1,394 Topics

Member Avatar for
Member Avatar for happygeek

It seems like forever, but actually it was only the end of last year that we were [writing about CryptoLocker](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) which had pretty much redefined the ransomware landscape. Now this particular threat market is morphing again with the discovery of onion crypto ransomware. Also known as Critroni, and CTB-Locker for …

Member Avatar for iamthwee
1
404
Member Avatar for happygeek

According to newly published research from cloud-based social Wi-Fi software outfit [Purple WiFi](http://www.purplewifi.net/), of 2,540 consumer questioned vastly more were concerned about getting access to pornography than were worried about matters of data security. The 'Using Wi-Fi in Public Places’ study revealed that 28 percent of those asked (711 people) …

Member Avatar for Hiroshe
2
503
Member Avatar for misscountess

Hi there, I have a big problem and I need help. Yesterday as I sat on my pc a strange program called Win 7 Antivirus Plus 2013 appeared. It says it's an antivirus and shows up the following message: "System hijack! System security threat was detected. Viruses and/or spyware may …

Member Avatar for Emma Wilson
0
251
Member Avatar for happygeek

The average car is increasingly becoming a vehicle for the Internet; but does this also make it a vehicle for cybercrime? Security vendor Kaspersky Lab, in cahoots with Spanish digital media outfit IAB, reckons that software updates, in-car mobile apps and privacy are all areas which have ripe potential for …

2
306
Member Avatar for Sara Evans

Hi friends, can you suggest any tips for keeping the site secure? As many security issues occur just wanna be on the safe side.

Member Avatar for Jack_9
0
202
Member Avatar for Ummn

this is the worst website i have ever found, i have been watching it for hours. http://map.ipviking.com/ its supposedly a real time cyber attack map and its mesmerizing.

Member Avatar for Hiroshe
0
269
Member Avatar for engrjd91

I wanna ask that is there any API documentation available in java that we can use our tablet's front camera as a CCTV camera to monitor rooms for security? Is that possible to do? or we have to design seperate hardware for it?

Member Avatar for Kelly Burby
0
150
Member Avatar for mrabrar09

Hello Everyone, Already my web project is developed by using jsp and servlets now I would like to do security check on each and every pages. so, is there any software to check whether my all pages are robust and secure before deploying on to the live server. Eg: Like …

0
161
Member Avatar for happygeek

Amazon has, this week, revealed the first smartphone designed by the online retail giant in the shape of the Amazon Fire. Described by the company as featuring "two new breakthrough technologies that allow you to see and interact with the world through a whole new lens" and by some others …

Member Avatar for expertmagician
3
590
Member Avatar for happygeek

The Onion Router, better known as the Tor Network, is often thought of as being the dark-side of the web. Not least as the anonymity provided by Tor meant that sites hosted on so-called hidden service servers were free to trade in just about anything from drugs and guns through …

Member Avatar for happygeek
2
1K
Member Avatar for Satyam_1

I have vb.net application with SQL server express. Here is my code to save data to database, but itn not working. Here ID is not the primary key. Imports System.Data.SqlClient Imports System.Data Private Sub btnSave_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnSave.Click Dim cmd As New SqlCommand Dim …

Member Avatar for jared.geli
0
488
Member Avatar for shamagantu

Hello: A couple days ago I found an error log on my desktop (hs_err_pid6028.log), something about a fatal java error and a game called minecraft. I am pretty sure I never installed minecraft. That got me worried, so I browsed my java control panel and saw that there is no …

Member Avatar for Ummn
0
480
Member Avatar for Mushy-pea

Hi. I've developed a bit of an interest in encryption as well as programming in Haskell since I last used this forum. So I decided to build a symmetric block cipher and test its properties to gain more of an understanding of such things. This is for research purposes as …

Member Avatar for Mushy-pea
1
302
Member Avatar for Denvb

Hi i am trying to display records in access database that have pictures saves binary data i have created typed dataset that populate the crystal report but the problem is the images do not display code is as below i have attached sample report Imports System.Data Imports System.Configuration Imports System.Data.OleDb …

Member Avatar for OtepTheThird
0
614
Member Avatar for Nikhil_4

This code was to create a simple database with a table and add records with the following. toIm having trouble with the 'id' auto_increment. <?php $con=mysqli_connect("localhost","root","distortion","my_databs"); // Check connection if (mysqli_connect_errno()) { echo "Failed to connect to MySQL: " . mysqli_connect_error(); } // Create table $sql="CREATE TABLE empl(ID INT NOT …

Member Avatar for andrevanzuydam
0
4K
Member Avatar for Dani

I have a Verizon FiOS Internet line coming into my office here at DaniPad, and it has a block of 5 static IPs (x.x.x.18 - x.x.x.22) that I'm paying for. The line is connected to a switch. Also connected to the switch, among other things (such as our security system), …

