (A little bit Difficult) [/INDENT][/INDENT][/INDENT][/B] 1. Type regedit in RUN or Startmenu searchbox and press Enter. It'll open Registry Editor. 2. Go to following key: …

Member Avatar
+0 forum 0

Hi All, I need some help with one of my sites: SNIP Can you find any foul code/script that could be inserted. I recently opened my site and a competitors site just popped-up. I did several scans but couldn't find anything. Also websecurity isn't really my field of work. Any help would be appreciated.

Member Avatar
+0 forum 0

Hi, I am currently in 2nd Year MCA(Masters of comp. application). I want to become an information security expert. Ethical Hacking has been a favorite subject for me since my beginning days in computers. My current knowledge base is: 1>Languages:C/C++/Java/Python, Assembly(both AT&T and Intel x86) 2>Networking:Only basics(both theory & programming).(from Stevens book). 3>O.S.: GNU/Linux, Free BSD, Windows.(know how to operate and configure them, although still struggling in kernel part.) Also I have knowledge about some interior subjects like system calls, making exploits(shell coding etc.),some tools like nmap, metaspoilt, debugger, etc. Now it seems as I have it a wall(well metaphorically) …

Member Avatar
+0 forum 0

Hi everyone, Wondering if anyone can assist me with this; I've done some googling but haven't come across anything. We have a dedicated server running SQL Server 2005, express edition. I recently set up the server to allow remote connections to the DB engine and everything is working just fine. However, I would really like to limit remote connections to just one user; IE if someone other than user XYZ connects remotely, they are denied. Any ideas? Thanks in advance

Member Avatar
+0 forum 0

The End.