1,390 Topics
| |
Hello! Is there a way to hide the password of your database inside the source code? [CODE=vb.net]"Provider=Microsoft.ACE.OLEDB.12.0;Data Source=" & Application.StartupPath & "\Database.accdb; Jet OLEDB:Database Password = [B]MyPassword[/B]"[/CODE] As you can see the password is exposed, increasing the risk for the database to be compromise. Is there anything you can suggest … | |
Ok over the last several weeks i've been building a website for fun. Its basically a forum site, with topics and comments. I use queries in their basic form. Now that i'm trying to protect my site I'm getting the impression that i have to rewrite all of my code. … | |
[URL="http://en.wikipedia.org/wiki/Man-in-the-middle_attack"]Man-in-the-Middle (MITM) attacks[/URL] are, sadly, not news these days; they are a fact of online life. But word of how the latest SpyEye Trojan-driven MITM attacks are using clever post transaction fraud systems to effectively erase the evidence of the crime from the victims' view certainly deserve to be. Attacking … | |
British software developer Conseal Security has just launched a rather clever solution to the problem of securing the data on your portable media such as USB thumb drives and portable hard drives while at the same time maintaining fully centralized control of the management of those devices without breaking the … | |
hey fellow PHP developer, Is there any way we could protect our PHP source code from being modified after a 3rd person receives the code? I had developed a web application and when i give the source code to another person i want it to be write protected. Currently i … | |
I know this question is extremelly hard to answer without actually checking how I setup my server, but I wondered if anyone could give me a quick rundown and/or information as to how I could check and protect it further. I am running a Web Hosting Server using old computer … | |
I have the following PHP: [CODE]<?php define('DB_NAME', 'database'); define('DB_USER', 'root'); define('DB_PASSWORD', 'password'); define('DB_HOST', 'localhost'); $link = mysql_connect(DB_HOST, DB_USER, DB_PASSWORD); if (!link){ die('Could not connect to database'); } $db_selected = mysql_select_db(DB_NAME, $link); if (!$db_selected) { die('Could not connect to the database'); } $value = htmlspecialchars($_POST['Name']); $value2 = htmlspecialchars($_POST['Email']); $value3 = htmlspecialchars($_POST['Subject']); … | |
I am currently using MySQL so people can send my a message that shall be stored in the database. The only issue is I have no idea how to protect against SQL Injection, below is my HTML: [CODE]<form action="Action.php" method="POST" /> <p>Name: <input type="text" name="Name" /> </p> <p>Comment: <input type="text" … | |
How will Microsoft differentiate Windows 8 in an already crowded Windows OS user space? How about, for one, with the use of a photographic gesture security system for logging in? The idea of using a photo to identify and authenticate the user is not without some pretty obvious problems (ambient … | |
Hello, I am trying to set up E-Commerce using Magento. I was wondering if I need SSL for it. If all the transactions are through PayPal then do I need it? And if I do need SSL, can I use shared or does it have to be private. Thanks | |
I am wanting to set up a home server using an old computer, after doing some costs it would work out considerably cheaper than using a hosting service, and although less reliable I feel it would be some good and valuable experience. I have installed Ubuntu server edition onto my … | |
Sykipot is not a new Trojan Horse by any means, but the variation found to be attacking Department of Defense smart cards is certainly something that government agencies need to be worried about. United States government agencies, that is. It's doubtful the Chinese government will be too worried about them, … | |
Hii I have a work network and all computers have the same workgroup name, but the workgroup is a part of whole bulding network. I wanted to restrict access to on of the computers to only employees at the office and I enabled guest account on that computer an set … | |
Hi frendz In my website somebody changes the content as [B]"hacked by phantom"[/B]. Anybody heard about this word "hacked by phantom" and what is the issue? Any virus? or Hackers? | |
Recently, I removed Windows XP Security 2012 and was left with a process called ping.exe which uses enormous amounts of CPU. I am in the process of completing the sticky guide ([url]http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/threads/134865[/url]) and am currently running scan #2 using GMER. I have ran the Windows Malicious Software Removal Tool, ATF-Cleaner, … | |
