1,390 Topics
| |
i keep getting these pop up notifications with the red badge and white X on the bottom right of my computer. it won't allow me to open up any websites in Explorer. it also won't allow me to run any of my anti-virus and ad-aware software as if it's blocking … | |
The Obama Administration vows to cut costs in part by using open source software (Software whose source code is made available to the user), cloud computing, virtualization, Linux and other low cost technologies. But, does the use of open source software put the government, its records and our national security … | |
Hi, i am doing a project about key management and i need a good book that discusses key management in details, thanks for your help. | |
File under FAIL: social network widget maker RockYou has fallen victim to a SQL injection flaw and as a result some 32.6 million users are being urged to change their passwords as a matter of urgency. Security specialists Imperva discovered the problem at social networking development site Rockyou.com and issued … | |
Last month, a [URL="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555"]vulnerability in SSL and TLS[/URL] was announced. Almost immediately thereafter, it was [URL="http://www.securityfocus.com/news/11564"]successfully exploited to obtain Twitter account passwords[/URL]. The vulnerability affects most existing implementations of SSL 3.x and TLS 1.x in existing https web servers and browsers, but also in other servers that use SSL, such … | |
Thought that 2009 was [URL="http://www.daniweb.com/news/post975935.html"]the year that botnets died[/URL], well think again Batman, it was actually the year they bounced back. Compromised computers were responsible for distributing 83.4% of the 107 billion spam messages sent around the world, every single day, during 2009 according to a new Symantec report. Indeed, … | |
Still using Adobe Acrobat or Adobe Reader? Maybe it is time to switch to something that's not glowing red on the bad guy radar, or which is more securely coded depending upon how you look at these things. Yes, Adobe has admitted that there is yet another possible zero-day vulnerability … | |
Hello, I built a chat application that uses sockets and TCP/IP protocol. The client is an applet. The problem is I cannot connect the applet client with the desktop server application. [I]If I run the applet inside the applet viewer in NetBeans it works perfectly[/I]. I even tried the applet … | |
The Electronic Frontier Foundation has [URL="http://www.eff.org/files/filenode/social_network/social_networking_FOIA_complaint_final.pdf"]filed suit[/URL] against a number of government agencies for refusing to disclose their policies for using social networking sites for investigations, data-collection, and surveillance. The EFF is working with the Samuelson Law, Technology, and Public Policy Clinic at the University of California, Berkeley, School of … | |
With the reality of software security vulnerabilities coming into sharp focus over the past few years, businesses are wrestling with the additional risk that poor security introduces. And while the risk is becoming clearer, methods to defend applications from attack remain murky. Further clouding the picture, the responsibility for application … | |
Smaller businesses and people who use Hotmail as n email system or backup email system need to change their passwords - Microsoft has confirmed it's investigating a security breach. It seems that in spite of the industrial strength security everybody of any size applies to these systems - and let's … | |
Hi, I'm not sure if this is the right place for it. I'm thinking of creating a secure place on the internet. Some of my presumptions are: 1 - That no system/network is to be trusted. 2 - Important data should be encrypted. 3 - The link between data and … | |
According to a new survey of London taxi drivers, an average of 10,000 mobile phones are left behind by customers every single month. If that total is not staggeringly high enough, you can top it up with another 1000 iPods and memory sticks if you like. December is the worse … | |
Hello all, I am a Computer Engineer, fresh off graduation, and I would like to educate myself on a broad range of technological fields and aspects. I am the kind of person who is easily distracted while reading from a screen, and so I would like to ask fellow daniweb … | |
I Found a problem on my site and when i compare the files on the server with my local files i found that every page (*.js or *.php) has this line on it <?php /**/eval(base64_decode('aWYoZnVuY3Rpb25fZXhpc3RzKC or a javascript line so i knew that my site has been hacked.. so 1 … | |
