1,394 Topics
![]() | |
It seems like forever, but actually it was only the end of last year that we were [writing about CryptoLocker](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) which had pretty much redefined the ransomware landscape. Now this particular threat market is morphing again with the discovery of onion crypto ransomware. Also known as Critroni, and CTB-Locker for … ![]() | |
According to newly published research from cloud-based social Wi-Fi software outfit [Purple WiFi](http://www.purplewifi.net/), of 2,540 consumer questioned vastly more were concerned about getting access to pornography than were worried about matters of data security. The 'Using Wi-Fi in Public Places’ study revealed that 28 percent of those asked (711 people) … | |
Hi there, I have a big problem and I need help. Yesterday as I sat on my pc a strange program called Win 7 Antivirus Plus 2013 appeared. It says it's an antivirus and shows up the following message: "System hijack! System security threat was detected. Viruses and/or spyware may … | |
The average car is increasingly becoming a vehicle for the Internet; but does this also make it a vehicle for cybercrime? Security vendor Kaspersky Lab, in cahoots with Spanish digital media outfit IAB, reckons that software updates, in-car mobile apps and privacy are all areas which have ripe potential for … | |
Hi friends, can you suggest any tips for keeping the site secure? As many security issues occur just wanna be on the safe side. | |
this is the worst website i have ever found, i have been watching it for hours. http://map.ipviking.com/ its supposedly a real time cyber attack map and its mesmerizing. | |
I wanna ask that is there any API documentation available in java that we can use our tablet's front camera as a CCTV camera to monitor rooms for security? Is that possible to do? or we have to design seperate hardware for it? | |
Hello Everyone, Already my web project is developed by using jsp and servlets now I would like to do security check on each and every pages. so, is there any software to check whether my all pages are robust and secure before deploying on to the live server. Eg: Like … | |
Amazon has, this week, revealed the first smartphone designed by the online retail giant in the shape of the Amazon Fire. Described by the company as featuring "two new breakthrough technologies that allow you to see and interact with the world through a whole new lens" and by some others … | |
The Onion Router, better known as the Tor Network, is often thought of as being the dark-side of the web. Not least as the anonymity provided by Tor meant that sites hosted on so-called hidden service servers were free to trade in just about anything from drugs and guns through … | |
I have vb.net application with SQL server express. Here is my code to save data to database, but itn not working. Here ID is not the primary key. Imports System.Data.SqlClient Imports System.Data Private Sub btnSave_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles btnSave.Click Dim cmd As New SqlCommand Dim … | |
Hello: A couple days ago I found an error log on my desktop (hs_err_pid6028.log), something about a fatal java error and a game called minecraft. I am pretty sure I never installed minecraft. That got me worried, so I browsed my java control panel and saw that there is no … | |
Hi. I've developed a bit of an interest in encryption as well as programming in Haskell since I last used this forum. So I decided to build a symmetric block cipher and test its properties to gain more of an understanding of such things. This is for research purposes as … | |
Hi i am trying to display records in access database that have pictures saves binary data i have created typed dataset that populate the crystal report but the problem is the images do not display code is as below i have attached sample report Imports System.Data Imports System.Configuration Imports System.Data.OleDb … | |
This code was to create a simple database with a table and add records with the following. toIm having trouble with the 'id' auto_increment. <?php $con=mysqli_connect("localhost","root","distortion","my_databs"); // Check connection if (mysqli_connect_errno()) { echo "Failed to connect to MySQL: " . mysqli_connect_error(); } // Create table $sql="CREATE TABLE empl(ID INT NOT … | |
I have a Verizon FiOS Internet line coming into my office here at DaniPad, and it has a block of 5 static IPs (x.x.x.18 - x.x.x.22) that I'm paying for. The line is connected to a switch. Also connected to the switch, among other things (such as our security system), … | |
hi , i am unable to solve this error , am running chukwa on single node so please guide me . The error am getting is shown below, hduser@bizruntime:/usr/share/chukwa/chukwa-0.4.0/bin$ ./start-all.sh cat: /usr/share/chukwa/chukwa-0.4.0/bin/../conf/collectors: No such file or directory cat: /usr/share/chukwa/chukwa-0.4.0/bin/../conf/agents: No such file or directory starting archive, logging to /usr/share/chukwa/chukwa-0.4.0/bin/../logs/chukwa-chukwa-archive-bizruntime.out starting … | |
Good morning everyone! I haven't been here in a while, but I have a question that I thought someone here might be able to help with. When it comes to accessing data from a SQL server, I know the logistics of getting that data through code, no issues there, but … | |
A [security audit](https://opencryptoaudit.org/reports/iSec_Final_Open_Crypto_Audit_Project_TrueCrypt_Security_Assessment.pdf) of the free and Open Source encryption utility, TrueCrypt >"found no evidence of backdoors or otherwise intentionally malicious code in the assessed areas," and that the found vulnerabilities "all appear to be unintentional, introduced as the result of bugs rather than malice." A summary of the results … | |
Back in the eighties, the Defense Advanced Research Projects Agency ([DARPA](http://www.darpa.mil/)) spent more than a billion dollars in an attempt to create what was, in effect, Skynet. You know, the self-aware artificial intelligence system that goes bad in The Terminator movie. DARPA called it the Strategic Computing Initiative, but it … | |
my friend, who told me that he can hack any facebook, yahoo, gmail account. First i didn't believe him but when he pulled out his laptop and asked me to name any account email address on the earth. I mentioned some random guys, my relatives. And in few seconds he … | |
Dear Friends, I am Anes , doing M.Tech in Cyber Security. As part of our syllabus lab program in "Information Security Lab" we have an experiment "**Implementation of proxy based security protocols in C or C++ with features like Confidentiality,Integrity and Authentication**" . Actually I am in dark now . … | |
Good Day, I am thinking of building a diary that has entries based on the dates of the year as inputed via a calendar/ date-time picker. Its security is in the fact that it can only be read from the program. Opening the original text is a different encoding. Based … | |
Is it possible to parse an ethernet frame to extract an ssl server certificate to determine the common name issued to?...Im not too familair with ssl records. | |
Not exactly the most surprising news ever, that Anonymous is [planning an all out DDoS war on World Cup corporate sponsors](http://www.independent.co.uk/news/world/americas/world-cup-2014-hacktivist-group-anonymous-plan-cyberattack-on-world-cup-sponsors-9467786.html) during the football tournament. Personally, I wish them luck. Cannot stand football, in fact hate it with a passion and the world cup period is a nightmare every four … | |
Hi, I'm thinking of using the htaccess file on my apache server to add a layer of security to the payment processing on my site. I am considering the 2 actions below, not sure how yet, but thats where the trial & error & learning begins. 1. rewrite the url … ![]() | |
I am trying to update some records.The moment the line Adodc2.Refresh executes, I get an error message saying that the "Operation is not allowed when the object is closed" Yet, when I put "On Error Resume Next", it updates the records as I want it to. Please help me thank … | |
![]() | Is HACK object orientated and what application development is it designed for? |
Another day, another breach. The latest to disclose that there had been some 'unauthorised access' to systems and internal company data' is music streaming service Spotify. The disclosure itself was something of an odd one, claiming that investigation suggested only a single user's data had been compromised following an issue … | |
I am tring to access http://182.18.175.29/CRM2011/XRMServices/2011/Organization.svc?wsdl I can able to see functions list. means i can access to webservice. But while i tring to write data using function create it through "an error occurred when verifying security for the message" my code is below <?php date_default_timezone_set("Asia/Kolkata"); ini_set("soap.wsdl_cache_enabled", "0"); $location = … |
The End.