954 Topics
Hi Guys, Before selling my laptop, I want to securely wipe all data so it can’t be recovered. Deleting files or formatting the drive isn’t enough for security. I’ve read that SysTools Data Wipe Software can erase data permanently, but I’m open to other recommendations. What’s the best way to …
Control strings can be considered as an alternative to asymmetric encryption. **Unlike solutions that use public and private secret keys, here, session cryptographic protocols are exchanged implicitly.** In practice, a control string allows both parties (*sender and recipient*) to independently generate a symmetric set of cryptographic primitives (*encryption algorithm, encryption …
Just as the title states, do non-web based email clients (e.g. Microsoft Outlook) respect CSP HTTP headers? Specifically, I want to prevent hotlinking of images hosted on my domain within HTML emails with these HTTP headers: Cross-Origin-Resource-Policy: same-origin Vary: Origin
I want to prevent cross-site scripting attacks in web applications I make. If someone could provide me with some suggestions and advice, it would be really helpful.
In the dynamic and ever-evolving landscape of cryptocurrency, where virtual fortunes are created and exchanged in the blink of an eye, the significance of security cannot be overstated. As the digital realm intertwines with the financial world, the need to protect digital wealth from potential threats and vulnerabilities becomes an …
Hello Php Programmers, I want to open iframes, more than one, to some of my webpages from other webpages. What do I need to be careful off so no crook injects anything malicious on my site or on my visitors' clientsides ? Q1. Which of these attributes, mentioned in the …
Sometimes we want to know if the webpage was fetched over an SSL connection (e.g. the URL begins with https:// instead of http://). This way, if an end-user is accessing an insecure version of our site, we can redirect them to the secure version. The following PHP function called `no_ssl()` …
What are the main core technologies of the openGauss database?For example, availability (RPO / RTO), performance (TPS / QPS), DB4AI / AI4DB, etc.In addition, under the development trend of cloud development, how to ensure its security?
I'd like to improve security of my website. Currently, the download filename is passed to the download script. The filenames are stored in a database table with an index number (primary key). I'd like to pass that index number to the download script instead of the filename and do a …
Hello guys, Recently my site was infected with malware, which caused me a lot of problems. In particular, many spam links have been created and indexed. I managed to get a lot out of them with Google search console, but it still appears in some key searches. Is there any …
We have a two small office locations with a total of 4 computers. We are looking for a way to make some security changes in the office in an inexpensive way. What we would like to do is: - Allow only the chrome brower to be active - restrict browsing …
I want to protect my site from hacking. Currently I know about XSS and SQL injection. Do I need to use mysqli instead of mysql? And why? When should I use `htmlentities()` and `striptags()`? I also don't want users to upload melicious files and since I accept file uploading, is …
Got Android? Then you had better be on top of your security smarts. With Android cornering more than 80 per cent of the mobile operating system market, it's no surprise that Android devices are the number one target for the mobile malware merchants. Kaspersky Lab reckoned that Android malware attacks …
So, the [VeraCode 2017 DevSecOps Global Skills Survey](https://info.veracode.com/analyst-report-devsecops-global-skill-survey.html) recently found that software developers are not receiving the training they need to be successful as DevOps. Some of the numbers that caught my attention included 70 percent stating they don't think the 'security education' they have got is adequate for the …
I have a IIS 7 web server that connects to a database. The server is accessible to the public. I am afraid that the database might be compromised. In this respect What security aspects do I need to pay attention to ? What do I need to harden this web …
I would like to create token based authentification login system with pure PHP. I have own MVC framework (not laravel or anythink else). Who can help me what to do step by step. Thanks in advance
Programming Buddies, Looking at the following links, can you be kind enough to tell me which one I should learn from and which one teaches what method (mysqli, pdo, etc.) and whether they are on php 7 or 5 because only looking for php 7: https://daveismyname.blog/blog/login-and-registration-system-with-php https://www.codeproject.com/articles/759094/step-by-step-php-tutorials-for-beginners-creating http://buildinternet.com/2009/12/creating-your-first-php-application-part-1 And, is …
HI, I have attempted to put a login page on to my web page that i am developing as a learnig curve. I am almost there i think, i have created a table in my database that stores the username and passwords and i have a php script that i …
Hi, I am a developer. I have been searching for best suited web development forums which provide helpful information on web development, so that I can get help from their active members for learning the Captcha Implementation with Javascript which is used to protect the website from the attack and …
Hello i have a question about the security of my website, does my website can get hacked somehow if im updating it directly from my database? (ex. images, posts, links...). I have few pages on my website which have PHP code to read info from the database and i do …
I get this error when ever i try to upload a file. Automatically populating $HTTP_RAW_POST_DATA is deprecated and will be removed in a future version. To avoid this warning set 'always_populate_raw_post_data' to '-1' in php.ini and use the php://input stream instead. in Unknown on line 0 Does anybody knows what …
It gives me always `Invalid Username or Password` what is the problem with this code ? <form action="admin_login.php" method="POST"> <div class="form-group" style="width: 280px;"> <label for="usr">Username</label> <input type="text" class="form-control" name="userbox" id="user"> <br> <label for="pass">Password</label> <input type="password" class="form-control" name="passbox" id="pass"> <br> <button type="submit" name="login" class="btn btn-success">Log In</button> </div> <?php if(isset($_POST["login"])) { $user …
Hello. I have an issue, where I want to prevent domain users with administrative rights from modifying the password of the local administrator account on their respective computers. Any way of implementing this?
