1,394 Topics
![]() | |
News has broken this weekend that the personal data, including bank account details, of some 2.4 million customers of the Carphone Warehouse may have been compromised following a breach that the mobile phone retail giant is calling "a sophisticated cyber-attack." The company also warns that encrypted credit card data of … | |
hi:) can you help me on my project .. what features can add on a security system ? | |
[CODE]using System; using System.Security.Cryptography; using System.Text; public static class Encryption { public static string Encrypt(string input, string key) { byte[] inputArray = UTF8Encoding.UTF8.GetBytes(input); TripleDESCryptoServiceProvider tripleDES = new TripleDESCryptoServiceProvider(); tripleDES.Key = UTF8Encoding.UTF8.GetBytes(key); tripleDES.Mode = CipherMode.ECB; tripleDES.Padding = PaddingMode.PKCS7; ICryptoTransform cTransform = tripleDES.CreateEncryptor(); byte[] resultArray = cTransform.TransformFinalBlock(inputArray, 0, inputArray.Length); tripleDES.Clear(); return Convert.ToBase64String(resultArray, … | |
I am trying to access a site that displays a camera monitoring my granddaughter's daycare. I have installed the latest version of Java on my Mac running Lion. I have added an exception for the website to the security settings for Java but it continues to block my access to … | |
Hello i want to know how create form signup php&mysql And how security form for inpot with insert data in database 1- firstname 2- lastname 3 -password 4- ُEmail ![]() | |
hi i'm struggling to read data from database i created a table with 5 rows as for Login form username and password i would like to have access to forms when i enter password and username of department 1 it shows department 1 but when i enter password and username … | |
Hi Dw. I know how to kill or stop a process using VB.NET. But how about temporary blocking a process from performing a task? Suppose I have a docx file located at "D:\test\" and I happen to open this file and modify it either by adding something or delete some … | |
Sanjib Mitra is a man who likes to be responsible and do the right thing. A year ago he discovered, quite by accident, that a little bit of URL tweaking could reveal personal data about people other than himself within a website database. He was completing a complicated application form … | |
hi programming masters! i need your help..how can i SEARCH a record in a database and display the results?? example: if i type an ID number or a name on the text box and click the search button it will look for the records and display it.. i have a … | |
I am working on adding security onto my contact form and I can't seem to find the reason as to why I get errors. Currently, when I test the php form, I get this error: Parse error: syntax error, unexpected T_IF in /home/content/86/5284386/html/websitenamewashere/contact.php on line 16 Here is my php: … | |
As [news breaks](http://www.usatoday.com/story/tech/2015/06/12/office-of-personnel-management-hack-china/71146452/) that a second breach at the federal Office of Personnel Management may have seen another set of data, potentially more valuable than that accessed during [the first](http://arstechnica.com/security/2015/06/why-the-biggest-government-hack-ever-got-past-opm-dhs-and-nsa/), Philip Lieberman, President of privileged identity management specialists [Lieberman Software](http://www.liebsoft.com/), has been talking about what went wrong. Here's what he … | |
Hi, I've been having some issues with my server that at times it runs the application smoothly but lately there has been some irregularities in the performance. We run the server on Rackspace but they are telling us that the problem is in our end. Our site is running on … | |
Hi All, Iam new to this forum, I learnt the magento basics,i want to create a shopping cart website using magento for selling old product, where and how to start like 1.how to integrate SEO 2.what payment methods should use and how to integrate them 3.what is SSL certificate,should i … | |
Action video camera vendor GoPro has announced that it is riding into the Tour de France with a promotional [video](https://www.youtube.com/watch?v=X63m5r5jJlg) to celebrate being named the official camera of the world's largest annual sporting event with a worldwide television audience of some 4 billion people, but not before the BBC [reported](http://www.bbc.co.uk/news/technology-32934083) … | |
OK, All I find all over the web is that this can't be done... What I am looking for is a functional alternative. I have a form that a client fills out with their information for a withdrawal When they finish filling out the form and submit it, I do … | |
A couple of decades ago, in another life, I wrote a little script which would capture keystrokes and then store that data within the 'white space' of an image file. It was pretty crude, but it was also twenty years ago and to be honest nobody was really looking for … | |
