1,387 Topics

Member Avatar for
Member Avatar for happygeek

British software developer Conseal Security has just launched a rather clever solution to the problem of securing the data on your portable media such as USB thumb drives and portable hard drives while at the same time maintaining fully centralized control of the management of those devices without breaking the …

Member Avatar for 07knev
1
597
Member Avatar for unikorndesigns

hey fellow PHP developer, Is there any way we could protect our PHP source code from being modified after a 3rd person receives the code? I had developed a web application and when i give the source code to another person i want it to be write protected. Currently i …

Member Avatar for edwinhermann
0
930
Member Avatar for Octet

I know this question is extremelly hard to answer without actually checking how I setup my server, but I wondered if anyone could give me a quick rundown and/or information as to how I could check and protect it further. I am running a Web Hosting Server using old computer …

Member Avatar for rubberman
0
243
Member Avatar for Octet

I have the following PHP: [CODE]<?php define('DB_NAME', 'database'); define('DB_USER', 'root'); define('DB_PASSWORD', 'password'); define('DB_HOST', 'localhost'); $link = mysql_connect(DB_HOST, DB_USER, DB_PASSWORD); if (!link){ die('Could not connect to database'); } $db_selected = mysql_select_db(DB_NAME, $link); if (!$db_selected) { die('Could not connect to the database'); } $value = htmlspecialchars($_POST['Name']); $value2 = htmlspecialchars($_POST['Email']); $value3 = htmlspecialchars($_POST['Subject']); …

Member Avatar for Octet
0
160
Member Avatar for Octet

I am currently using MySQL so people can send my a message that shall be stored in the database. The only issue is I have no idea how to protect against SQL Injection, below is my HTML: [CODE]<form action="Action.php" method="POST" /> <p>Name: <input type="text" name="Name" /> </p> <p>Comment: <input type="text" …

Member Avatar for diafol
0
151
Member Avatar for happygeek

How will Microsoft differentiate Windows 8 in an already crowded Windows OS user space? How about, for one, with the use of a photographic gesture security system for logging in? The idea of using a photo to identify and authenticate the user is not without some pretty obvious problems (ambient …

Member Avatar for jwenting
0
687
Member Avatar for jonow

Hello, I am trying to set up E-Commerce using Magento. I was wondering if I need SSL for it. If all the transactions are through PayPal then do I need it? And if I do need SSL, can I use shared or does it have to be private. Thanks

0
181
Member Avatar for Octet

I am wanting to set up a home server using an old computer, after doing some costs it would work out considerably cheaper than using a hosting service, and although less reliable I feel it would be some good and valuable experience. I have installed Ubuntu server edition onto my …

Member Avatar for Habitual
0
209
Member Avatar for happygeek

Sykipot is not a new Trojan Horse by any means, but the variation found to be attacking Department of Defense smart cards is certainly something that government agencies need to be worried about. United States government agencies, that is. It's doubtful the Chinese government will be too worried about them, …

Member Avatar for diafol
0
688
Member Avatar for secret-code

Hii I have a work network and all computers have the same workgroup name, but the workgroup is a part of whole bulding network. I wanted to restrict access to on of the computers to only employees at the office and I enabled guest account on that computer an set …

Member Avatar for secret-code
0
203
Member Avatar for karthik_ppts

Hi frendz In my website somebody changes the content as [B]"hacked by phantom"[/B]. Anybody heard about this word "hacked by phantom" and what is the issue? Any virus? or Hackers?

Member Avatar for karthik_ppts
0
229
Member Avatar for toddthirtyone

Recently, I removed Windows XP Security 2012 and was left with a process called ping.exe which uses enormous amounts of CPU. I am in the process of completing the sticky guide ([url]http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/threads/134865[/url]) and am currently running scan #2 using GMER. I have ran the Windows Malicious Software Removal Tool, ATF-Cleaner, …

Member Avatar for PhilliePhan
0
425
Member Avatar for EddieC

Most of the reports out yesterday about the release of [URL=http://www.microsoft.com/ie8]Internet Explorer 8[/URL]Beta 2 focused on its so-calledInPrivate Browsing, which leaves no trace of the Web sites you visit and protects anonymity. And while that's certainly useful, developers are likely to be more interested in its improvements in DOM and …

Member Avatar for AleMonteiro
0
344
Member Avatar for Johnbonono

(This is my first post.) As the title suggests, I want to know of any security vulnerabilities there are in Windows 98. I have just installed Windows 98 on a virtual machine, and I wanted to see if I could exploit it somehow. The reason why I want to do …

Member Avatar for Ezzaral
0
194
Member Avatar for anthonyjpv

Hi! Im new to php web development. I am developing an online shopping system where theres an admin page that allows him to add, edit, delete category and products. to cut the story short, what I want to know is, is it safe to save the table for admin username …

