1,159 Topics

Member Avatar for
Member Avatar for Bam_391

In today's digital age, businesses rely heavily on customer data to enhance their operations, personalize experiences, and drive growth. However, the increasing importance of customer data brings along significant cybersecurity challenges. Protecting this data is not only a legal and ethical obligation but also crucial for maintaining customer trust and …

Member Avatar for WilliamOG
1
126
Member Avatar for happygeek

A VPN, or Virtual Private Network to be formal, is a method of creating an encrypted data tunnel across the Internet from your device to a destination server. Although savvy home users and enterprises will operate their own VPNs (business-grade routers provide this functionality) for most folk, a VPN comes …

Member Avatar for Liam91
6
2K
Member Avatar for Ahsan_38

Encrypt Sensitive Data: Use encryption to protect sensitive business data, both at rest and in transit, to prevent unauthorized access.

Member Avatar for Dani
-2
40
Member Avatar for Johannes C.

**As quantum computing slowly edges closer to disrupting encryption standards, governments are imposing export bans with peculiar undertones. This article explores the reasons behind these restrictions, the basics of quantum computing, and why we need quantum-resistant encryption to secure our digital future. ** ![quantum-end-to-encryption.jpg](https://static.daniweb.com/attachments/4/085ad9800754573666c8e40f1272bd2b.jpg) ## Nations Putting Export Bans on …

0
97
Member Avatar for premdparmar

I'm facing an SSL-related issue in Firefox with the 'SSL_ERROR_NO_CYPHER_OVERLAP' error. It seems there's a problem with encryption algorithms between the browser and the server, hindering the establishment of a secure connection. Any guidance or solutions would be appreciated.

Member Avatar for Dani
1
171
Member Avatar for baig772

I am trying to implement multi authentication in `laravel5.2`. I am following [this article](http://saravanan.tomrain.com/multiauth-in-laravel-5-0/) My **Auth.php** <?php return [ 'multi' => array( 'user' => array( 'driver' => 'eloquent', 'model' => 'App\User', 'table' => 'users', ), 'admin' => array( 'driver' => 'database', 'model' => 'App\Admin', 'table' => 'tbl_admin_user', ) ), 'password' …

Member Avatar for tracyberge
0
624
Member Avatar for Initsky

When choosing the best SMTP (Simple Mail Transfer Protocol) server service provider, consider the following factors. First, reliability and uptime are crucial, ensuring your emails are delivered consistently. Look for providers with a track record of high availability. Second, scalability is important to accommodate your growing email volume. Third, check …

-2
12
Member Avatar for Mindmade

Hi Guyz, Why is Include high-grade encryption and a reliable SSL in your list of mobile app development security practices is important?

Member Avatar for rproffitt
-1
14
Member Avatar for Initsky

An exceptional SMTP (Simple Mail Transfer Protocol) server is crucial for efficient email communication. Here are the top 10 essential features of such a server: Reliability: An exceptional SMTP server must be highly reliable, ensuring that emails are delivered promptly and without loss. Security: Robust security measures, including encryption and …

Member Avatar for redplanetpk
-2
37
Member Avatar for Initsky

There are several factors to consider when choosing a reliable SMTP server with responsive performance and exceptional customer support. Here are some of the most important ones: Reliability: The SMTP server you choose should be highly reliable and able to handle large volumes of email traffic without experiencing downtime or …

0
21
Member Avatar for Destini_1

Wv4gJyLguPzuClVexggQO6r0uLUNI3mMtwXH8yG9wd)jSMjXNbSLrrxUsN39DwmtjRlthSS24axWyEZYFk2u7EJnp2tKyB2CASYri6)rui)9iJidseE6phmADVAJKeCmZZq)vB)ybdnT3Ji5kGafyYuazcv9zim33k

