Menu
Menu
DaniWeb
Log In
Sign Up
Read
Contribute
Meet
Search
Search
About 1,000 results for
security
- Page 1
Re: How secure is Github?
Programming
Software Development
1 Week Ago
by rproffitt
Given the state of affairs in the USA, any
security
we thought we had is gone. DOGE is gaining access by force now. Do we really need this conversation?
Re: How to Completely Wipe All Data from a Laptop Before Selling It?
Hardware and Software
Microsoft Windows
2 Months Ago
by FluentBit
…: Backup Important Files. Factory Reset: Windows: Settings > Update &
Security
> Recovery > Reset this PC. Mac: Restart and use… secure data deletion. Remove the Hard Drive (Optional) for extra
security
. For Linux: Use tools like shred or dd to overwrite…
Best practices for information security of your business
Hardware and Software
Information Security
2 Months Ago
by Ahsan_38
Encrypt Sensitive Data: Use encryption to protect sensitive business data, both at rest and in transit, to prevent unauthorized access.
Re: Best practices for information security of your business
Hardware and Software
Information Security
2 Months Ago
by rproffitt
Is the following in need of encryption? 动态网自由门 天安門 天安门 法輪功 李洪志 Free Tibet 六四天安門事件 The Tiananmen Square protests of 1989 天安門大屠殺 The Tiananmen Square Massacre 反右派鬥爭 The Anti-Rightist Struggle 大躍進政策 The Great Leap Forward 文化大革命 The Great Proletarian Cultural Revolution 人權 Human Rights 民運 Democratization 自由 Freedom 獨立 Independence 多黨制 Multi-party …
Re: Best practices for information security of your business
Hardware and Software
Information Security
2 Months Ago
by rproffitt
When I mention The Tiananmen Square protests of 1989 and such it's poison for certain AI's.
Re: Best practices for information security of your business
Hardware and Software
Information Security
2 Months Ago
by Dani
Huh?? Why are you responding to someone's post with pure spam? If you agree it's spam, I'm going to delete your post with a Keep It Spam-Free infraction.
Re: create table in ms access dynamically
Programming
Software Development
2 Months Ago
by Emil_9
…= " & "C:\Users\efgarcia\Documents\database2.accdb;Persist
Security
Info=False;" myConnection.Open Dim NewTableName As String 'NewTableName…
Re: how much does Stable Token Development cost?
Programming
Software Development
2 Months Ago
by Suheb
The stable token development cost ranges from $10,000 to $150,000+, depending on factors like blockchain platform, smart contract complexity, and compliance needs. A basic stablecoin costs around $10K-$30K, while an enterprise-grade token with auditing and
security
features can exceed $60K-$150K.
Re: Text Classification and Summarization with DeepSeek R1 Distill Llama 70B
Programming
Computer Science
1 Month Ago
by rproffitt
… Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information" "
Security
researchers tested 50 well-known jailbreaks against DeepSeek’s popular…
Re: how much does Stable Token Development cost?
Programming
Software Development
1 Month Ago
by wootingdouble
The cost of Stable Token Development varies based on factors like blockchain selection,
security
features, compliance requirements, and customization. Consulting with a development team can give a more precise estimate.
Re: How I get big data for statistical analysis of my pre seed pitch deck
Digital Media
UI / UX Design
1 Month Ago
by rproffitt
… USA. Our government has enabled DOGE to break through any
security
there was at multiple agencies. This just in: "February…
Re: Contact form does not working
Programming
Web Development
1 Month Ago
by gediminas.bukauskas.7
WEB
security
now rejects mail sent from any computer. Select some mail provider and send mail using it. Using certificated WEB serve is an another solution. Obtain legal certificate, register it on WEB server (IIS, Apache, NGINX, ...)
Re: How does Microsoft defender operate?
Hardware and Software
Information Security
1 Month Ago
by Heatman
The same way AVAST works is the same way Microsoft Windows Defender works. It's the main
security
guard that protects your system against any foreign attacks especially against virus. It's what I've always been using for my laptop.
Re: How do I establish an open connection to an open web browser in C#?
Programming
Software Development
2 Months Ago
by skynode
To interact with an already open browser in C# using Selenium, launch Chrome with the --remote-debugging-port flag (e.g., chrome.exe --remote-debugging-port=9222). Then, in your C# code, use ChromeOptions with the DebuggerAddress set to the same port (127.0.0.1:9222). This allows you to connect to the open browser and automate actions without …
Re: How do I establish an open connection to an open web browser in C#?
Programming
Software Development
1 Month Ago
by pathofbuilding
To attach Selenium to an already open Chrome browser in C#, launch Chrome manually with debugging enabled using chrome.exe --remote-debugging-port=9222 --user-data-dir="C:\SeleniumChromeProfile", then use ChromeOptions options = new ChromeOptions(); options.DebuggerAddress = "localhost:9222"; IWebDriver driver = new ChromeDriver…
Re: How do I establish an open connection to an open web browser in C#?
