How secure is secure?
Thanks to this group and all the high tech individuals who frequent it I
have learned how to protect my PC from the inside out. But what about
security risks to my info 'before' it gets to my computer? Like my mail
box on the server. Could someone hack into that and thumb through my
If so, how would I ever know?
(The short story)
We have a rogue employee at my work who one day decided to run the web
site, she got in tight with the ISP, got tools to set and delete
passwords on a protected directory on the server. Who knows if she has
telnet access to other things, li...security too secure
Summary: security too secure
The security thing won't let me in this sight no matter how I accept,
confirm, get certificate, etc.
Browser Details: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.4; en-GB; rv:1.9.1b4) Gecko/20090423 Firefox/3.5b4
From URL: http://hendrix.mozilla.org/
Note to readers: Hendrix gives no expectation of a response to this feedback
but if you wish to provide one you must BCC (not CC) the sender for them to
This is a multi-part message in MIME format.
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
I'm a Mac user 10.4.8 of Thunderbird 220.127.116.11 & am wondering how
"Enabling FIPS" will improve my security? I can't seem to find any
explanation of FIPS under Thunderbird help.
Have a good day R Schwager
Content-Type: text/html; charset=ISO-8859-1
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Tr...form security against security
i have a form in my website which is to be filled by user and that form stores in database(sql server 2005).
but someone told me that anyone can run script in textboxes in that form and can damage database,
so how to avoid such security lack.
it is common practice to use parameterized sql statements or stored procs to insure you are protected from sql injections attacks.
if you concatenate user input directly into a sql statement, then you are at risk.Mike Banavige~~~~~~~~~~~~Need a site code sample in a different language? Try converting it with: http://converte...Secure connections: how secure are they?
......... both useful and malicious information can be transmitted via network
connections. Standard solutions protect computers against threats present in
standard network connections, but aren't able to counter threats present in
secure connections. Verifying the contents of a secure connection is
impossible by virtue of its secure nature, as demonstrated by the different
types of protection listed above. As a result, malicious data within secure
channels can cause a significant amount of damage, and sometimes more than if
it were to be transmitted via a standard, non-s...Password secure...is it secure?
Yes I just got this baby and I LOVE it! Its great. I have stored all my
passwords inside of it (and yes made a few backups from them in secure
locations) How secure is this program really? It uses blowfish to encrypt
the database but how strong blowfish? 128bits? 256? 448?
Anything else I should think about it? I have putted it and its databases
inside PGPdisk just to play it safe...but then again Im a paranoid. :)
My privacy related homepage and PGP keys:
********...How secure is secure enough?
July 28, 2008 (Computerworld) This story originally appeared in
Computerworld's print edition.
If there is a Holy Grail in the information security industry, it surely is
the answer to the question, "How secure is secure enough?"
It's a question that many security managers have either avoided answering
altogether or tried to quickly sidestep by throwing a fistful of mainly
pointless operational metrics at anyone who cared to ask.
"Never d...How secure is AuthenticationTypes.Secure?
I understand that AuthenticationTypes.Secure requests secure authentication using Kerberos or NTLM (??). However, here is a scenario I am trying to understand. Let us say that I am having a regular ASP.NET site - with SSL certificates not installed on the web server. The login sends the request out to an AD server which also does not have certificates installed. However, I have set Secure flag to AuthenticationTypes.Secure. When the username and password data gets transmitted between the application and the LDAP server, how secure are the password and username info? In other words is this in...Secure By Design: How Guardian Digital Secures EnGarde Secure Linux
"EnGarde Secure Linux is not just another "repackaged" Linux
distribution, but a modern open source system built from the ground up
to provide secure services in the threatening world of the modern
...."The Community edition of EnGarde Secure Linux is completely free
and open source, and online security and application updates are
freely available with GDSN registration."...
...Netstorage Secure then UN-Secure
Have a problem with Netstorage: I log in under the secure website of
https://ipaddress:51443/oneNet/NetStorage and then after drilling down to
folder, the secure web site changes to
http://ipaddress:51443/oneNet/NetStorage/Documents. Why??? does it go to
the unsecure site?
It appears that in the past few days you have not received a response to your
posting. That concerns us, and has triggered this automated reply.
Has your problem been resolved? If not, you might try one of the following options:
- Do a search of our knowledgebase at http://support.novell.com...Secure page to Secure page
Product: Firefox Release Candidate
Summary: Secure page to Secure page
I have had several crashes going from a secure page to another secure
page. The response I often get is that the page does not exist. This
only seems to occur on secure pages.
Browser Details: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9b4) Gecko/2008030714 Firefox/3.0b4
From URL: http://hendrix.mozilla.org/
EAServer 4.2 build 42012 on NT (jdk13). This code works as a
Java clientapp but not when the code is inside an EJB
in EAServer? Can we register Security provider dynamically?
// system var.
System.setProperty("javax.net.debug", &...Are Security Products a Security Risk?
"Approximately 800 vulnerabilities discovered in antivirus products"
My antivirus solution Kaspersky is one of them... Sigh... :(
On Mon, 21 Jul 2008 18:05:21 +0800, Ryan Ernest S. Selda said:
> "Approximately 800 vulnerabilities discovered in antivirus products"
> My antivirus solution Kaspersky is one of them... Sigh... :(
This has already appeared here, on 8th July, in a thread entitled
"Approximately 800 vulnerabilities discove...Security Trends
Security Trends - What they forget to secure from L33tdawg
Sat Apr 20 @ 16:45(Reads: 325)
Note: This article first appeared over at our affiliates site EyeOnSecurity.net. The original article can be found here.
You set up firewalls, e-mail filtering, Intrusion Detection Systems (IDS), personal firewalls, Censor Software (both on network and
personal level) and they still get in. What I'm referring to is those pesky VBS, similar worms inhibiting the Windows platform right
now and maybe a few real life crackers here and there. For the network administrator, this can be a ...