Member Avatar for chrishea
0
149
Member Avatar for DavidKroukamp

hi everyone, I am writing a small client and server application in java which uses SSL sockets and AES, i got this from the net and edited it a bit is this correct and secure? client: [code=java]/* * To change this template, choose Tools | Templates * and open the …

Member Avatar for DavidKroukamp
1
203
Member Avatar for happygeek

With the recent announcement of an easy way to gain root access for Android phones running 2.3.4, to add to the list of similar exploits for earlier versions and 3.0 and beyond, it should come as no real surprise that the bad guys are taking advantage of the relative weakness …

Member Avatar for Trigle
0
445
Member Avatar for happygeek

[ATTACH=RIGHT]21691[/ATTACH]“Your PC may be infected” says Google, which has taken the unusual step of [URL="http://googleblog.blogspot.com/2011/07/using-data-to-protect-people-from.html"]warning users[/URL] that a couple of million or so of them have most likely been taken in by a fake AV scam. According to a post on the official Google blog by security engineer Damian Menscher, …

Member Avatar for zabalex
1
397
Member Avatar for BenzZz

Hi, I'm researching social networks and their privacy issues with data as part of an assignment. I've found a few papers that are useful, but i wondered if anyone knew of any relevant good ones that are also accessible? I also have to analyse the paper in terms of how …

Member Avatar for happygeek
0
153
Member Avatar for happygeek

DaniWeb has looked at Network Attached Storage in the shape of the [URL="http://www.daniweb.com/reviews/review308073.html"]myDitto server which offers excellent value in terms of both cost and capacity[/URL]. DaniWeb has looked at a personal cloud device in the [URL="http://www.daniweb.com/reviews/review260663.html"]very pink format of PogoPlug which is great for anytime and anywhere sharing[/URL]. DaniWeb has …

Member Avatar for PeterM88
0
649
Member Avatar for calebcook

I am trying to create a licensing system where you have a license key as a variable in a file. Then, it includes a file that's on an external server. The server then does all the validating, and returns whether the key is valid or not. The problem is, an …

Member Avatar for moneeshot
0
188
Member Avatar for happygeek

[URL="https://www.facebook.com/TeaMp0isoN"]TeaMp0isoN[/URL], a black-hat hacking collective, has announced that it is to collaborate with Anonymous on Operation Robin Hood which swears to take money from the banks (in the form of stolen credit card data) and redistribute the wealth from the 1% to the 99% in support of the Occupy Movement. …

Member Avatar for pseudorandom21
0
370
Member Avatar for 650U

Hi, I am working on client authentication(in a sample JSP application) using certificates. I have written a code to extract the client information from the client certificate. Now I wanted to use certificate's serial number to identify the particular use from the database. I extract the serial number using [CODE]<%= …

0
188
Member Avatar for pallen

I am adding a page to my site that allows doctors to send me referrals. Some of the data will be highly sensitive, so I need to be sure that it is handled as securely as possible. The data doesn't get stored in a database. It is simply emailed directly …

Member Avatar for urtrivedi
0
126
Member Avatar for ppotter3

Hello! I am working on a networking project and I had some questions.... I am in the process of building a network specifically for security penetration, & exploit testing, and I looking for some of the best methods for maintaining IP anonymity. I know of the good old fashion method …

Member Avatar for ppotter3
0
518
Member Avatar for Staric

What I have is a linksys wrt54gs(dd-wrt) router assigning private ip's to my workstations. I also have a Windows Server which i need accessible for Windows Remote Desktop Connection to my remote office in Costa Rica. I'd like to have the server have one of my 5 static public ip's(so …

0
176
Member Avatar for happygeek

[ATTACH=RIGHT]22459[/ATTACH]Just how desperately are you looking for love? Unfortunately, for some the answer is all too often all too desperately; to the point where common sense leaps out of the window and is quickly followed by the bank balance. According to new research by the University of Leicester in the …

Member Avatar for Ancient Dragon
0
524
Member Avatar for praveendasika

Hi I have recently been facing a difficut issue.I think some one is attacking my website. I have attached the jpg image of the failure and its happening on a daily basis .I upload the site and for some hrs its just cool but suddenly i get this error. I …

Member Avatar for albertindian200
0
198
Member Avatar for happygeek

It may win the prize for being the research with the most surreal title, but the 'My dog ate my iPad' report comes with a very serious message attached and one that business would do well to listen to. The full title of the independent research report, commissioned by SecureData, …

Member Avatar for jwenting
0
435
Member Avatar for happygeek

Using newly registered domains with a very short lifespan to host malware websites is so last year. It would appear that these days such things are far more likely to be hosted on much older compromised web sites instead. Could this be down to a decline in domain tasting? The …

Member Avatar for Azmah
1
630

The End.