1,387 Topics

Member Avatar for
Member Avatar for chophouse

I'm writing a script to automatically up load a file from Server A to FTP server B. I'm getting stuck at the connecting part. I can connect with a python script using regular FTP, and have done so, but when trying to implement a SSL connection, I keep getting a …

Member Avatar for chophouse
0
3K
Member Avatar for happygeek

Aggressive adware, of the kind that creates shortcuts on your screen or changes your search engine configuration, has arrived on Android devices and then some. According to security vendor Bitdefender, as much as 90% of free Android apps contain adware with up to 75% coming with the 'aggressive' variety. ![dweb-androidadware](/attachments/small/0/dweb-androidadware.jpg …

Member Avatar for luutrudulieubk
0
573
Member Avatar for Mr.M

Hi Dw I'm working with permissions in my program I want it to protect the chosen file by permissions and now what I want is how can I make these permissions unchanged by a user? Or if not possible because I don't want even the administrator to change these permission …

Member Avatar for Mr.M
0
778
Member Avatar for Master Mascus
Member Avatar for stbuchok
0
239
Member Avatar for happygeek

The popular [MacRumors Forums](http://www.macrumors.com/) site has confirmed that it was successfully hacked on Monday this week. The vBulletin powered forums fell victim to what it describes as a similar breach that hit the Ubuntu forums earlier in the year. "Our case is quite similar" says MacRumors founder Arnold Kim who …

3
391
Member Avatar for happygeek

In my [DaniWeb report](http://www.daniweb.com/hardware-and-software/tablets-and-mobile-devices/news/462936/apple-iphone-5s-the-worlds-first-64-bit-smartphone) on the launch of the new iPhone 5s from Apple, I stated that you could "forget the fingerprint scanner built into the new circular home button" but I knew all along that was never going to be the case. In context, I was focusing upon what …

Member Avatar for Kelly Burby
2
571
Member Avatar for santoshedunum
Member Avatar for JamesCherrill
0
102
Member Avatar for happygeek

Apple has, of late at least, oft been accused of following rather than leading when it comes to smartphone innovation. Perhaps the launch of the iPhone 5s with the somewhat controversial fingerprint scanner has changed that, just a little bit. HTC, the powerhouse in the Android smartphone hardware market, has …

Member Avatar for Kelly Burby
0
446
Member Avatar for VNexus

Hi Everyone, I'm not sure if I may be in the wrong venue to post as this would have to do with PHP, CURL and SSL, so I've decided to place the question here. Please feel free to let me know if the question should be dropped in some other …

Member Avatar for Lsmjudoka
1
491
Member Avatar for happygeek

According to the network security team at Oxford University Computing Services ([OxCERT](http://blogs.oucs.ox.ac.uk/oxcert/)) with the title of 'Google Blocks' the world famous seat of learning has decided to put a block, albeit a temporary one, on the use of Google Docs. Robin Stevens from the network security team at Oxford says …

Member Avatar for lirelok
4
540
Member Avatar for happygeek

Did the FBI get the wrong man, or at least the wrong Dread Pirate Roberts (DPR), when it shut down the Silk Road darknet marketplace? Claims are being made that this is precisely what happened, and that Ross Ulbricht who was arrested took over as acting DPR from the real …

1
463
Member Avatar for happygeek

Last week, the NoSQL database host MongoHQ suffered a breach which exposed customer files, email addresses and password data to the attackers. The ripples from that breach are still being felt, as users of the Sunrise calendar app on the iPhone found out this morning. Luckily that password data was …

Member Avatar for long.duckdong.1848
0
540
Member Avatar for pritaeas

We're looking into the Enterprise Library, to see if the security part will fit our needs. We want to use application roles/rights, so we probably need to write our own security provider. What I'm looking for are decent resources on this specific topic. I've found several books already on the …

0
163
Member Avatar for mattster

Hi guys, Am working on a mini project and my question to you is: What would be your top 5 to 10 important tips for security while working with PHP? Thanks for any help recieved!!

