1,394 Topics

Member Avatar for
Member Avatar for happygeek

Google has signalled, in the strongest possible manner, that it will be pulling out of China unless something is done to address censorship of searches. It has also accused China of launching a "highly sophisticated and targeted attack" on the Google corporate infrastructure, along with another twenty large companies from …

Member Avatar for canadafred
2
711
Member Avatar for sayeedbd

Hello All, I am trying to lock some my video, picture, Excel and Word file in my PC by using Visual Basic. I am using Visual Studio 2008 to develop this application but I am unable to do this job. It'll be something like security utility application. Actually without me, …

Member Avatar for sayeedbd
0
189
Member Avatar for Techwriter10

Yesterday ReadWriteWeb reported that Facebook CEO Mark [URL="http://www.readwriteweb.com/archives/facebooks_zuckerberg_says_the_age_of_privacy_is_ov.php?utm_source=feedburner&utm_medium=email&utm_campaign=Feed:%20readwriteweb%20%28ReadWriteWeb%29"]Zuckerberg told TechCrunch's Michael Arrington[/URL] people are not only OK with publicly exposing certain information on the open web such as their pictures and pages they subscribe to, Zuckerberg believes they are ready to give up privacy. [B]Really Mark?![/B] Amy Pohler and Seth …

Member Avatar for InsightsDigital
0
653
Member Avatar for Voulnet

Hello there fellow users, I have been entrusted with the task of designing and implementing a financial system for a charity foundation where I live. The charity foundation requires its work (addition and retrieval of records, for example) to be done online, using a web app. The app connects to …

Member Avatar for nav33n
0
104
Member Avatar for stranoblaze

i keep getting these pop up notifications with the red badge and white X on the bottom right of my computer. it won't allow me to open up any websites in Explorer. it also won't allow me to run any of my anti-virus and ad-aware software as if it's blocking …

Member Avatar for stranoblaze
0
296
Member Avatar for khess

The Obama Administration vows to cut costs in part by using open source software (Software whose source code is made available to the user), cloud computing, virtualization, Linux and other low cost technologies. But, does the use of open source software put the government, its records and our national security …

Member Avatar for pogson
2
931
Member Avatar for heso10

Hi, i am doing a project about key management and i need a good book that discusses key management in details, thanks for your help.

Member Avatar for brayan
1
149
Member Avatar for happygeek

File under FAIL: social network widget maker RockYou has fallen victim to a SQL injection flaw and as a result some 32.6 million users are being urged to change their passwords as a matter of urgency. Security specialists Imperva discovered the problem at social networking development site Rockyou.com and issued …

Member Avatar for Alex_
1
830
Member Avatar for AnonymousHoward

Last month, a [URL="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555"]vulnerability in SSL and TLS[/URL] was announced. Almost immediately thereafter, it was [URL="http://www.securityfocus.com/news/11564"]successfully exploited to obtain Twitter account passwords[/URL]. The vulnerability affects most existing implementations of SSL 3.x and TLS 1.x in existing https web servers and browsers, but also in other servers that use SSL, such …

0
157
Member Avatar for newsguy

Thought that 2009 was [URL="http://www.daniweb.com/news/post975935.html"]the year that botnets died[/URL], well think again Batman, it was actually the year they bounced back. Compromised computers were responsible for distributing 83.4% of the 107 billion spam messages sent around the world, every single day, during 2009 according to a new Symantec report. Indeed, …

Member Avatar for AnonymousHoward
3
1K
Member Avatar for happygeek

Still using Adobe Acrobat or Adobe Reader? Maybe it is time to switch to something that's not glowing red on the bad guy radar, or which is more securely coded depending upon how you look at these things. Yes, Adobe has admitted that there is yet another possible zero-day vulnerability …

0
375
Member Avatar for Clawsy

Hello, I built a chat application that uses sockets and TCP/IP protocol. The client is an applet. The problem is I cannot connect the applet client with the desktop server application. [I]If I run the applet inside the applet viewer in NetBeans it works perfectly[/I]. I even tried the applet …

Member Avatar for Phaelax
0
153
Member Avatar for slfisher

The Electronic Frontier Foundation has [URL="http://www.eff.org/files/filenode/social_network/social_networking_FOIA_complaint_final.pdf"]filed suit[/URL] against a number of government agencies for refusing to disclose their policies for using social networking sites for investigations, data-collection, and surveillance. The EFF is working with the Samuelson Law, Technology, and Public Policy Clinic at the University of California, Berkeley, School of …

Member Avatar for InsightsDigital
0
228
Member Avatar for kotten2

With the reality of software security vulnerabilities coming into sharp focus over the past few years, businesses are wrestling with the additional risk that poor security introduces. And while the risk is becoming clearer, methods to defend applications from attack remain murky. Further clouding the picture, the responsibility for application …

0
333
Member Avatar for GuyClapperton

Smaller businesses and people who use Hotmail as n email system or backup email system need to change their passwords - Microsoft has confirmed it's investigating a security breach. It seems that in spite of the industrial strength security everybody of any size applies to these systems - and let's …

