1,390 Topics
| |
Hi friends, can you suggest any tips for keeping the site secure? As many security issues occur just wanna be on the safe side. | |
this is the worst website i have ever found, i have been watching it for hours. http://map.ipviking.com/ its supposedly a real time cyber attack map and its mesmerizing. | |
I wanna ask that is there any API documentation available in java that we can use our tablet's front camera as a CCTV camera to monitor rooms for security? Is that possible to do? or we have to design seperate hardware for it? | |
Hello Everyone, Already my web project is developed by using jsp and servlets now I would like to do security check on each and every pages. so, is there any software to check whether my all pages are robust and secure before deploying on to the live server. Eg: Like … | |
Amazon has, this week, revealed the first smartphone designed by the online retail giant in the shape of the Amazon Fire. Described by the company as featuring "two new breakthrough technologies that allow you to see and interact with the world through a whole new lens" and by some others … | |
The Onion Router, better known as the Tor Network, is often thought of as being the dark-side of the web. Not least as the anonymity provided by Tor meant that sites hosted on so-called hidden service servers were free to trade in just about anything from drugs and guns through … | |
I have vb.net application with SQL server express. Here is my code to save data to database, but itn not working. Here ID is not the primary key. Imports System.Data.SqlClient Imports System.Data Private Sub btnSave_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnSave.Click Dim cmd As New SqlCommand Dim … | |
Hello: A couple days ago I found an error log on my desktop (hs_err_pid6028.log), something about a fatal java error and a game called minecraft. I am pretty sure I never installed minecraft. That got me worried, so I browsed my java control panel and saw that there is no … | |
Hi. I've developed a bit of an interest in encryption as well as programming in Haskell since I last used this forum. So I decided to build a symmetric block cipher and test its properties to gain more of an understanding of such things. This is for research purposes as … | |
Hi i am trying to display records in access database that have pictures saves binary data i have created typed dataset that populate the crystal report but the problem is the images do not display code is as below i have attached sample report Imports System.Data Imports System.Configuration Imports System.Data.OleDb … | |
This code was to create a simple database with a table and add records with the following. toIm having trouble with the 'id' auto_increment. <?php $con=mysqli_connect("localhost","root","distortion","my_databs"); // Check connection if (mysqli_connect_errno()) { echo "Failed to connect to MySQL: " . mysqli_connect_error(); } // Create table $sql="CREATE TABLE empl(ID INT NOT … | |
I have a Verizon FiOS Internet line coming into my office here at DaniPad, and it has a block of 5 static IPs (x.x.x.18 - x.x.x.22) that I'm paying for. The line is connected to a switch. Also connected to the switch, among other things (such as our security system), … | |
hi , i am unable to solve this error , am running chukwa on single node so please guide me . The error am getting is shown below, hduser@bizruntime:/usr/share/chukwa/chukwa-0.4.0/bin$ ./start-all.sh cat: /usr/share/chukwa/chukwa-0.4.0/bin/../conf/collectors: No such file or directory cat: /usr/share/chukwa/chukwa-0.4.0/bin/../conf/agents: No such file or directory starting archive, logging to /usr/share/chukwa/chukwa-0.4.0/bin/../logs/chukwa-chukwa-archive-bizruntime.out starting … | |
Good morning everyone! I haven't been here in a while, but I have a question that I thought someone here might be able to help with. When it comes to accessing data from a SQL server, I know the logistics of getting that data through code, no issues there, but … | |
A [security audit](https://opencryptoaudit.org/reports/iSec_Final_Open_Crypto_Audit_Project_TrueCrypt_Security_Assessment.pdf) of the free and Open Source encryption utility, TrueCrypt >"found no evidence of backdoors or otherwise intentionally malicious code in the assessed areas," and that the found vulnerabilities "all appear to be unintentional, introduced as the result of bugs rather than malice." A summary of the results … | |
Back in the eighties, the Defense Advanced Research Projects Agency ([DARPA](http://www.darpa.mil/)) spent more than a billion dollars in an attempt to create what was, in effect, Skynet. You know, the self-aware artificial intelligence system that goes bad in The Terminator movie. DARPA called it the Strategic Computing Initiative, but it … | |
my friend, who told me that he can hack any facebook, yahoo, gmail account. First i didn't believe him but when he pulled out his laptop and asked me to name any account email address on the earth. I mentioned some random guys, my relatives. And in few seconds he … | |
Dear Friends, I am Anes , doing M.Tech in Cyber Security. As part of our syllabus lab program in "Information Security Lab" we have an experiment "**Implementation of proxy based security protocols in C or C++ with features like Confidentiality,Integrity and Authentication**" . Actually I am in dark now . … | |
Good Day, I am thinking of building a diary that has entries based on the dates of the year as inputed via a calendar/ date-time picker. Its security is in the fact that it can only be read from the program. Opening the original text is a different encoding. Based … | |
Is it possible to parse an ethernet frame to extract an ssl server certificate to determine the common name issued to?...Im not too familair with ssl records. | |
Not exactly the most surprising news ever, that Anonymous is [planning an all out DDoS war on World Cup corporate sponsors](http://www.independent.co.uk/news/world/americas/world-cup-2014-hacktivist-group-anonymous-plan-cyberattack-on-world-cup-sponsors-9467786.html) during the football tournament. Personally, I wish them luck. Cannot stand football, in fact hate it with a passion and the world cup period is a nightmare every four … | |
Hi, I'm thinking of using the htaccess file on my apache server to add a layer of security to the payment processing on my site. I am considering the 2 actions below, not sure how yet, but thats where the trial & error & learning begins. 1. rewrite the url … | |
I am trying to update some records.The moment the line Adodc2.Refresh executes, I get an error message saying that the "Operation is not allowed when the object is closed" Yet, when I put "On Error Resume Next", it updates the records as I want it to. Please help me thank … | |
| Is HACK object orientated and what application development is it designed for? |
Another day, another breach. The latest to disclose that there had been some 'unauthorised access' to systems and internal company data' is music streaming service Spotify. The disclosure itself was something of an odd one, claiming that investigation suggested only a single user's data had been compromised following an issue … | |
I am tring to access http://182.18.175.29/CRM2011/XRMServices/2011/Organization.svc?wsdl I can able to see functions list. means i can access to webservice. But while i tring to write data using function create it through "an error occurred when verifying security for the message" my code is below <?php date_default_timezone_set("Asia/Kolkata"); ini_set("soap.wsdl_cache_enabled", "0"); $location = … | |
hey, I need help with this code, I have made database and code for inserting data, now I need code that will display data for group, in database I have groupnaziv, and id, here is code for inserting which works great, after that I will post code that I need … | |
Following on from the news that an eBay password database has been compromised, and universal advice from security experts that users should now change their passwords, one thing has been loud clear: the total lack of that password change requirement from eBay. Sign into eBay and there is nothing to … | |
Hi, new to the world of IT. Spent the last 10 years of my life in the military doing satellite communications, and other random "space" related activities. I have very little experience in the field of IT, just hired as a help desk pro. Going through training to receive my … | |
<?xml version="1.0" encoding="utf-8"?> <!-- For more information on using web.config transformation visit http://go.microsoft.com/fwlink/?LinkId=125889 --> <configuration xmlns:xdt="http://schemas.microsoft.com/XML-Document-Transform"> <!-- In the example below, the "SetAttributes" transform will change the value of "connectionString" to use "ReleaseSQLServer" only when the "Match" locator finds an attribute "name" that has a value of "MyDB". <connectionStrings> <add … |
The End.