1,390 Topics

Member Avatar for
Member Avatar for Askeenjesran
Member Avatar for Dani
-2
30
Member Avatar for Johannes C.

**Looking for some scary tales to tell around the campfire (or perhaps a circle of blinking routers) this Halloween? We've got you covered. Here are three real horror stories from the world of tech and science that will make you wish humanity had never left the stone age.** ![zunehounting.jpg](https://static.daniweb.com/attachments/4/0c93290c50339b8dba5d0379865e6e7b.jpg) ## …

Member Avatar for Johannes C.
1
57
Member Avatar for Synergy_1

i own a website for my business and i really like to understand and implement security practices for my website.

Member Avatar for scope_2
4
261
Member Avatar for Carrie8909

I have an open source WAF in production. It's open source and free. It can be the alternative of Cloudflare, the open source edition. How can I find the potential users to try my WAF?

Member Avatar for cored0mp
0
115
Member Avatar for Masika

Does Anyone know how a beginner like me in tech can start learning cyber security or starting a career in cyber engineering?

Member Avatar for trueframe
1
116
Member Avatar for fowokov687l

I wanted to set up a nextcloud server so that I can remotely access my cloud without relying on outside servers. I am using ubuntu linux.

Member Avatar for Dani
1
199
Member Avatar for Chimdiebube

Hey guys! I started a keylogger project two months back, and I've hit a slump relating to what features I can add to make it more complex and less basic. So I just wanted to hear any suggestions anyone might have, so I find some inspiration. **Note: This project is …

Member Avatar for Dani
0
42
Member Avatar for bsetec

Legal and regulatory challenges for blockchain projects include navigating uncertain laws, particularly regarding data privacy and smart contracts. Compliance with anti-money laundering and know-your-customer regulations is tricky due to blockchain's pseudonymous nature. Token regulation complexity and cross-border transaction issues add further hurdles. Moreover, protecting intellectual property in open-source settings poses …

Member Avatar for unknowntech
-1
14
Member Avatar for Johannes C.

**A geeky multi-tool capable of hacking into Wi-Fi networks and [opening Tesla car charging ports](https://www.youtube.com/shorts/ZZXkQm4kgGM) has been making headlines recently. I've familiarized myself with Flipper Zero and performed basic penetration testing on my own network and system. In this post, I share the results.** ![flipper-zero-review-header.jpg](https://static.daniweb.com/attachments/4/af11e47473d803227046c92aae1f425a.jpg) ## What is Flipper Zero? …

3
1K
Member Avatar for ClaudiaJesse

Hey everyone, Recently, I came across a tool called DICloak that offers an anti-detection browser. It's designed to help manage multiple accounts without getting flagged, which seems pretty useful, especially for those who need to handle multiple profiles for work or other activities. I’m not trying to promote anything, but …

Member Avatar for Salem
-2
19
Member Avatar for VAIBHAV_20
Member Avatar for Puterwiz82

I been using Eero+ but recently switched to NextDNS. I selected several blocklists. Which is better to use, Eero+ or NextDNS? I know there’s a price difference. I don’t need parental controls.

Member Avatar for Aditi_16
0
185
Member Avatar for Peter_136

Daniweb showed up as having a breached password in Avast, but if I try to log in it claims my computer's time is wrong so it is obviously thinking I have moved to a different timezone. How can I get in and fix it? I assure you I am not …

Member Avatar for Dani
0
35
Member Avatar for saichinnu1852

We are working on upgrading our Alteryx application as well as the MongoDB version. We have created a non-production environment to test the upgrade. Since the non-production environment is new, and Alteryx and MongoDB have just been installed to it, it has no existing data yet. We tried to migrate …

1
28
Member Avatar for Mark_144

Hello, I am confused about whether a multi-domain SSL certificate can secure primary domains and subdomains. Can anyone clarify this for me?

Member Avatar for m2host
0
152
Member Avatar for brainsoverbrawl

I have been debating between learning cyber security or UX Design. In the next two years I would like a career in one of those two areas. What are some pros/cons that could help me find which direction is right for me?

Member Avatar for Dani
0
12
Member Avatar for premdparmar

I'm facing an SSL-related issue in Firefox with the 'SSL_ERROR_NO_CYPHER_OVERLAP' error. It seems there's a problem with encryption algorithms between the browser and the server, hindering the establishment of a secure connection. Any guidance or solutions would be appreciated.

Member Avatar for Dani
1
139
Member Avatar for hazeeq
Member Avatar for Auditions
Member Avatar for 凯鹏

I changed the password on my Kindle PaperWhite4 my senior year of high school. I am now in college and want to use the Kindle, but because I have not used it for a long time, I have forgotten the password. The official method is to factory reset it. But …

Member Avatar for rproffitt
0
16
Member Avatar for riyajohnson70

Greetings, fellow crypto enthusiasts! In the world of cryptocurrency, security is paramount. Whether you're a seasoned trader or just getting started, protecting your digital assets should be your top priority. To help you stay safe and secure, we've compiled a list of essential security tips for safeguarding your crypto wallets. …

0
33
Member Avatar for kinger_1
Member Avatar for Rita_14

Share insights, ask questions, and stay informed about the latest threats and protective measures. Let's work together to make the digital world a safer place.

-1
8
Member Avatar for Nicole_22
Member Avatar for Steve_63

My site is on Apache, the host has enabled 'mod_unique_id' My CSP runs in the root .htaccess. My host has given me 2 lines of code to put in the CSP to make an unrecognisable base64 NONCE code each time it's needed - particularly for PayPal. What they sent (in …

Member Avatar for AndreRet
0
126
Member Avatar for graza7187
Member Avatar for Bam_391

In today's digital age, businesses rely heavily on customer data to enhance their operations, personalize experiences, and drive growth. However, the increasing importance of customer data brings along significant cybersecurity challenges. Protecting this data is not only a legal and ethical obligation but also crucial for maintaining customer trust and …

1
106
Member Avatar for borobhaisab

Tech Gurus, I am interested top learn more about these AIs. ChatGPT and the like. I have been seeing youtube videos about ChatGPT3 but the link was not working few weeks ago and so I quit it. Now checking them out again. I am only interested in those that have …

Member Avatar for Reverend Jim
0
130
Member Avatar for dwellfox
Member Avatar for kuldeeprana

As software development becomes more complex and fast-paced, test automation has become a crucial part of the development process. Automated testing can help software teams save time, reduce costs, and improve the overall quality of the product. However, not all tests are suitable for automation, and deciding which tests to …

-1
34

The End.