Here's a switch. Instead of newspapers trying to protect the identities of the people posting to their websites, the newspaper is the one outing them. As [URL="http://www.stltoday.com/blogzone/the-editors-desk/the-editors-desk/2009/11/post-a-vulgar-comment-while-youre-at-work-lose-your-job/"]described[/URL] by editor Kurt Greenbaum of the [I]St. Louis Post-Dispatch[/I], someone posted a vulgar word in the paper's online commenting system, and re-posted it … | |
[URL="http://www.checkpoint.com"]Check Point Software Technologies[/URL], developers of the ZoneAlarm security range, has announced the results of research which suggest that half of all staff will happily walk away from employment with competitive information about your business in their pockets. That they are walking straight into another job with it should be … | |
The Internet has shown that reputations are important but don't have to be tied to specific real individuals. The entire banking system is built on top of the idea of reputation, but tries hard to tie them to real identities. The problem of identity theft is likely to break this … | |
At my last, best count, there were over 550 individual Linux distributions. From the most generic, flat installs of the most common distros to ultra-specialized, multimedia-oriented to the eye-popping, fancy ones--they're all there for the taking. I found ten distributions from among the 500 or so that I know about … | |
I just had a Jaws moment. You know, you think it is safe to go back in the water and then a bloody great shark bites your legs off. Except in this case you can replace the sea with the Internet and the shark with the [URL="http://www.daniweb.com/blogs/entry4339.html"]equally dangerous Gumblar[/URL]. According … | |
I'm thinking of something to create to improve computer's classic software, maybe a higher level programming language than the actual, or a smarter OS, or maybe make expert systems improve with AI, etc ... On the other hand, Computers nowadays can be very helpful, but also can be used to … | |
Over the weekend news broke that a worm had started infecting Jailbroken iPhones in Australia. Nobody really took the exploit too seriously as all the 'ikee worm' did was change the phone wallpaper to a picture of 80's pop singer Rick Astley in a kind of warped tribute to the … | |
Botnets are, without any shadow of a doubt, one of the [URL="http://www.itpro.co.uk/blogs/daveyw/2009/09/30/death-taxes-and-botnets/"]biggest scourges[/URL] of IT security today. From sending spam to [URL="http://www.daniweb.com/news/story238033.html"]launching DDoS attacks[/URL] and distributing malware, botnets can be found [URL="http://www.daniweb.com/blogs/showentry.php?entryid=1021"]at the centre[/URL] of most of the security problems facing computer users right now. So wouldn't it be fun … | |
Here in the UK it is pantomime season. A peculiar form of traditional slapstick stage play that is performed during the Christmas season. In essence favourite tales such as Peter Pan, Aladdin, Jack and the Beanstalk and Aladdin are retold with the lead boy played by a girl and an … | |
According to the latest McAfee Labs [URL="http://www.mcafee.com/us/local_content/reports/7315rpt_threat_1009.pdf"]Third Quarter Threats Report 2009[/URL] instances of Distributed Denial of Service attacks are growing in popularity. In the last quarter the McAfee Labs observed many new attacks demanding ransom money including those aimed at sports betting companies which were taken out of action during … | |
I am considering how you can give access to support teams (service desk / second line) without allowing them on the server. How do you do it? | |
[I]"If we went into an “evil room” and had an “evil light” shined on us, and we then behaved in an “evil” way we would be destroyed… there is a fundamental trust between Google and its users.” ~Eric Schmidt, Google CEO [/I] Google released an exciting new product today called … | |
Microsoft on Tuesday is set to release six security updates, three of which it has deemed critical and apply only to versions of Windows other than Windows 7. Microsoft released advance notice of its [url=http://www.microsoft.com/technet/security/Bulletin/MS09-nov.mspx]Security Bulletin for November[/url], on Nov. 5. The bulletin itself will be released on Tuesday along … | |
Hi, I am quite new to the world of computers and am looking for some advice. I have a Server which is networked to 5 other machines. On this server we have private databases etc and i would like to password specific folders or indeed the whole hard drive of … | |
If you're yearning to break free from Apple-sanctioned iPhone carrier AT&T (and you don't mind trading your warranty for the privilege), then reach out and touch George Hotz. The iPhone hacker yesterday posted a [url=http://www.youtube.com/watch?v=g23e9e9zOVI&feature=player_embedded]video showing an iPhone call on T-Mobile[/url], and Wednesday is expected to post the code that … |
The End.