1,387 Topics

Member Avatar for
Member Avatar for anAppBuilder

I have an .exe that I want people to be able to download and run on Vista. It needs to run as admin. I have a web page with a 'Download' button. Assume I am logged in as an admin. I click the 'Download' button and IE8 asks whether to …

Member Avatar for anAppBuilder
0
277
Member Avatar for slfisher

40 million people were without power in the eastern United States, more than 60 million cellphones were out of service, and Wall Street was closed for a week due to a terrorist cyberattack against the United States. No, it didn't really happen. But it could. Coverage of a simulated cyber …

0
487
Member Avatar for apoorvatandon

Can somebody please suggest some good institutes which provide certifies course and training in information security.

0
84
Member Avatar for SillyBilly

I have a question, couple of years ago, I had a system failure and windows tech support help me fix it but had me do a lot of registry entries in windows recovery console. What ended up for the fix was he had me actually put the boot files on …

Member Avatar for gerbil
0
288
Member Avatar for connColl

Hello, <br /><br /> We are struggling with getting IIS 6 (Win 2003 server) to connect to a Samba share that contains some dynamically generated resources. We are able to mount the drive on the Windows server and create a Virtual Directory to that new drive using 'Connect As' with …

0
138
Member Avatar for apoorvatandon

What are the career prospects of information security? Is the job of information security expert lucrative? Somebody pls advice..

0
88
Member Avatar for kevin best

Hello all, I 'm new to network security and have few question to be clarified. I will appreciate if experts give me a proper defination. 1)Security incident has happened , a hacker 's hacked into a monitored network what should be done? 2)Definition of port scanning 3)Who's responsible for overall …

Member Avatar for Acrimonus
0
108
Member Avatar for newsguy

As Safer Internet Day comes to a close, one expert in the field warns that there can be no safety without security. John Colley is managing director of [URL="http://www.isc2.org/"](ISC)2[/URL], a non profit organisation which runs a program helping volunteers visit schools, clubs and parent evenings. They also support council appointed …

0
1K
Member Avatar for happygeek

Websense Security Labs has [URL="http://community.websense.com/blogs/websense-features/archive/2010/02/01/websense-security-labs-report-state-of-internet-security-q3-q4-2009.aspx"]published[/URL] its bi-annual State of Internet Security report and, as usual, it makes for pretty interesting if somewhat scary reading. Covering the last six months of 2009, the report is based upon the findings of the ThreatSeeker Network which is used to discover, classify and monitor …

Member Avatar for janklaza
1
2K
Member Avatar for newsguy

According to a recent Kaspersky security research report, stolen [URL="http://www.daniweb.com/news/story237081.html"]Twitter accounts[/URL] are being sold on the black market for as much as $1000 a time. This really should not come as any great surprise given that the rapid [URL="http://www.daniweb.com/news/story231627.html"]evolution of social media[/URL] mirrors the rapid [URL="http://www.daniweb.com/news/story238033.html"]evolution of cybercrime[/URL]. The price …

Member Avatar for InsightsDigital
1
383
Member Avatar for happygeek

Three men have been arrested, and what is thought to be a training site for hackers closed down, as Chinese officials get tough in the wake of the [URL="http://www.daniweb.com/news/story252590.html"]Google Gmail human rights hacking scandal[/URL]. While China has something of a history of being [URL="http://www.daniweb.com/blogs/entry4434.html"]tough on political activists[/URL], online [URL="http://www.daniweb.com/news/story235672.html"]multi-player gaming[/URL] …

0
446
Member Avatar for happygeek

It all kicked off last night with a [URL="http://hackersblog.org/2009/02/07/usakasperskycom-hacked-full-database-acces-sql-injection/"]posting to hacker board[/URL] claiming to have carried out a relatively simple SQL Injection attack on one the world's biggest and best known IT security companies: Kaspersky. The hacker, currently only know as 'unu' claims that the SQL Injection attack on usa.kaspersky.com …

Member Avatar for rayeesmkrayees
0
450
Member Avatar for Tech B

Everything works great. But sometimes I get an Error message saying something about ip/port bindings. I don't have the traceback but this could cause problems down the road. Any suggestions? [code] #Backdoor Server #Version 0.3.0 #Every now and the I get an Error dealing with the ip/port bindings # seems …

Member Avatar for snippsat
0
2K
Member Avatar for happygeek

Apple has this week released a software update for the iPhone which addresses a total of five security vulnerabilities. But not, it would seem, the small matter of a year old glitch which could turn your iPhone into a spyPhone. First the good news, Apple has released [URL="http://support.apple.com/kb/HT4013"]iPhone OS 3.1.3[/URL] …

0
524
Member Avatar for happygeek

In an [URL="http://www.guardian.co.uk/technology/2010/jan/24/computer-security-crime-anonymous-datasets"]interview[/URL] with The Observer newspaper, Dr Ian Brown from the Oxford Internet Institute who is writing a report on anonymous datasets for the European Commission warns that "criminals could identify individuals through mobile phone data and use the information to track people's movements and find out when they …

