1,387 Topics

Member Avatar for
Member Avatar for happygeek

It has been [officially confirmed](http://php.net/archive/2013.php#id2013-10-24-2) that the php.net website of the open-source PHP programming language has been hacked and infected with malware. The successful breach of the site came to light yesterday morning when the Google Safe Browsing service started flagging php.net as serving up malicious scripts. This was, at …

Member Avatar for Mohammed_9
13
772
Member Avatar for happygeek

Today is another of those 'Hallmark' IT security days; in the case of Tuesday the 11th of February 2014 that means 'Safer Internet Day'. I'm not going to start yet another rant about the pointlessness of this, and why every day should be Safer Internet Day. If you want to …

Member Avatar for Shrike72
0
483
Member Avatar for happygeek

News headlines screaming that yet another Microsoft Windows vulnerability has been discovered, is in the wild or has just been patched are two a penny. Such has it ever been. News headlines declaring that a 'major security problem' has been found with Linux are a different kettle of fish. So …

Member Avatar for happygeek
2
561
Member Avatar for Curious Gorge

Hi again guys this time I have a question about computer security that's related to my programming hobby. I hope this isn't against the rules. I am asking this out of curiosity and concern, not because I want to do evil. However thanks to some knowledge I gained from a …

Member Avatar for mike_2000_17
0
200
Member Avatar for happygeek

The average DaniWeb member if not already au fait with Pastebin.com is almost certainly aware of something like it. A pastebin has become, for many programmers, a default tool in the coding box and for very good reason: it makes sharing large quantities of code very easy indeed. Of course, …

Member Avatar for happygeek
0
1K
Member Avatar for LukeJWhitworth

Hello, Can someone please point me in the right direction for using the Digital Persona Fingerprint system, the u.are.u 4500 one. I have imported the following statements; Imports GrFingerXLib Imports Microsoft.VisualBasic But then I don't know where to go from there. All I want to do is scan the fingerprint, …

0
145
Member Avatar for jesicawillss

What is White Hat SEO? How many things or techniques are included in it? Can anyone tell me how it proves better for getting search engine result? Guide me on this subject.

Member Avatar for John_60
0
651
Member Avatar for happygeek

The photo messaging application Snapchat, which allows users to post images, video and text on a time limited basis to a group of recipient users, has been hacked. The attraction of Snapchat, apart from not being Facebook and therefore somewhere teenagers can meet online without their parents having a clue …

Member Avatar for John_60
1
545
Member Avatar for yogeetha

We need to ensure that the connection is secure. The python version we use is 2.6. Trying to call prot_p() explicitly errors out. How do we ensure that the connection is secure. >>> from M2Crypto import ftpslib >>> ftps = ftpslib.FTP_TLS(host) >>> ftps.login(username, password) '230 User logged in.' >>> ftps.prot_p() …

0
165
Member Avatar for happygeek

As a gamer myself, I thought that last year was a pretty good one. After all, not only did I get to play both GTA V and Call of Duty: Ghosts (indeed, I'm still playing it and working my may through the prestige levels) but if I had enough spare …

Member Avatar for DarkSealer
0
655
Member Avatar for happygeek

Apparently it's Data Privacy Day tomorrow (January 28th) which, if you will allow me to quote the [Stay Safe Online](https://www.staysafeonline.org/data-privacy-day/about) website blurb, is an "international effort to empower and educate people to protect their privacy and control their digital footprint". Given the Edward Snowden NSA spying revelations that broke during …

Member Avatar for gerbil
3
665
Member Avatar for cpchc

Hi there - I had written some php for users to login to a password protected part of our site. Today an SSL certificate was installed. Previous to the SSL being installed the pages would timeout and kick the user out to the login screen after a certain period of …

Member Avatar for patk570
0
281
Member Avatar for Reverend Jim

CESG, the UK government's arm that assesses operating systems and software security, has published its findings for ‘End User Device’ operating systems. The most secure of the lot? Ubuntu 12.04. For the full article see [here](http://www.zdnet.com/uks-security-branch-says-ubuntu-most-secure-end-user-os-7000025312/)

Member Avatar for rch1231
0
306
Member Avatar for happygeek

That's the surprising consensus reached at a meeting of 30 CSOs representing some of the UK's leading enterprises held in London during the past week. This despite a poll at the bi-annual [URL="http://www.csointerchange.org"]CSO Interchange[/URL] event revealing that those same CSOs view social networking as the most over-hyped threat. When it …

Member Avatar for kategirdlelock
1
583
Member Avatar for happygeek

[ATTACH=RIGHT]22094[/ATTACH]Facebook Vice-President Chris Cox has [announced](https://blog.facebook.com/blog.php?post=10150251867797131) the latest in a seemingly never ending run of privacy updates for the worlds' biggest social network. The improvements can be summed up as tightening up the question most often asked by those users worried about their privacy, namely "who can see this?" Unless …