Member Avatar for GliderPilot
0
112
Member Avatar for pwolf

I am working towards the goal of a social site, however, being a beginner, I have many questions I need to answer before getting anywhere! One of these is in regards to embedable scripts/ web apps/ widgets. I would like to allow the users of the site to upload web …

Member Avatar for pwolf
0
534
Member Avatar for happygeek

In the newly published Imperva 'Hacker Intelligence Initiative Report' the in-the-wild modification and exploitation of PHP SuperGlobal variables has been investigated. This particular external variable modification weakness has been described as being where a PHP application does "not properly protect against the modification of variables from external sources, such as …

Member Avatar for Gaetane
4
615
Member Avatar for stavros141

Hello everyone I am facing a problem that I have never encountered before and googling around just isn't helping. I was assigned to migrate a pmWiki server to a new MediaWiki server which was supposed to run as a virtual machine on a Red Hat Cluster Suite. My coworker and …

Member Avatar for stavros141
0
297
Member Avatar for mutago

what could be the best way to disable symlink attack 1: i use**disable_functions= symlink,ln** at php.ini 2: at .htaccess i disable it as follow with minus sign(-) Options -FollowSymLinks Options -SymLinksIfOwnerMatch is my workings okay. or they are other work round thank you

Member Avatar for Doug_Vann
0
174
Member Avatar for happygeek

Exploit-based attacks are on the up (1), the majority of IT security professionals aren't sure if they can detect attackers attempting to breach the network (2), and 65% of companies let the tech support department give security training to staff. I would suggest, in order to make some sense of …

Member Avatar for rubberman
0
329
Member Avatar for happygeek

Gartner defines the '[Nexus of Forces](http://www.gartner.com/it-glossary/nexus-of-forces)' as being "the convergence and mutual reinforcement of social, mobility, cloud and information patterns that drive new business scenarios". The global IT analyst outfit has also just released details of research which suggests that the perceived level of maturity when it comes to the …

Member Avatar for LastMitch
0
359
Member Avatar for happygeek

Your web browser provides a window onto the Internet, but unless you are timely in updating the client you use then, say researchers with security vendor Kaspersky Lab,that window may be cracked and allow a draft of insecurity to blow through into your network, your computer and your data. ![firefoxversions](/attachments/small/0/firefoxversions.jpg …

Member Avatar for MidiMagic
1
687
Member Avatar for t_thakar

Hi I was taught not to use global variables and one of my friend is using global variable for database handle for his website... could you please explain if there is an issue if he uses global variable for database handle? he is using it to access database from anywhere …

Member Avatar for veedeoo
0
229
Member Avatar for happygeek

While the News International [phone hacking scandal](http://www.guardian.co.uk/media/phone-hacking) that saw the demise of the News of the World newspaper cannot have escaped your attention in the US or UK, news from India concerning the latest 'tumble and clone' developments could leave the mobile phone calls of more than just celebrities at …

Member Avatar for jimmyparker
2
535
Member Avatar for happygeek

Small groups of what are best described as cyber-mercenaries, willing and able to perform surgically precise hit and run hacking operations, are offering their services for hire out of China, Japan and South Korea. That's the conclusion of security researchers at [Kaspersky Lab](http://www.kaspersky.co.uk/) who have been following the progress of …

Member Avatar for bradly.spicer
1
355
Member Avatar for Emily Banks

When participants of a recent study were asked to share sensitive information on two different online surveys -- one designed to look unprofessional and the other backed by a major university -- the participants were more likely to share private information on the unprofessional-looking site.[ATTACH]16892[/ATTACH]Researchers from Carnegie Mellon released yesterday …

Member Avatar for Ancient Dragon
0
399
Member Avatar for woodenduck

How can I prevent a XSS attack but allow user to post iframe and img? My page is php based but I allow users to submit text and have allowed only iframes and imgs with strip_tag How do I prevent a user from launching an xss attack?

Member Avatar for woodenduck
0
338
Member Avatar for happygeek

A Freedom of Information request from staff at the UK offices of the Huffington Post has revealed, according to a BBC report on the story, that more than 300,000 attempts were made to access pornographic websites from the Houses of Parliament during the last 12 months. Of course, just looking …

Member Avatar for MidiMagic
2
530
Member Avatar for happygeek

UK home shopping pioneers Lakeland have sent an email to all customers past and present to warn them that the retailers website has been hacked. What Managing Director Sam Rayner calls a "sophisticated and sustained attack" took place late on Friday 19th July. Measures were taken at the time to …

Member Avatar for LastMitch
1
376
Member Avatar for Priti_P

Hello there, My query is like- I have one pdf and xls file as link. When any employee try to click on that link, then it should ask me for credentials as name(pmp) and password(123) if these two things matches, thwn only it should allow you to view/download taht xls/pdf. …

Member Avatar for diafol
0
242
Member Avatar for happygeek

Users of online banking services are at risk from a new 'in the wild' Trojan, Hesperbot, which has been discovered by the ESET malware research lab. Researchers have found that infections of users in Turkey are currently most rife, with users in the Czech Republic, Portugal, Thailand and the United …

Member Avatar for ss125
2
391

The End.