1,387 Topics

Member Avatar for
Member Avatar for FireNet

File I/O With C++ Fstream **Intro** File handling is as simple as writing in a book, much easier to modify and find. It's so simple people get confused with it :-). Welcome to the world of file handling. We will use the c++ fstream classes to do our file handling. …

Member Avatar for Swalih
5
11K
Member Avatar for khakilang

I have a few good old computer which runs on Window XP without any problem so far. But what happen come next year when Microsoft put Window XP to rest forever. No security updates, no hardware drivers update, no third party software updates etc.. Dump the old computer and buy …

Member Avatar for Tcll
0
416
Member Avatar for happygeek

Microsoft will stop releasing security updates, hotfixes and other updates for Windows XP SP2 on July 13th 2010. No biggie, you might think, after all Windows XP SP3 was released way back in April 2008 and since then we've had both Vista (perhaps best forgotten) and the much more palatable …

Member Avatar for Tcll
0
942
Member Avatar for happygeek

More often than not I'll be writing about the security problems facing Windows XP users, such as when I recently reported how a large number of enterprises are still running XP SP2 machines which will shortly [URL="http://www.daniweb.com/news/story287954.html"]stop being supported by Microsoft[/URL] in terms of security updates, hotfixes and the like. …

Member Avatar for Tcll
1
940
Member Avatar for happygeek

As well as being CEO of penetration testing specialists High-Tech Bridge, Ilia Kolochenko is also perhaps unsurprisingly a white hat hacker of some repute. Equally unsurprising is the fact that he has [warned](https://www.htbridge.com/blog/plugins_and_extensions_the_achilles_heel_of_popular_cmss.html) that security vulnerabilities in leading CMS platforms such as Drupal, Joomla and WordPress are effectively leaving the …

Member Avatar for iamthwee
4
731
Member Avatar for slfisher

One of the biggest security stories so far this year is that of the high school that remotely triggered webcams in laptops given to students -- which the school said it only did to help track stolen laptops, and which some students and families said was a violation of their …

Member Avatar for happygeek
1
640
Member Avatar for happygeek

The Internet of Things (IoT) is something of a buzz-phrase right now, and locking down the IoT is certainly something that vendors across both security and hardware industries are talking up. The problem with the publicity surrounding stories of 'things' that have been hacked is that, well, they never really …

Member Avatar for happygeek
2
479
Member Avatar for happygeek

There's a truism that I like to share with as many people as possible: if you don't want other people to see something, then don't post it online. It is, you might think, a pretty simple concept to grasp. After all, you wouldn't stroll into a bar with a megaphone …

Member Avatar for erikko
2
476
Member Avatar for happygeek

Reports started circulating yesterday that Gmail had been hacked, with some 5 million logins at risk. This follows the publication, on Tuesday, of a plain text list of Gmail usernames and passwords on a Russian Bitcoin forum. Within 24 hours the 'hack hysteria' had taken hold and people were being …

Member Avatar for Slavi
2
563
Member Avatar for happygeek

Some interesting [research](http://www.proofpoint.com/threatinsight/posts/phishing-in-europe.php) from security outfit Proofpoint was published this morning which reveals that unsolicited email heading towards users in the UK is three times more likely to contain malicious URLs than that destined for users in the United States, or Germany, or France for that matter. It's not, as …

1
287
Member Avatar for happygeek

Goodwill Industries International, a network of 165 community-based agencies in North America, has been breached. This follows a previous announcement of a potential attack back in July. After an extensive forensic investigation lasting a month, Goodwill has now [confirmed](http://www.goodwill.org/press-releases/goodwill-provides-update-on-data-security-issue/) that "a third-party vendor’s systems" were indeed "attacked by malware, enabling …

Member Avatar for happygeek
3
407
Member Avatar for happygeek

So, a bunch of US financial institutes have been hacked. Nothing new there, if we are being brutally honest. The newsworthyness in this particular case comes courtesy of one of those organisations apparently being none other than JP Morgan Chase. USA Today reported yesterday that a federal law enforcement official …

1
513
Member Avatar for Dani

Just a show of hands, how many people have taken the plunge and migrated to HTTPS since Google's announcement? I was really against it at first, because I just don't like to do things just for SEO's sake, and it seemed to me like this was one of those things. …

Member Avatar for rinston
1
409
Member Avatar for softDeveloper

Hi everybody! I´ve used jdk to generate my certificate with the following command: keytool -genkey -keyalg RSA -alias certificatekey -keystore keystore.jks -storepass password -validity 360 -keysize 2048 Everything works fine when I want to digitally sign an e-mail using: import javax.mail.* and import javax.mail.internet.* # and MimeMessage and Multipart. #. …

Member Avatar for stultuske
0
221
Member Avatar for softDeveloper

Hi everybody! I´ve used jdk to generate my certificate with the following command: > keytool -genkey -keyalg RSA -alias certificatekey -keystore keystore.jks -storepass password -validity 360 -keysize 2048 Everything works fine when I want to digitally sign an e-mail using: # import javax.mail.* # and # import javax.mail.internet.* # and …