Member Avatar for hes8
0
119
Member Avatar for micjustin33

Before going on to tell how to get DD-WRT secured with VPN, it is important to determine whether your router is compatible with DD-WRT or not. Most commonly used wireless routers including Linksys, Cisco, D-Link, Verizon, Sitecom and TP-Link are DD-WRT compatible. Check out whether your router’s name appears in …

Member Avatar for markanderson_1
1
377
Member Avatar for NewAccount

Hello everyone, I wrote data arrays at the end of the exe with delimiter. After I compiled, the app it didn't work on Chinese Windows, only on English, I want to configure the app to work on Chinese windows as well, I know it will work if I change the …

Member Avatar for rproffitt
1
295
Member Avatar for happygeek

So you've lost access to your data through hardware failure or accidental erasure. What do you do? Like most cyber-warriors you naturally turn to the Internet, be that via a Google search or YouTube video, for help. That's a big mistake says [Kroll Ontrack](https://www.krollontrack.co.uk/blog/), a data recovery specialist, as self-inflicted …

Member Avatar for UnaSutherlands
2
2K
Member Avatar for Steven_40

I am recently joined an innstitute to learn ethical hacking from scratch and i am using Parrot os to learn hacking. IS is it good enough as compared to kali linux or shall I continue with parrot os only?

Member Avatar for Steven_40
0
205
Member Avatar for Scott_22
Member Avatar for MagnusTheRed90

Hello, so I have a more complex class in another file, but I have duplicated my trouble on a simpler class which I will show to you. I am trying to base64 encode a path via cipher text, either a good idea or a bad idea. Anyway, I am noticing …

Member Avatar for JamesCherrill
0
95
Member Avatar for Athar_3

Create a Client/Server using DatagramSocket and DatagramPacket Programming and using DiffieHellman (1024) as encryption algorithm.

Member Avatar for rproffitt
0
46
Member Avatar for tinstaafl

Basically this scheme uses variable offsets, but it generates the bytes on the fly. They aren't truly random, but there aren't any obvious patterns and the output passes all the NIST tests. Since a simple password can be used to do the de/encryption it is much easier to hand off …

Member Avatar for JamesCherrill
2
330
Member Avatar for dltang1999
Member Avatar for Mr.M

Hi DW. Well I'm very much interested in the data protection and also giving the best privacy to the public where we protect your passwords. I've seen something that Firefox had introduced to their browsers with also their Apps. This is called LockWise which is a tool to sync your …

0
1K
Member Avatar for Zac18

In this modern and complex World Wide Web, a well planned SEO strategy is essential. An appropriate digital marketing strategy can help you to establish your reach to your targeted audience and exploit the untapped market. Google algorithms are improving and advancing with each passing day which means that a …

Member Avatar for Dani
-1
375
Member Avatar for sandeepaspari

Technology is evolving every single day, and both the Software and hardware are striking towards each other. Due to the massive competition, it is essential to come up with extended mobility and future rich apps for expanding and promoting businesses to stay long in this competitive business market. Some of …

Member Avatar for Hendrick1987
1
3K
Member Avatar for Aina_1

Hi. Im doing a login form with decryption. So i did a modification to my login code for decryption. Before i did the decryption, the login form is functioning well. But after i edit it to insert decryption code it suddenly cannot connect to database. Im still a begginer in …

Member Avatar for tinstaafl
1
1K
Member Avatar for Dani

It is with deep regret that I inform everyone that it just very recently came to my attention that the DaniWeb database was breached in December 2015. Over a million user profiles, including email addresses and IP addresses, were stolen. Logins and passwords were protected through an additional security layer …

Member Avatar for Alexander_17
3
4K
Member Avatar for JustinRunyon

Hello, have the following program code: #include <stdio.h> #include <stdlib.h> #include <ctype.h> int main (void) { char c; while( (c = getchar()) != '\n') { putchar(c); } putchar ('\n'); return EXIT_SUCCESS; } At the moment he reads in entered characters and outputs them again. I should [write](https://prowritingservice.com/write-my-essay/) it so that …

Member Avatar for nullptr
0
251
Member Avatar for JModak

I create a project encrypt and decrypt data in vb.net how to use this code as a function please help it is work only on a textbox i want to send a string value then return encrypt value and when i send encrypt value then send me decrypt value. [Click …

Member Avatar for rproffitt
0
567
Member Avatar for Zohre_1

Hello I'm try to use a hardware to create key for encryption in mobile devices( in a model at first) this is my question: can i get my keys from TPM? If is it possible, how can i do it?

