1,387 Topics

Member Avatar for
Member Avatar for happygeek

A password is defined as being a "secret word or string of characters" that is used to authenticate identity and enable access to a resource. The emphasise being on the word secret, although 'unique' is equally important when it comes to password security. Which is why the list of the …

Member Avatar for rajutech
0
593
Member Avatar for patocardo

For security reasons, several articles recommend "do not cache pages". So I usually put the following at the beginning of my web pages header("Expires: Mon, 26 Jul 1997 05:00:00 GMT"); header("Last-Modified: " . gmdate("D, d M Y H:i:s") . " GMT"); header("Cache-Control: post-check=0, pre-check=0", false); header("Pragma: no-cache"); That works very …

Member Avatar for jmichae3
0
201
Member Avatar for gotboots

Hi all, I have the following code to process through my requests, then use in a database. FIRST of all, I was wondering if i have it in the right order, and SECOND, if there are any other steps i could do to secure up my application. have a look, …

Member Avatar for veedeoo
0
254
Member Avatar for happygeek

A cyber weapon grade piece of malware, some twenty times the size of Stuxnet, has apparently been fired at a number of countries in the Middle East. This highly complex piece of code which takes screenshots of any open 'programs of interest' such as email or IM, records audio and …

Member Avatar for happygeek
0
671
Member Avatar for G_Waddell

Hi, I'm a developer by trade but I've done some networking in the past (mostly buying and creating machine specifications but also a bit of firewall management and AD policies,) In a previous company I was even Manager of the Systems department (Developers and IT guys) Anyway I've recently joined …

Member Avatar for G_Waddell
1
360
Member Avatar for Octet

I am creating a website although during a trial run with a couple of friends they uncovered a bit of a major issue.... the ability to spam. I have added a hidden box e.t.c. to attempt to prevent bots from spamming but my friends where able to post twenty messages …

Member Avatar for nielsep
0
226
Member Avatar for happygeek

The Serious Organised Crime Agency (SOCA) website remains offline after being hit by a Distributed Denial of Service (DDoS) attack for the second time in the space of a year. Last June it was the hacktivist group LulzSec which claimed responsibility; this time nobody has yet come forward to admit …

Member Avatar for tentimes
1
424
Member Avatar for happygeek

The Flashback Trojan has infected at least 600,000 Apple computers running Mac OS X according to the Russian AV company [Dr Web](http://www.drweb.com/?lng=en) which researched the spread of the malware which was originally discovered at the end of last year and for which Apple issued a security patch just this week. …

Member Avatar for Danarchy
1
481
Member Avatar for happygeek

If you are a user of Adobe Flash, be sure to apply the latest security update if you want to avoid becoming part of an in-the-wild attack exploiting a vulnerability which currently seems to be exploiting users of Internet Explorer on the Windows platform only. Adobe has, however, issued an …

Member Avatar for happygeek
0
707
Member Avatar for jjoensuu

Hi, a question about stand-alone Java applications that do not have a background DB. In our Uni class we were asked to build a very small application using JOptionPane methods such as "showInputDialog". The application asks for users name and birthdate and at the end displays a summary of these …

Member Avatar for JamesCherrill
0
439
Member Avatar for gotboots

Hi there, I have recently been looking into encryption, for MySQL and php, to figure out someway to encrypt the information in the database, or more to the point before it goes in, or decrypted when it comes out. What I'd like to happen is for the info submitted from …

Member Avatar for gotboots
0
205
Member Avatar for happygeek

The Apple iWork office productivity suite for the Mac has been around for ages, and was recently joined by an iOS version. iWork documents have, up until now, been seen as being pretty safe courtesy of the particular implementation of the 128-bit AES encryption Apple used to secure them. I …

Member Avatar for fahimk123
1
1K
Member Avatar for happygeek

Security researchers are warning that some 30,000 WordPress websites, 85% of them based in the US, have been compromised by a mass-injection hijack attack which sees visitors to any of more than 200,000 individual pages redirected to a Trojan infected rogue AV scam. [ATTACH=RIGHT]24076[/ATTACH]The senior security researcher with Websense Labs, …

Member Avatar for occirats
0
890
Member Avatar for Mourin @ Dell

Hey everyone, Our team at Dell SMB has recently put together a [Slideshare](http://goo.gl/oJtjH) of our most popular white papers. I hope this is helpful to the Daniweb community! Thanks, Mourin

0
329
Member Avatar for happygeek

Probably the most common Olympic Games 2012 scam is that of unofficial ticket sales. No great surprise there, but the fact that Google appears to be in on the act might come as a shock to many. So what, exactly, is going on? [ATTACH=RIGHT]23779[/ATTACH]A little known law in the UK …

