1,387 Topics

Member Avatar for
Member Avatar for marc311

hi guys.im new here at the community. im marco a computer science student. guys/sir/madam is it ok for you if ill ask a help from your expertise. right now im doing a project a bout a home security system its a simple anti burglar system, its kinda weird but it …

Member Avatar for TheMasterThingM
0
229
Member Avatar for newsguy

According to the latest market research coming out of security vendor [URL="http://www.ncircle.com"]nCircle[/URL] the cost of security auditing is heading in one direction, and that's upwards. Some 47 percent of IT security professionals to the nCircle survey expect that security auditing costs will increase during 2010 while only a very optimistic …

0
737
Member Avatar for GuyClapperton

The headline says it all - [URL="http://www.facebook.com"]Facebook[/URL] has rearranged its privacy rules after massive bad feedback from users on multiple social networks. The issue spread as far as news sites including those of international broadcasters and newspapers. There had been plans for members to use 31 May as a mass …

Member Avatar for happygeek
0
151
Member Avatar for newsguy

Eugene Kaspersky will today be inducted into the Infosecurity Europe 2010 Hall of Fame in recognition of his contribution to the advancement of the IT security industry during more than twenty years in the business. It's not the only award he has received, as the SC Awards Europe 2010 also …

Member Avatar for jollyscoden023
0
236
Member Avatar for newsguy

Last year security vendors were warning that botnets were not only not dead, but bouncing back in a big way. One suggested that [URL="http://www.daniweb.com/news/post1080975.html"]botnets would become autonomous and intelligent[/URL], with each node containing inbuilt self-sufficient coding in order to coordinate and extend its own survival, during the course of 2010. …

Member Avatar for jollyscoden023
2
168
Member Avatar for happygeek

Rather amazingly, just one crime syndicate stands accused of being responsible for some two thirds of all detected phishing attacks carried out during the last six months of 2009. The so-called Avalanche gang, according to a new report by the Anti-Phishing Working Group (APWG), used highly sophisticated malware to target …

Member Avatar for jollyscoden023
0
227
Member Avatar for GuyClapperton

[URL="http://www.facebook.com"]Facebook[/URL] appears set to reconsider its privacy policy after colossal backlashes in the online world. The company confirmed to the BBC that it appears to have made things too complicated. Introduced this week was a new button on the privacy settings on a user's page, in which they share their …

Member Avatar for InsightsDigital
0
191
Member Avatar for GuyClapperton

[URL="http://www.facebook.com"]Facebook[/URL] has been involved in meetings this week talking to employees about their concerns over user privacy. The issue is that people searching the web can now see Facebook members' profiles, unless they have protected them, whether the person doing the search is a Facebook member or not. Previously the …

Member Avatar for joelchrist
1
436
Member Avatar for newsguy

If you see a message on Facebook, apparently coming from one of your friends, and promising a link to the 'sexiest video ever' then whatever you do, don't click on it. The video link messages promise a 'candid camera prank' seemingly involving a woman in a short skirt riding an …

Member Avatar for InsightsDigital
-1
716
Member Avatar for newsguy

Back in 1976, along with Stanford University professor Martin Hellman, Whit Diffie produced quite possibly the most important paper in the history of cryptography. That paper, New Directions in Cryptography, laid the groundwork for solving one of the fundamental problems of cryptography, that of key distribution. Now Diffie himself is …

Member Avatar for Agni
0
573
Member Avatar for slfisher

It's not clear whether it's an application, a virus, or Facebook itself, but in the past couple of days something is sending out large numbers of friend suggestions that the original friend didn't make. Typically, it works like this. You have a friend, B, and a friend, C, and you …

Member Avatar for joelchrist
3
506
Member Avatar for slfisher

Perhaps it was [URL="http://www.nytimes.com/2010/04/26/technology/26craigslist.html"]reading [/URL]that Craigslist expected to earn $36 million this year from sex ads that set him off. Connecticut Attorney General Richard Blumenthal has issued a subpoena to Craigslist Inc., seeking information on whether it is fulfilling its promise to crack down on ads for prostitution in its …

Member Avatar for slfisher
0
415
Member Avatar for maddogsprofiles

Whenever I open my internet I get a pop up saying my browser is not secure and telling me to download somthing to fix it (I am not stupid I know it's fake) but how do I ge rid of it, it's undetected by my free rising antivirus software and …

Member Avatar for crunchie
0
231
Member Avatar for WASDted

Gamers beware. There is an email going around with a subject line that reads something like this: "You Steam will be disabled. Please reactive it." (notice how they cannot even spell "your" properly) [attach=right]14694[/attach] In this email you will find a head banner with the STEAM logo and a couple …

1
196
Member Avatar for happygeek

According to new figures, published today by [URL="http://www.sophos.com"]Sophos[/URL], something strange has happened in the world of spam: China has dropped out of the list of the world's worst spam relaying countries for the first time ever. The Sophos 'Dirty Dozen Spammers' list has become something of a staple diet for …