Earlier this month, security outfit FireEye’s 'FireEye as a Service' researchers out in Singapore [discovered and reported](https://www.fireeye.com/blog/threat-research/2015/06/operation-clandestine-wolf-adobe-flash-zero-day.html) on a phishing campaign that was found to be exploiting a zero-day in Adobe Flash Player vulnerability (CVE-2015-3113). That campaign has been well and truly active for a while now, with attacking emails … ![]() | |
The Electronic Frontier Foundation (EFF) has released the latest version of its 'Who Has Your Back?' [report](https://www.eff.org/who-has-your-back-government-data-requests-2015) and accompanying infographic, and it makes for interesting reading. Once you appreciate that what the EFF is talking about here is how good, measured as a response to a handful of yes or … | |
When East Germany fell apart, one of the first things people there did was to storm the buildings that housed the much hated Stasi (Ministry for State Security), the ministry that was in charge of spying on their own population. How important is privacy to you? | |
Speaking to TrustedReviews this week, Alexander Moiseev, Kaspersky Europe's Managing Director, has warned that your car is at serious risk of being hacked. He is, however, wrong and I'm going to explain why.  Kaspersky Lab and Mr Moiseev may well insist that the threats to the automotive industry … | |
It's been a year now since the Dyre malware family was first profiled, and there is no sign of infection rates slowing down. In fact, [reports](http://www.scmagazine.com/trend-micro-documents-new-malware-infections/article/418266/) would seem to suggest just the opposite with infections up from 4,000 at the end of last year to 9,000 at the start of … | |
Werner Vogel, Amazon Web Services (AWS) CTO, speaking at the AWS Summit in London yesterday has made the rather amazing claim that security in the cloud is "much stronger" than anything you can have on-premises. As someone who has been writing about information security for more than 20 years, and … | |
Researchers at security company AppRiver have issued a [warning](http://blog.appriver.com/2015/06/amazon-based-malware-targets-crypto-currency/) regarding a variant of the Fareit malware family which is using fake Amazon purchase confirmation emails to inject itself and steal any type of crypto currency that can be found on the target machine.  Troy Gill, manager of security … | |
I have two modules built by two developers: 1) backoffice 2) reporting However they share a single connection. The problem now is the security aspect. Both modules are independent in their respective folder(s) but they share the same connection. A developer mention that with the current architecture it is impossible … | |
Actually, i protected my files in pendrive using usb security kakasoft but now it hidden in a bad way and i am not able to get them back.I scanned with antivirus makeing sure it is hidden and file is in pendrive.Now how to recover it?You can see scan log screenshot … | |
Hello, We had an EV SSL certificate added to our website but now looking at the GWT Analytics, our search traffic has flat lined (litteraly!). From the day it was installed, the graph bounces down, then literally flat lines. Also, is there anything we need to do in our GWT … | |
With windows server 2003 losing support in the coming weeks we have upgraded our 2003 servers to virtualized 2008 servers. The only problem we are having at the moment is with Group Policy and mapping drives. Previous to this upgrade we used a logon.vbs which "worked" but was nearing 10 … | |
Another month, another flaw related to the historical US export restrictions on cryptography; this time in the form of LogJam. It hits SSL 3.0 and TLS 1.0 which supported reduced-strength DHE_EXPORT ciphersuites, restricted to primes no longer than 512 bits, meaning that a man-in-the-middle attack is possible to force the … | |
I don't trust my code. I really don't. I always have a feeling that something is wrong with it. Every variable looks like an enemy. Every loop, unfinished condition. Every input, possible injection. I'm kinda paranoid so to say. There's many white hat hackers out there which could make buck … | |
While keen to point out that Microsoft's TechNet portal security was "in no way compromised" by the tactic, researchers with security outfit FireEye [discovered](https://www.fireeye.com/blog/threat-research/2015/05/hiding_in_plain_sigh.html) that [a well established China-based hacking campaign called Deputy Dog](https://www.fireeye.com/blog/threat-research/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html) had managed to create profiles and posts on TechNet that contained embedded Command and Control codes … |
The End.