Member Avatar for elitebag
0
554
Member Avatar for happygeek

The Iranian Cyber Army may be the latest elite military hacking squad to hit the headlines, but Iran has a long way to go if it's to catch up with China in terms of international data disruption. According to one newly published report into the threat from Chinese state-sponsored espionage …

Member Avatar for BruceVA
0
462
Member Avatar for joeywheels

I think my site has been hacked! I found these lines of code on all my php files and I didn't put them there. Problem is I don't know enough php to understand what this batch of code does. Could anyone please help? How bad is it? Here's the code: …

Member Avatar for weekendrockstar
0
178
Member Avatar for jbennet

How can I get SSL working in Tomcat 6.x under Linux?, ive read the documentation here: [url]http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html[/url] but im not sure how to do it with a certificate I will make myself (its a dev box)

Member Avatar for jbennet
0
213
Member Avatar for happygeek

Following the arrest of 25 suspected members of the Anonymous hacking collective in Europe and South America, the INTERPOL website went offline. Coincidence? I don't think so. After all, Anonymous has already proven it isn't scared, or indeed incapable. of taking down law enforcement sites. Earlier in the month it …

Member Avatar for Sam55129
3
361
Member Avatar for chelboy_jr

i was a diploma in networking, and has be in the final year and need to do some network security project.. can someone give me an idea what things should i do for my project.. because i think i just want to do something that been related with router.. i …

Member Avatar for rubberman
0
208
Member Avatar for patrick1981

I want to manually test my sites to check if they are secure against SQL injections. Whats a good way to attempt it. How do I get started? thank you

Member Avatar for patrick1981
0
183
Member Avatar for eltonpiko

hi there can anyone tell me if its possible with php to use certificate to autenticate to a web application admin area instead of using common username and password? and is there a vps web server that can encrypt the whole drive and database of my application, for it may …

Member Avatar for iamthwee
0
69
Member Avatar for happygeek

The Ainslot.L Trojan appears to be much the same as any other at first glance; logging user activity and sending Gmail and Facebook passwords to the bad guys, downloading further malware, taking over your computer and the main payload of being a Banking Trojan stealing account login data. But Ainslot.L …

Member Avatar for happygeek
4
483
Member Avatar for dantinkakkar

I want to build a network protocol analyzer, but I really don't know where to start. Obviously, I don't want the code in hand, I can think it up myself -- but the problem is a little more specific - where do I look at to get the IPs passing …

Member Avatar for dantinkakkar
0
285
Member Avatar for pchurness

Hello, I'm developing an e-commerce site in a LAMP environment. Is it advisable to separate data on to different servers (i.e. to have one server as the web server and another server to house transaction and other customer data)? In other words, from a security perspective is there any reason …

0
134
Member Avatar for happygeek

If you use, or operate, a password-free wireless network then legal action being taken in the US by the adult movie industry might just be about to rain on your parade warns one European IT threat mitigation expert. [ATTACH=RIGHT]23826[/ATTACH]The lawsuit was filed by Liberty Media Holdings, a producer of adult …

Member Avatar for WebCopywriter
1
906
Member Avatar for klemme

Hi all, I want to integrate SSL on my localhost, so that I can tjeck/use it while developing. Is it allready in my version of php and apache, and only need to be activated? It didnt show up as a heading when i tjecked the phpinfo(); Do I need to …

Member Avatar for diafol
0
173
Member Avatar for ryklon

Hello! Is there a way to hide the password of your database inside the source code? [CODE=vb.net]"Provider=Microsoft.ACE.OLEDB.12.0;Data Source=" & Application.StartupPath & "\Database.accdb; Jet OLEDB:Database Password = [B]MyPassword[/B]"[/CODE] As you can see the password is exposed, increasing the risk for the database to be compromise. Is there anything you can suggest …

Member Avatar for Reverend Jim
0
273
Member Avatar for RazorRamon

Ok over the last several weeks i've been building a website for fun. Its basically a forum site, with topics and comments. I use queries in their basic form. Now that i'm trying to protect my site I'm getting the impression that i have to rewrite all of my code. …

Member Avatar for minitauros
0
280
Member Avatar for happygeek

[URL="http://en.wikipedia.org/wiki/Man-in-the-middle_attack"]Man-in-the-Middle (MITM) attacks[/URL] are, sadly, not news these days; they are a fact of online life. But word of how the latest SpyEye Trojan-driven MITM attacks are using clever post transaction fraud systems to effectively erase the evidence of the crime from the victims' view certainly deserve to be. Attacking …

Member Avatar for nathanmcgill
0
604

The End.