Member Avatar for billflisk
0
233
Member Avatar for jessec

Hi, I'm not sure if this is the right place for it. I'm thinking of creating a secure place on the internet. Some of my presumptions are: 1 - That no system/network is to be trusted. 2 - Important data should be encrypted. 3 - The link between data and …

Member Avatar for jessec
0
111
Member Avatar for happygeek

According to a new survey of London taxi drivers, an average of 10,000 mobile phones are left behind by customers every single month. If that total is not staggeringly high enough, you can top it up with another 1000 iPods and memory sticks if you like. December is the worse …

Member Avatar for taxifinder
0
374
Member Avatar for Voulnet

Hello all, I am a Computer Engineer, fresh off graduation, and I would like to educate myself on a broad range of technological fields and aspects. I am the kind of person who is easily distracted while reading from a screen, and so I would like to ask fellow daniweb …

Member Avatar for Voulnet
2
195
Member Avatar for hapizi84

I Found a problem on my site and when i compare the files on the server with my local files i found that every page (*.js or *.php) has this line on it <?php /**/eval(base64_decode('aWYoZnVuY3Rpb25fZXhpc3RzKC or a javascript line so i knew that my site has been hacked.. so 1 …

Member Avatar for glycerine
0
270
Member Avatar for slfisher

Here's a switch. Instead of newspapers trying to protect the identities of the people posting to their websites, the newspaper is the one outing them. As [URL="http://www.stltoday.com/blogzone/the-editors-desk/the-editors-desk/2009/11/post-a-vulgar-comment-while-youre-at-work-lose-your-job/"]described[/URL] by editor Kurt Greenbaum of the [I]St. Louis Post-Dispatch[/I], someone posted a vulgar word in the paper's online commenting system, and re-posted it …

Member Avatar for prep
1
385
Member Avatar for happygeek

[URL="http://www.checkpoint.com"]Check Point Software Technologies[/URL], developers of the ZoneAlarm security range, has announced the results of research which suggest that half of all staff will happily walk away from employment with competitive information about your business in their pockets. That they are walking straight into another job with it should be …

Member Avatar for Gilette
0
324
Member Avatar for Michael_Knight

The Internet has shown that reputations are important but don't have to be tied to specific real individuals. The entire banking system is built on top of the idea of reputation, but tries hard to tie them to real identities. The problem of identity theft is likely to break this …

Member Avatar for iwallet
0
238
Member Avatar for khess

At my last, best count, there were over 550 individual Linux distributions. From the most generic, flat installs of the most common distros to ultra-specialized, multimedia-oriented to the eye-popping, fancy ones--they're all there for the taking. I found ten distributions from among the 500 or so that I know about …

Member Avatar for azenva
4
2K
Member Avatar for happygeek

I just had a Jaws moment. You know, you think it is safe to go back in the water and then a bloody great shark bites your legs off. Except in this case you can replace the sea with the Internet and the shark with the [URL="http://www.daniweb.com/blogs/entry4339.html"]equally dangerous Gumblar[/URL]. According …

0
445
Member Avatar for Ying_Yang

I'm thinking of something to create to improve computer's classic software, maybe a higher level programming language than the actual, or a smarter OS, or maybe make expert systems improve with AI, etc ... On the other hand, Computers nowadays can be very helpful, but also can be used to …

Member Avatar for Ying_Yang
0
219
Member Avatar for happygeek

Over the weekend news broke that a worm had started infecting Jailbroken iPhones in Australia. Nobody really took the exploit too seriously as all the 'ikee worm' did was change the phone wallpaper to a picture of 80's pop singer Rick Astley in a kind of warped tribute to the …

Member Avatar for kurtharriger
2
2K
Member Avatar for happygeek

Botnets are, without any shadow of a doubt, one of the [URL="http://www.itpro.co.uk/blogs/daveyw/2009/09/30/death-taxes-and-botnets/"]biggest scourges[/URL] of IT security today. From sending spam to [URL="http://www.daniweb.com/news/story238033.html"]launching DDoS attacks[/URL] and distributing malware, botnets can be found [URL="http://www.daniweb.com/blogs/showentry.php?entryid=1021"]at the centre[/URL] of most of the security problems facing computer users right now. So wouldn't it be fun …

2
866
Member Avatar for happygeek

Here in the UK it is pantomime season. A peculiar form of traditional slapstick stage play that is performed during the Christmas season. In essence favourite tales such as Peter Pan, Aladdin, Jack and the Beanstalk and Aladdin are retold with the lead boy played by a girl and an …

Member Avatar for charlesglass
0
222
Member Avatar for newsguy

According to the latest McAfee Labs [URL="http://www.mcafee.com/us/local_content/reports/7315rpt_threat_1009.pdf"]Third Quarter Threats Report 2009[/URL] instances of Distributed Denial of Service attacks are growing in popularity. In the last quarter the McAfee Labs observed many new attacks demanding ransom money including those aimed at sports betting companies which were taken out of action during …

0
794
Member Avatar for capricornious

I am considering how you can give access to support teams (service desk / second line) without allowing them on the server. How do you do it?

0
38

The End.