Most of the reports out yesterday about the release of [URL=http://www.microsoft.com/ie8]Internet Explorer 8[/URL]Beta 2 focused on its so-calledInPrivate Browsing, which leaves no trace of the Web sites you visit and protects anonymity. And while that's certainly useful, developers are likely to be more interested in its improvements in DOM and … | |
| (This is my first post.) As the title suggests, I want to know of any security vulnerabilities there are in Windows 98. I have just installed Windows 98 on a virtual machine, and I wanted to see if I could exploit it somehow. The reason why I want to do … |
Hi! Im new to php web development. I am developing an online shopping system where theres an admin page that allows him to add, edit, delete category and products. to cut the story short, what I want to know is, is it safe to save the table for admin username … | |
hi everyone, I am writing a small client and server application in java which uses SSL sockets and AES, i got this from the net and edited it a bit is this correct and secure? client: [code=java]/* * To change this template, choose Tools | Templates * and open the … | |
With the recent announcement of an easy way to gain root access for Android phones running 2.3.4, to add to the list of similar exploits for earlier versions and 3.0 and beyond, it should come as no real surprise that the bad guys are taking advantage of the relative weakness … | |
[ATTACH=RIGHT]21691[/ATTACH]“Your PC may be infected” says Google, which has taken the unusual step of [URL="http://googleblog.blogspot.com/2011/07/using-data-to-protect-people-from.html"]warning users[/URL] that a couple of million or so of them have most likely been taken in by a fake AV scam. According to a post on the official Google blog by security engineer Damian Menscher, … | |
Hi, I'm researching social networks and their privacy issues with data as part of an assignment. I've found a few papers that are useful, but i wondered if anyone knew of any relevant good ones that are also accessible? I also have to analyse the paper in terms of how … | |
DaniWeb has looked at Network Attached Storage in the shape of the [URL="http://www.daniweb.com/reviews/review308073.html"]myDitto server which offers excellent value in terms of both cost and capacity[/URL]. DaniWeb has looked at a personal cloud device in the [URL="http://www.daniweb.com/reviews/review260663.html"]very pink format of PogoPlug which is great for anytime and anywhere sharing[/URL]. DaniWeb has … | |
I am trying to create a licensing system where you have a license key as a variable in a file. Then, it includes a file that's on an external server. The server then does all the validating, and returns whether the key is valid or not. The problem is, an … | |
[URL="https://www.facebook.com/TeaMp0isoN"]TeaMp0isoN[/URL], a black-hat hacking collective, has announced that it is to collaborate with Anonymous on Operation Robin Hood which swears to take money from the banks (in the form of stolen credit card data) and redistribute the wealth from the 1% to the 99% in support of the Occupy Movement. … | |
Hi, I am working on client authentication(in a sample JSP application) using certificates. I have written a code to extract the client information from the client certificate. Now I wanted to use certificate's serial number to identify the particular use from the database. I extract the serial number using [CODE]<%= … | |
I am adding a page to my site that allows doctors to send me referrals. Some of the data will be highly sensitive, so I need to be sure that it is handled as securely as possible. The data doesn't get stored in a database. It is simply emailed directly … | |
Hello! I am working on a networking project and I had some questions.... I am in the process of building a network specifically for security penetration, & exploit testing, and I looking for some of the best methods for maintaining IP anonymity. I know of the good old fashion method … | |
What I have is a linksys wrt54gs(dd-wrt) router assigning private ip's to my workstations. I also have a Windows Server which i need accessible for Windows Remote Desktop Connection to my remote office in Costa Rica. I'd like to have the server have one of my 5 static public ip's(so … | |
[ATTACH=RIGHT]22459[/ATTACH]Just how desperately are you looking for love? Unfortunately, for some the answer is all too often all too desperately; to the point where common sense leaps out of the window and is quickly followed by the bank balance. According to new research by the University of Leicester in the … |
The End.