**What is the best way to build a simple & clear web based Suppliers database/list for my Design agency?** Has to: -Be accessable by all my collegue's (20) by webbrowser (Security/account issue?) - Have 'Input Supplier' & 'Search Supplier' Function - Provide multiple categories : Name, Website, Email, Function, Categorie …
I downloaded AVG Anti-Virus Free Edition on a computer that runs Windows 98 and uses a slow dial-up connection. When I went to install AVG an "Expired Download" box appeared, advising me to download the latest version. I ignored this and installed my AVG download 7.5.503. Everything went fine. But …
i am designing an app. The first stage is to allow the user to select a username and password. The system stores it and uses it as an authentication during login. my question is: do i use a fucntion or an array to capture the login info for the first …
Ok , i just have doubt and need suggestions for this.I have multistep form.What i am doing now that i am saving step-1 and step-2 data in session and in the last when user clicks on register all data saved in sessions will passed to database and inserted there.Now i …
There are rumors that iPhone 5S or iPhone 6 (whatever it will be called) will be introduced in a number of colors, with big size, excellent 12 MP camera, thumb impression detection for security and will be a bit bigger in size. What will be your favourite feature among these …
https://www.humankode.com/security/how-a-bug-in-visual-studio-2015-exposed-my-source-code-on-github-and-cost-me-6500-in-a-few-hours
How are keys and passwords stored in a computer to make them secure? If encryption is used to secure keys and passwords - won't there need to be a key or password for it also? Will that one be encrypted as well? It seems to me that eventually there will …
I have two servers in different locations (not within the same LAN). Both have a WCF client and WCF server. The WCF client on one server connects to the WCF server on the other, and v.v. What would be the best way to secure this communication, other than using SSL …
Hey guys, just heads up to change your passwords!, here is the story on the hacker news [Link](http://thehackernews.com/2014/10/nearly-7-million-dropbox-account.html)
I think some of you have come across these articles: http://blog.nexcess.net/2014/07/25/recent-exploit-using-fake-magento-extensions/ http://www.thewhir.com/web-hosting-news/nexcess-uncovers-magento-exploit-allows-hackers-skim-credit-card-data-checkout They talk about a Magento exploit that allows hackers to skim credit card data during checkout. Although the articles were published 2 months ago, it’s surprising that there are still a lot of websites using Magento affected by …
I'm trying to ban a user from logging in to a site after 3 failed attempts. Code: <?php require 'konek/dbcon.php'; if (isset($_POST['login'])) { session_start(); //$link = mysqli_connect('localhost', 'root', '','abra') or die("Could not connect database"); if (empty($_POST['uname']) || empty($_POST['passw'])) { header ('Location: login.php'); die(); } if (ctype_upper($_POST['uname']) || ctype_upper($_POST['passw'])) { header …
.I am working as a PHP software developer in Bangalore.I am new to the PHP language.I have some doubts.please clarify me. 1. IN PHP what are the things we want to concentrate On Web Application development. 2. What are the security issues are their?. 3. What is sql Injection?how to …
i have an issue, my code works wonderfully for the pupose its designed for however for security reasons i need th epages page my login page to have either randomized links or just links that cannot be bookmakred too so that one can bypass the login page. My login page …
Hello ! I have a problem ! I'm starting a comment system for my website. The problem is: I want to use an HTML editor, but is not fully necesary. My problem is with the security. How to secure the user input that i save in database? Because i show …
Hello, I install xampp in my web server that is using Windows Server for OS. And now my problem is how to make my web server ip address accessable through my private and public network and keep it secure and the same time. I already try add xampp to the …
Detect keyloggers and delete Keyloggers used code : GetAsyncKeyState function
Hi guys, I'll try to be as brief as possible. I have purchased a login script and I've pulled it apart. It all works nicely except for this one thing. The user logs in with their email address, and there is a forgot password page so that the user can …
I've just started using the PayPal classic API for a simple payment solution. The API obviously requires my paypal account credentials so visitors to the site can make payments into my account. My account credentails (username, password, signature key) are stored on the server in a simple configuration file. What …
can anyone how to disable process such as explorer.exe at startup windows7 until i was true entering password? i want make log in display as my style.. thanks before.
Hello. I have a two problems with my Regsystem. 1st. **Warning: Cannot modify header information - headers already sent by (output started at C:\xampp\htdocs\mycms\reg.php:229) in C:\xampp\htdocs\mycms\reg.php on line 266** 2nd: When i Register a user - system message "Username already exist" not "Registration succesfull".. this is the code of register.php …
I am about to begin protecting a yet to be launched site againt injection attacks.(And other possible attacks) I am making use of a large database and must fortify this fully. I am researching this but am here to pose the question: **What should my main concerns be**? Please be …
Greetings, I need to know about the cloud computing tech. especially the private cloud computing security and I need some help even with books URLs
Hello Community, I've been wondering if an SFTP connection would be worth it?
Do you want to scan your website to find all the Vulnerabilities at your web site try netsparker :)
The End.