Member Avatar for jennypitts
1
579
Member Avatar for happygeek

The latest MessageLabs spam index reveals that relative to its market share, any given Linux machine is five times more likely to be sending spam than any given Windows machine. But what are the facts behind those headline grabbing numbers and can Windows really get off the hook that easily? …

Member Avatar for cwrinn
0
750
Member Avatar for slfisher

It took two years, but Terry Childs, former network administrator for the city of San Francisco, has finally been convicted of one felony count of computer tampering. In [URL="http://www.daniweb.com/news/story219397.html"]2008[/URL], Childs changed the system's router passwords and then for more than a week refused to give them to anyone, even after …

0
230
Member Avatar for happygeek

Plenty of people have done it, gone online pretending to be something they are not. Indeed, plenty of men have gone online into chat rooms, forums, virtual worlds and social networking sites pretending to be women. Usually it is for the attention, sometimes it is for the sexual kicks of …

Member Avatar for Tony OnUtila
1
426
Member Avatar for happygeek

You might think the people who grew up in an Internet-connected world would be the ones best prepared to cope with the dangers it presents. But no, new research reveals that 18-24 years old, the so called Generation Y, are actually highly likely to ignore advice about risky behaviour online …

Member Avatar for happygeek
0
207
Member Avatar for happygeek

The demand for compromised social network accounts is now so big on the cybercrime black market that, according to the latest research, just one such underground site has 1.5 million of them for sale. The international reach of social networks has meant that these sites have become the de facto …

0
624
Member Avatar for newsguy

With the [URL="http://www.daniweb.com/news/story273324.html"]iPad[/URL] taking off in such a big way that inevitably means for the business market as well as consumer, no matter how much [URL="http://www.daniweb.com/news/story259354.html"]some might argue otherwise[/URL]. And that surely also means it will only be a matter of time before we get word of the first big …

1
199
Member Avatar for happygeek

The latest research from security vendor Symantec would appear to suggest that cybercrime gangs are now applying drug smuggling techniques to their trade, and are actively using 'malware mules' in order to distribute threats within social friendship networks. According to the latest Internet Security Threat Report, email accounts are now …

1
407
Member Avatar for Lisa Hoover

The [URL="http://openid.net/"]OpenID[/URL] authentication method allows visitors to participating Web sites to log in with a single digital identity and avoid having to remember [I]yet another[/I] login / password combination. Many businesses are implementing this method on consumer-facing Web sites in order to lower the barrier to user registration and participation …

Member Avatar for cereal
0
174
Member Avatar for khess

It might sound strange to you that something called [URL="http://www.googlesharing.net/"]Google Sharing[/URL] could actually protect your privacy rather than compromise it. But that's exactly what Google Sharing does; protect your privacy. By acting as a proxy service when you communicate with [URL="http://www.google.com"]Google[/URL], you essentially block information from being delivered to Google. …

0
134
Member Avatar for Fernand0

Hey, before everything, sorry about my english, i will do my best I'm really new at this, i just want to know where i should start learning about security, control of ports, control the sockets already initialized for other program, viruses, spywares, hack, nukes, etc.. I'm just asking for sources(i …

0
104
Member Avatar for oodeagleoo

I have safari, explorer, and firefox and none of these browsers can connect to these sites. I use Noton as an anti virus and zonealarm as a firewall. All of these problems started when my Norton subscription ran out. I went to the norton site to renew it and i …

Member Avatar for subdewd
0
411
Member Avatar for happygeek

Despite having recently been [URL="http://www.daniweb.com/news/story273853.html"]cast as the villain of the piece[/URL] by some high profile members of the Free and Open Source Software community, IBM has just revealed itself as actually being something of a crime-fighting superhero. The Florida State Department of Juvenile Justice is following in the footsteps of …

0
1K
Member Avatar for happygeek

Over the weekend, software development and collaboration tools specialist Atlassian suffered a security breach to an internal system, potentially exposing customer passwords. The reason? It forgot about an old legacy database which had not been taken offline. According to Atlassian spokesperson [URL="http://blogs.atlassian.com/news/2010/04/oh_man_what_a_day_an_update_on_our_security_breach.html"]Mike Cannon-Brookes[/URL] the company had migrated its customer database …

1
350
Member Avatar for Styrofoam

I am mostly following this page: [url]http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html[/url] I used this command to create the keystore keytool -genkey -alias tomcat -keyalg RSA -keystore /etc/tomcat6/keystore and answered the prompts Then i edited my server.xml file and uncommented/edited this line [code] <Connector port="8443" protocol="org.apache.coyote.http11.Http11Protocol" SSLEnabled="true" maxThreads="150" scheme="https" secure="true" clientAuth="false" sslProtocol="TLS" keystoreFile="/etc/tomcat6/keystore" keystorePass="tomcat" /> …

0
266
Member Avatar for newsguy

In March, Facebook proposed that there should be a number of changes to its privacy policy in order to allow it eventually share personal data with 'pre-approved' third party websites. Such information, should you be logged into Facebook and then connect to a third party website, as your name, gender, …

Member Avatar for Afrowall
0
509

The End.