Member Avatar for kategirdlelock
0
475
Member Avatar for happygeek

I have been turning my USB thumb drives into fully encrypted data containers for years now, but readily admit that the prospect of rolling up your sleeves and getting down and dirty with encryption software is not as exciting to everyone as it is to me. However, with removable USB …

0
600
Member Avatar for maketick

Hello, What is gray hat SEO technic in SEO? Is it valid technic in Google? Please post your opinion on this important issue. Thanks, Maketick

Member Avatar for luvseo
0
318
Member Avatar for happygeek

The Distributed Denial of Service (DDoS) attack is becoming the crowbar of the online criminal. In the past we have got rather used to DDoS attacks being one of the favoured approaches of hacktivists, with perhaps the Low Orbit Ion Cannon (LOIC) and later the High Orbit Ion Cannon (HOIC) …

Member Avatar for robert02
1
882
Member Avatar for mallo

dear sir/madam Please suggest me , leading seminar topics on network or web security. plz help me Thank you

Member Avatar for rubberman
0
72
Member Avatar for mallo

I'm very much interested to develop Network IDS for my final year project , but I'm beginner to this Network security domain.Need some suggestion and some resources to develop this project.please help me .

0
118
Member Avatar for happygeek

According to Dell SecureWorks Counter Threat Unit (CTU) security researcher [Keith Jarvis](http://www.secureworks.com/cyber-threat-intelligence/threats/cryptolocker-ransomware/), the CryptoLocker ransomware that has been written about so much of late has infected as many as 250,000 computers during the first 100 days of distribution (staring on the 5th of September, 2013). What's more, Jarvis estimates, based …

2
513
Member Avatar for happygeek

US retail giant Target [has confirmed](http://pressroom.target.com/news/target-confirms-unauthorized-access-to-payment-card-data-in-u-s-stores) that hackers gained access to payment card data that could mean 40 million credit and debit card accounts are at risk. An official statement says that the retailer is "aware of unauthorized access to payment card data that may have impacted certain guests making …

Member Avatar for <M/>
3
393
Member Avatar for happygeek

A [Channel 4 News investigation](http://www.channel4.com/news/phone-mobile-data-24-hours-apps-security-secret) in the UK has revealed that in a 24 hour period just one smartphone made 350,000 requests to 315 different servers and made 30,000 requests to 76 servers when otherwise sitting totally idle for 45 minutes. Oh, and then there was the location data being …

Member Avatar for mikoyan
3
560
Member Avatar for minitauros

Just curious about your thoughts on this subject. **Example:** www.site.com/?id=1 or www.site.com/?id=8adyfa8df614812yasdf (which is also "1", but encrypted) What would you recommend? What do you use? Anyone with pros and/or cons on if you should encrypt your URL data? **My thoughts:** Pros (to encrypting URL data): - Makes it harder …

Member Avatar for pritaeas
1
215
Member Avatar for happygeek

According to a [report](http://www.fireeye.com/resources/pdfs/fireeye-operation-ke3chang.pdf) from researchers at US security outfit FireEye, a number of computers belonging to diplomats attending the G20 summit in Russia three months ago, including at least five European foreign ministries, were successfully targeted by Chinese hackers. FireEye researchers had monitored a server, one of 23, used …

1
483
Member Avatar for happygeek

If my iPhone 5s fingerprint data is walled off from the rest of A7 chip and the rest of iOS 7 in a 'Secure Enclave' and is never accessed by iOS or other apps, as Apple claims, then how come it all vanished when my iPhone crashed and I had …

Member Avatar for Kelly Burby
0
414
Member Avatar for happygeek

Black Friday has historically been a very American phenomenon, marking the start of the seasonal Xmas shopping rush and happening the Friday after Thanksgiving. In the past it has led to scenes of semi-rioting and chaos in some stores as the Walmartarati fight over bargain electrical goods. The UK got …

0
301
Member Avatar for happygeek

According to [BitcoinWatch](http://bitcoinwatch.com/) the current market capitalization of the virtual currency stands at an incredible $10.4 billion. A single Bitcoin is now worth more than $800. In the ongoing aftermath of [the Silk Road takedown](http://www.daniweb.com/hardware-and-software/networking/news/466982/silk-road-2-goes-live-did-the-fbi-arrest-the-wrong-dread-pirate-roberts) many people wrongly assume Bitcoin is some kind of criminal currency, used to trade in …

0
640
Member Avatar for happygeek

Discount coupons are OK, but consumers consider drive-by location marketing an invasion of privacy. That's the warning message that research across four countries (US, UK, Mexico and India) by ISACA would appear to be flagging loud and clear to retailers wanting to maximise the marketing potential of customers with smartphones. …

2
416
Member Avatar for happygeek

Tumblr, the hugely popular blogging service which was bought by Yahoo! last month, has advised mobile users to change their passwords, and change them immediately. In a posting to the Tumblr staff blog, a spokesperson states "We have just released a very important security update for our iPhone and iPad …

Member Avatar for mildred2013
0
675

The End.