Member Avatar for rch1231
1
871
Member Avatar for shah112

hi , i am unable to solve this error , am running chukwa on single node so please guide me . The error am getting is shown below, hduser@bizruntime:/usr/share/chukwa/chukwa-0.4.0/bin$ ./start-all.sh cat: /usr/share/chukwa/chukwa-0.4.0/bin/../conf/collectors: No such file or directory cat: /usr/share/chukwa/chukwa-0.4.0/bin/../conf/agents: No such file or directory starting archive, logging to /usr/share/chukwa/chukwa-0.4.0/bin/../logs/chukwa-chukwa-archive-bizruntime.out starting …

0
166
Member Avatar for zachattack05

Good morning everyone! I haven't been here in a while, but I have a question that I thought someone here might be able to help with. When it comes to accessing data from a SQL server, I know the logistics of getting that data through code, no issues there, but …

Member Avatar for zachattack05
0
447
Member Avatar for Reverend Jim

A [security audit](https://opencryptoaudit.org/reports/iSec_Final_Open_Crypto_Audit_Project_TrueCrypt_Security_Assessment.pdf) of the free and Open Source encryption utility, TrueCrypt >"found no evidence of backdoors or otherwise intentionally malicious code in the assessed areas," and that the found vulnerabilities "all appear to be unintentional, introduced as the result of bugs rather than malice." A summary of the results …

Member Avatar for Hiroshe
2
277
Member Avatar for happygeek

Back in the eighties, the Defense Advanced Research Projects Agency ([DARPA](http://www.darpa.mil/)) spent more than a billion dollars in an attempt to create what was, in effect, Skynet. You know, the self-aware artificial intelligence system that goes bad in The Terminator movie. DARPA called it the Strategic Computing Initiative, but it …

Member Avatar for Hiroshe
2
427
Member Avatar for HunainHafeez

my friend, who told me that he can hack any facebook, yahoo, gmail account. First i didn't believe him but when he pulled out his laptop and asked me to name any account email address on the earth. I mentioned some random guys, my relatives. And in few seconds he …

Member Avatar for Rebekahcorlin
-4
408
Member Avatar for logicslab

Dear Friends, I am Anes , doing M.Tech in Cyber Security. As part of our syllabus lab program in "Information Security Lab" we have an experiment "**Implementation of proxy based security protocols in C or C++ with features like Confidentiality,Integrity and Authentication**" . Actually I am in dark now . …

Member Avatar for rubberman
0
222
Member Avatar for Pamilerin

Good Day, I am thinking of building a diary that has entries based on the dates of the year as inputed via a calendar/ date-time picker. Its security is in the fact that it can only be read from the program. Opening the original text is a different encoding. Based …

0
123
Member Avatar for coding101

Is it possible to parse an ethernet frame to extract an ssl server certificate to determine the common name issued to?...Im not too familair with ssl records.

0
133
Member Avatar for happygeek

Not exactly the most surprising news ever, that Anonymous is [planning an all out DDoS war on World Cup corporate sponsors](http://www.independent.co.uk/news/world/americas/world-cup-2014-hacktivist-group-anonymous-plan-cyberattack-on-world-cup-sponsors-9467786.html) during the football tournament. Personally, I wish them luck. Cannot stand football, in fact hate it with a passion and the world cup period is a nightmare every four …

Member Avatar for Agilemind
0
353
Member Avatar for 68thorby68

Hi, I'm thinking of using the htaccess file on my apache server to add a layer of security to the payment processing on my site. I am considering the 2 actions below, not sure how yet, but thats where the trial & error & learning begins. 1. rewrite the url …

Member Avatar for iamthwee
0
327
Member Avatar for micca.jhai

I am trying to update some records.The moment the line Adodc2.Refresh executes, I get an error message saying that the "Operation is not allowed when the object is closed" Yet, when I put "On Error Resume Next", it updates the records as I want it to. Please help me thank …

Member Avatar for Aslam Mansoor
0
545
Member Avatar for [NOPE]FOREVER
Member Avatar for <M/>
3
281
Member Avatar for happygeek

Another day, another breach. The latest to disclose that there had been some 'unauthorised access' to systems and internal company data' is music streaming service Spotify. The disclosure itself was something of an odd one, claiming that investigation suggested only a single user's data had been compromised following an issue …

Member Avatar for <M/>
1
307
Member Avatar for nikesh.yadav

I am tring to access http://182.18.175.29/CRM2011/XRMServices/2011/Organization.svc?wsdl I can able to see functions list. means i can access to webservice. But while i tring to write data using function create it through "an error occurred when verifying security for the message" my code is below <?php date_default_timezone_set("Asia/Kolkata"); ini_set("soap.wsdl_cache_enabled", "0"); $location = …

Member Avatar for nikesh.yadav
0
1K

The End.