0
155
Member Avatar for happygeek

Every week, Stephen Coty [writes about](https://www.alertlogic.com/resources/blog/) interesting exploits that have caught his attention as chief security evangelist at Alert Logic. This last week (in a currently password protected posting) [he mused about](https://www.alertlogic.com/blog/exploit-monday-a-few-interesting-ones-to-be-aware-of-7/) a 'JournalCtl and Syslog Terminal Escape Injection' zero day which could be of interest to the Linux gurus …

Member Avatar for rubberman
3
1K
Member Avatar for happygeek

A report from Hold Security claims that one of the biggest ever online heists has been committed by a Russian crime gang. It would appear that the data theft includes, wait for it, no less than 1.2 billion (yes billion) username and passwords along with around half a billion email …

Member Avatar for F-3000
2
349
Member Avatar for samsudin

I'm just a regular computer users and often use my computer office for personal purposes such as checking my funds in online bank. I want to know how to if my computer is being tapped or not.

Member Avatar for melissad
0
585
Member Avatar for happygeek

SuperValu has confirmed that is has, indeed, suffered a data breach. The supermarket company [stated](http://www.supervalu.com/security.html) that what it calls a "criminal intrusion into the portion of its computer network that processes payment card transactions for some of its retail food stores, including some of its associated stand-alone liquor stores" may …

1
324
Member Avatar for happygeek

Hardly a week goes by without yet another press release hitting the desk of your technology journalist, or research flag being raised amongst the IT Security profession, that claims Android is insecure. What Android actually is, just like Windows on the desktop in fact, is a big and attractive target; …

Member Avatar for Kelly Burby
1
380
Member Avatar for happygeek

An interesting [post](http://googleonlinesecurity.blogspot.in/2014/08/https-as-ranking-signal_6.html) appeared yesterday in the official Google Online Security and Webmaster Central blogs which confirms that in an effort to "make the Internet safer" it has been testing a system which looks at "whether sites use secure, encrypted connections as a signal in our search ranking algorithms." This …

Member Avatar for Dani
3
706
Member Avatar for happygeek

As a platform, Android is naturally very attractive to the criminal fraternity in terms of potential profitability. After all, it has the market share and that nearly always means it has large numbers of users for whom the word security may as well be written in the Cyrillic alphabet. My …

Member Avatar for expertmagician
4
395
Member Avatar for happygeek

Yesterday, Tor [issued a security advisory](https://blog.torproject.org/blog/tor-security-advisory-relay-early-traffic-confirmation-attack) which revealed that a group of relays had been discovered on July 4th which looked like they "were trying to deanonymize users." The advisory states that the attack "involved modifying Tor protocol headers to do traffic confirmation attacks" with the relays having joined the …

Member Avatar for Slavi
2
652
Member Avatar for happygeek

It seems like forever, but actually it was only the end of last year that we were [writing about CryptoLocker](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) which had pretty much redefined the ransomware landscape. Now this particular threat market is morphing again with the discovery of onion crypto ransomware. Also known as Critroni, and CTB-Locker for …

Member Avatar for iamthwee
1
400
Member Avatar for happygeek

According to newly published research from cloud-based social Wi-Fi software outfit [Purple WiFi](http://www.purplewifi.net/), of 2,540 consumer questioned vastly more were concerned about getting access to pornography than were worried about matters of data security. The 'Using Wi-Fi in Public Places’ study revealed that 28 percent of those asked (711 people) …

Member Avatar for Hiroshe
2
487
Member Avatar for misscountess

Hi there, I have a big problem and I need help. Yesterday as I sat on my pc a strange program called Win 7 Antivirus Plus 2013 appeared. It says it's an antivirus and shows up the following message: "System hijack! System security threat was detected. Viruses and/or spyware may …

Member Avatar for Emma Wilson
0
250
Member Avatar for happygeek

The average car is increasingly becoming a vehicle for the Internet; but does this also make it a vehicle for cybercrime? Security vendor Kaspersky Lab, in cahoots with Spanish digital media outfit IAB, reckons that software updates, in-car mobile apps and privacy are all areas which have ripe potential for …

2
304
Member Avatar for Sara Evans

Hi friends, can you suggest any tips for keeping the site secure? As many security issues occur just wanna be on the safe side.

Member Avatar for Jack_9
0
196
Member Avatar for Ummn

this is the worst website i have ever found, i have been watching it for hours. http://map.ipviking.com/ its supposedly a real time cyber attack map and its mesmerizing.

Member Avatar for Hiroshe
0
268
Member Avatar for engrjd91

I wanna ask that is there any API documentation available in java that we can use our tablet's front camera as a CCTV camera to monitor rooms for security? Is that possible to do? or we have to design seperate hardware for it?

Member Avatar for Kelly Burby
0
147

The End.