Programming
Software Development
1 Month Ago
by xivlauncher
You can also use SHDocVw or System.Diagnostics name spaces from C# to interact with an open web browser, or connect programmatically to an existing browser window using the UI Automation API. Of course, for deeper control over Chrome, you may need the Chrome DevTools Protocol.
Re: What is the best possible way to protect my website?
Hardware and Software
Information Security
1 Month Ago
by Heatman
Adding to what other people have said, it's also very important to back up your data from time to time in case anything happens. You will still have access to your data. Please back up manually if possible.
Re: What is the best possible way to protect my website?
Hardware and Software
Information Security
1 Month Ago
by cpvr
You can also setup two factor authentication for your cpanel account, so you’re the only one that’s able to access it.
Re: What is the best possible way to protect my website?
Hardware and Software
Information Security
1 Month Ago
by Ja sa bong
Anyone who's smart will never use a website with an expired SSL certificate. It's very important to have this active on your website at all times.
Re: ‘Advanced AI should be treated similar to Weapons of Mass Destruction’
Community Center
1 Month Ago
by rproffitt
UPDATE: Feb 4, 2025 — Google on Tuesday updated its ethical guidelines around artificial intelligence, removing commitments not to apply the technology to weapons or surveillance.
Security Camera PCI Express Card
Hardware and Software
Hardware
11 Years Ago
by ColeTechInc
*
Security
Camera PCI Express Card* Any one know where i can find a
Security
Camera PCI Card with 4 Inputs and Audio Input as well that has network capability so i can view it from a IOS or Android App?
Security Alert: Spyware found
Hardware and Software
Information Security
17 Years Ago
by Trinexus
Security
Alert: Spyware found Your computer is infected with last version …
"Security Tools has harmful software" message
Hardware and Software
Information Security
15 Years Ago
by ronnie2123
security
tools has been appeared everytime and i can function right all program they say i must click to it and immeadiately remove it but when i got to click it it appear to be a form of credit tregistry what should i do to fix it
Re: "Security Tools has harmful software" message
Hardware and Software
Information Security
15 Years Ago
by ronnie2123
security
tools has deteced harmful software that can lean to my pc crash
• security - propose an algorithm using IA or Machine Learning for an intru
Hardware and Software
Networking
11 Years Ago
by emeritusbrians
•
security
- propose an algorithm using IA or Machine Learning for an intruder on a network I need a solution this as my thesis
Re: Security error while loading pdf file in jsp in firefox?
Programming
Web Development
16 Years Ago
by ~s.o.s~
>
Security
Error: It seems as though Firefox distinguishes between unsafe URI … FILE protocol directly execute and this might pose a *big*
security
vulnerability if the user has admin rights or if the…
Re: security log
Hardware and Software
Information Security
19 Years Ago
by petercoti
security
file
Security by any other name
Hardware and Software
Networking
16 Years Ago
by happygeek
…Val Rahmani warned that the enterprise must fundamentally change
security
strategies if it is to have any success within …which just so happened to have acquired a dozen
security
companies during the last year alone, to focus …sustainability instead. Of course, business sustainability is really just
security
by another name. So that's OK then, and…
Security
Digital Media
Digital Marketing
18 Years Ago
by itchap
HI, I have to write a essay on comparing
security
measures that companies use. I have to compare OUTSOURCING to …SUBSTANDARD INTERNAL
SECURITY
. The problem is, that i dont really know what is… my essay. :sad: Can you please tell me what internal
security
is, so that i can be able to reasearch it…
Security
Community Center
18 Years Ago
by itchap
HI, I have to write a essay on comparing
security
measures that companies use. I have to compare OUTSOURCING to …SUBSTANDARD INTERNAL
SECURITY
. The problem is, that i dont really know what is… my essay. :sad: Can you please tell me what internal
security
is, so that i can be able to reasearch it…
1
2
3
17
Next
Last
Search
Search
Forums
Forum Index
Hardware/Software
Recommended Topics
Programming
Recommended Topics
Digital Media
Recommended Topics
Community Center
Recommended Topics
Latest Content
Newest Topics
Latest Topics
Latest Posts
Latest Comments
Top Tags
Topics Feed
Social
Top Members
Meet People
Community Functions
DaniWeb Premium
Newsletter Archive
Markdown Syntax
Community Rules
Developer APIs
Connect API
Forum API Docs
Tools
SEO Backlink Checker
Legal
Terms of Service
Privacy Policy
FAQ
About Us
Advertise
Contact Us
© 2025 DaniWeb® LLC