Member Avatar for Zohre_1
0
643
Member Avatar for UK-1991

Hello, just created a code for login using encrypted password method when user is registering at that time i made a passsword encryption script. But the main problem is that when it comes to verify login how do i veryfy the password as that password is saved as encrypted password …

Member Avatar for tejpal_3
0
2K
Member Avatar for overwraith

The following is the correct way to do encryption. I thought it useful to post for various reasons, most particular being the necessity for our companies to have good security controls. This is very important. If anybody has any other good snippets feel free to post. The user class is …

Member Avatar for overwraith
0
466
Member Avatar for Jon_7

I'm trying to just do something fun for the kids in my class. I want to give the top students a USB Drive as a prize that has a link to a whole bunch of fun learning tools. To make that special, I want to be sure the website can't …

Member Avatar for Jon_7
0
740
Member Avatar for abhijeet P

Hello all, I have a code to encrypt data in C# and I want it to b decrypted in Java... following is the C# code [CODE]string Encrypt(string textToEncrypt, string key) { RijndaelManaged rijndaelCipher = new RijndaelManaged(); rijndaelCipher.Mode = CipherMode.CBC; rijndaelCipher.Padding = PaddingMode.PKCS7; rijndaelCipher.KeySize = 0x80; rijndaelCipher.BlockSize = 0x80; byte[] pwdBytes …

Member Avatar for JamesCherrill
0
9K
Member Avatar for nadiam

Hello. I found this packet sniffer code that uses the pycap wrapper. Initially, its for live capture but I've changed it to read a .pcap file instead and im trying to understand it but some parts of it i can't i comprehend. could someone explain them to me please? the …

0
466
Member Avatar for Reverend Jim

Does anyone know the function and origin of the wireless profile, bungle4? I've been cleaning up my numerous vbScript files and when I tidied, then tested Metered.vbs, it produced the following: D:\>metered Profiles on interface Wi-Fi: All User Profile : bungle4 All User Profile : mynet Metered.vbs is a script …

Member Avatar for Reverend Jim
0
512
Member Avatar for happygeek

Last year, CryptoLocker ransomware [hit the headlines](http://www.daniweb.com/hardware-and-software/microsoft-windows/viruses-spyware-and-other-nasties/news/470427/cryptolocker-250k-infections-in-100-days-nets-300000-or-does-it) after infecting hundreds of thousands of computers and encrypting the data, and backups of that data to any connected device, with the promise of decryption on payment of a fee. This kind of IT extortion is profitable for the bad guys as it …

Member Avatar for rproffitt
2
971
Member Avatar for happygeek

Generally speaking, when it comes to being as secure as possible (and, just as importantly, staying as secure as possible) newer is better. This is certainly the case if we are talking mobile operating systems such as Android and iOS. As of the start of March 2017, according to [Apple's …

Member Avatar for shujat_2
4
736
Member Avatar for cainam29

I have a code that send an email but how I can prevent it from always sending everytime my page refreshes. function two_dim_array_to_html_table($arr, $colcomments){ $ret = "<table border='1' width='auto' cellpadding='1px' cellspacing='0px' align='center'>\n"; $ret .= "\t<tr>\n"; foreach($arr[0] as $key => $val){ $ret .= "\t\t<th>".$colcomments[$key]."</th>\n"; } $ret .= "\t</tr>\n"; foreach($arr as $row){ …