Member Avatar for DeAnonym
2
306
Member Avatar for happygeek

It doesn't take a search genius to go and find [URL="http://www.daniweb.com/news/story253418.html"]plenty of reports[/URL] of how Internet Explorer is, how can I put this nicely, [URL="http://www.itpro.co.uk/blogs/daveyw/2009/11/22/ie-6-and-7-hit-by-hack-attack-code/"]not exactly the safest bet[/URL] if you are looking for the most secure browsing experience. Quite apart from anything else it has the biggest market share …

1
271
Member Avatar for khess

I love mythology and there's nothing like hearing a technology myth to make my day complete. Just today someone applied one of the following myths in a conversation with me. I didn't say anything but it gave me the idea for this post. Here are the five myths related to …

Member Avatar for ripratm
0
2K
Member Avatar for newsguy

I have a lot of passwords to get me onto various online sites and services, but I only need to remember one: the complex and hard to crack one that unlocks my encrypted password store. Not everyone is as paranoid as I am it seems, and many fall neatly into …

Member Avatar for Salem
1
416
Member Avatar for happygeek

Yesterday [URL="http://www.daniweb.com/blogs/entry3943.html"]I reported[/URL] how the security vendor Kaspersky had allegedly fallen victim to a SQL Injection attack, with the usa.kaspersky.com website hacked and plenty of data potentially exposed. I said that Kaspersky would no doubt make an official statement sooner rather than later, and it has. Unfortunately it is one …

Member Avatar for wildsniper
0
590
Member Avatar for happygeek

No sooner had the news of the untimely [URL="http://www.itpro.co.uk/blogs/daveyw/2009/06/28/that-michael-jackson-effect/"]death of Michael Jackson[/URL] hit the Internet than the vultures started circling. For once it was not the gossip columnists and tabloid journalists digging up the dirt, but rather spammers and hackers looking to exploit a golden opportunity to distribute their wares …

Member Avatar for happygeek
0
239
Member Avatar for happygeek

I would like to think that anyone watching, reading or listening to news reports of the unfolding tragedy that is post-earthquake Haiti could not fail to be moved first to tears and then prompted to want to do something. Most people have responded by asking themselves 'what can I do …

Member Avatar for canadafred
2
486
Member Avatar for happygeek

Internet security giant Symantec has just published the latest [URL="http://www.symantec.com/enterprise/theme.jsp?themeid=threatreport"]Internet Security Threat Report[/URL], based on an in-depth analysis of global Internet traffic and email during the last six months. Beyond all the usual who is hosting what and where, how much malware is contained in spam and which threats are …

Member Avatar for paulanderson154
1
679
Member Avatar for happygeek

Some might argue that it has been a bad year for encryption. After all, just as the last decade was ending came reports that the algorithm that is used to encrypt GSM mobile phone calls (as used by some 4 billion people around the world) had been cracked wide open. …

Member Avatar for HenryTom
3
620
Member Avatar for happygeek

Google has signalled, in the strongest possible manner, that it will be pulling out of China unless something is done to address censorship of searches. It has also accused China of launching a "highly sophisticated and targeted attack" on the Google corporate infrastructure, along with another twenty large companies from …

Member Avatar for canadafred
2
710
Member Avatar for sayeedbd

Hello All, I am trying to lock some my video, picture, Excel and Word file in my PC by using Visual Basic. I am using Visual Studio 2008 to develop this application but I am unable to do this job. It'll be something like security utility application. Actually without me, …

Member Avatar for sayeedbd
0
189
Member Avatar for Techwriter10

Yesterday ReadWriteWeb reported that Facebook CEO Mark [URL="http://www.readwriteweb.com/archives/facebooks_zuckerberg_says_the_age_of_privacy_is_ov.php?utm_source=feedburner&utm_medium=email&utm_campaign=Feed:%20readwriteweb%20%28ReadWriteWeb%29"]Zuckerberg told TechCrunch's Michael Arrington[/URL] people are not only OK with publicly exposing certain information on the open web such as their pictures and pages they subscribe to, Zuckerberg believes they are ready to give up privacy. [B]Really Mark?![/B] Amy Pohler and Seth …

Member Avatar for InsightsDigital
0
627
Member Avatar for Voulnet

Hello there fellow users, I have been entrusted with the task of designing and implementing a financial system for a charity foundation where I live. The charity foundation requires its work (addition and retrieval of records, for example) to be done online, using a web app. The app connects to …

Member Avatar for nav33n
0
104
Member Avatar for stranoblaze

i keep getting these pop up notifications with the red badge and white X on the bottom right of my computer. it won't allow me to open up any websites in Explorer. it also won't allow me to run any of my anti-virus and ad-aware software as if it's blocking …

Member Avatar for stranoblaze
0
294
Member Avatar for khess

The Obama Administration vows to cut costs in part by using open source software (Software whose source code is made available to the user), cloud computing, virtualization, Linux and other low cost technologies. But, does the use of open source software put the government, its records and our national security …

Member Avatar for pogson
2
896
Member Avatar for heso10

Hi, i am doing a project about key management and i need a good book that discusses key management in details, thanks for your help.

Member Avatar for brayan
1
148

The End.