Member Avatar for urtrivedi
0
1K
Member Avatar for cainam29

While I'm just trying to pull up data from the db, as soon as the page shows up with the data it is already sending an email. How can I prevent it from sending the email right away. What I want to happen is I retrieved data from the db …

Member Avatar for cainam29
0
267
Member Avatar for happygeek

Following the recent ransomware attacks that leveraged the WannaCrypt0r malware and NSA-developed EternalBlue vulnerability exploit, there was [plenty of advice](https://happygeek.com/?p=812) that backup, backup, backup was the best mitigation. Data backups are, of course, an important part of any business continuity strategy. However, what happens when your backups are also encrypted …

Member Avatar for Josh Ross
1
517
Member Avatar for cainam29

I'm just starting to learn PHP and I'm trying to send my table via email. I am receiving the email but the body just says Array. I dont know where to go from here, please help. This is how my table is being displayed, and the send mail function in …

Member Avatar for cainam29
0
1K
Member Avatar for happygeek

What has Schrodinger got to do with the complex and paradoxical concept of quantum computing? The answer is that both Erwin and his hypothetical cat relate directly to this subatomic world. In fact, Schrodinger is often referred to as the father of quantum mechanics. ## Erwin who? ## [Erwin Schrodinger](https://en.wikipedia.org/wiki/Erwin_Schr%C3%B6dinger) …

Member Avatar for dkary555
4
1K
Member Avatar for Thomas_32

I have a lot of simple VBScript files that were encrypted. I have lost the originals. The code still works within the intended platform, but now I need to do some maintenance. I used a free, vendor-supplied utility that compiled the VBS into a plug-in, but I don't know what …

Member Avatar for Reverend Jim
0
521
Member Avatar for soph2602

Hi everyone, tried to send email from localhost using smtp mail function but unable to do so. The error is "Could not instantiate mail function. Mailer Error: Could not instantiate mail function." Appreciate if you could advise how to solve this issue? Thanks. require_once "PHPMailerAutoload.php"; $name = $row['name']; $email=$row['email']; echo …

Member Avatar for cereal
0
6K
Member Avatar for Aob

I am having a trouble not knowing how to do a java code that will take user string then encrypt it using Elgamal algorithm as following Elgamal algorithm Pseudo code: - Select Q where Q is a prime number - Select α where α is a primitive root of Q …

Member Avatar for Aob
0
5K
Member Avatar for happygeek

I've had my hands on what is being described as the 'most secure hard drive ever made' for a while now. Such are the advantages of being a well known reporter on all things security I guess, I get to play ahead of the crowd. As the first journalist to …

Member Avatar for AssertNull
1
805
Member Avatar for iamthwee

I'm beginning to wonder... I hope someone can clarify my doubts. First let me explain. So I've been using codeigniter's session library without much thought. I assumed the code was just some wrapper for PHP native sessions. So I assumed it was stored server side so encryption and all that …

Member Avatar for owlowl076
0
8K
Member Avatar for Sagar_9

Hello All, I'm currently working on a project which requires me to encrypt multiple text files at one go. I am able to retrieve the name of the files through listfiles() but how am i supposed to pass those files to File variable so that the encrypt method can encrypt …

Member Avatar for Sagar_9
0
2K
Member Avatar for usmanabb

Hello Guys, I am working on a Movie Platform and using XML file to upload/Publish Movies on to the platform. So for each Movie title I have to Edit and create an XML which is very time consuming and to be honest stupid. I want your help to suggest me …

Member Avatar for usmanabb
0
414
Member Avatar for Traevel

#Tutorial - Content extraction using Apache Tika From the official website: > The Apache Tika™ toolkit detects and extracts metadata and text from over a thousand different file types (such as PPT, XLS, and PDF). All of these file types can be parsed through a single interface, making Tika useful …

0
511
Member Avatar for Stanley_1

Hi team, Please show me how I can encrypt password and padd it with RSA algorithm. Show in java. Assume key is given.

Member Avatar for JamesCherrill
0
73

The End.