when is secure, secure?
I wrote a custom authentication handler for PureFTPD, using a combination of
authentication methods, for about 4 different types of users.
So far, from testing it, it does look to work properly, and does it's job
pretty well (and fast). I use #!/usr/bin/perl -W as well as use Strict, and
use warnings, and the code returns no errors or warnings when run.
I am right to presume that this basically only really tells me the my syntax
and structure of the application is right? What's a good way to see whether
it is actually SECURE... There is a couple of lines of...security too secure
Summary: security too secure
The security thing won't let me in this sight no matter how I accept,
confirm, get certificate, etc.
Browser Details: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.4; en-GB; rv:1.9.1b4) Gecko/20090423 Firefox/3.5b4
From URL: http://hendrix.mozilla.org/
Note to readers: Hendrix gives no expectation of a response to this feedback
but if you wish to provide one you must BCC (not CC) the sender for them to
...How secure is secure?
Thanks to this group and all the high tech individuals who frequent it I
have learned how to protect my PC from the inside out. But what about
security risks to my info 'before' it gets to my computer? Like my mail
box on the server. Could someone hack into that and thumb through my
If so, how would I ever know?
(The short story)
We have a rogue employee at my work who one day decided to run the web
site, she got in tight with the ISP, got tools to set and delete
passwords on a protected directory on the server. Who knows if she has
telnet access to other things, li...Are Security Products a Security Risk?
"Approximately 800 vulnerabilities discovered in antivirus products"
My antivirus solution Kaspersky is one of them... Sigh... :(
On Mon, 21 Jul 2008 18:05:21 +0800, Ryan Ernest S. Selda said:
> "Approximately 800 vulnerabilities discovered in antivirus products"
> My antivirus solution Kaspersky is one of them... Sigh... :(
This has already appeared here, on 8th July, in a thread entitled
"Approximately 800 vulnerabilities discove...Windows Security Checklist
followup to grc.security.wireless
Windows Security Checklist - Part 13: Windows Home Wireless Security
Securing Your Home Wireless LAN
You can do a lot to secure your wireless LAN (Local Area Network). Most of
these tips apply to 802.11b based LANs, since these are the most popular.
Some of these tips are just good network security practice and can help no
matter how you build your LAN.
Enabl...Is security software becoming a security risk?
"Due to bugs in antivirus software, the security suite becomes a risk
by itself, and adding multiple pieces of security software makes the
problem worse, not better "...
john s. smith wrote:
> "Due to bugs in antivirus software, the security suite becomes a risk
> by itself, and adding multiple pieces of security software makes the
> problem worse, not better "...
...Trapping windows security warning window -"open file
I am using PB8 on windows xp machine.When i try to run, another PB
application from the Main application, Security warning window (Open
File - Security warning)being poped up, which has install and cancel
options.My requirement is to make it accept in pb application through
...Security: Show Passwords MAJOR SECURITY RISK
Summary: Security: Show Passwords MAJOR SECURITY RISK
The ability of anyone to view saved passwords is a major security risk.
PASSWORDS should be ENCRYPTED WITH A USER SELECTED PASSWORD
Browser Details: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:18.104.22.168) Gecko/2008070208 Firefox/3.0.1
From URL: http://hendrix.mozilla.org/
...Security Risks of using built-in security controls?
Hi,Our IT team have a policy whereby a database Server is not allowed on any of our web servers, for security reasons. With the onset of the in-built security controls, the SQL server is automatically created and placed in the App_Data folder which resides on the web site.Could anybody point me to literature that would inform us whether having the SQL server on the web site will compromise the security of our web server, together with any ads or disadvantages of using this system.Also, if SQL server is not allowed on the Web server, is it possible to use&...Window Plug-in Secure vs Non Secure
Can someone explain to me in detail (more than what's available in the
on-line books) the difference between the secure and non-secure versions
of the Window plug-in ? We are in the process of developing a new
application which makes use of the window plug-in. The question is can
this application be a component of an already existing internet
This is a multi-part message in MIME format.
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
I'm a Mac user 10.4.8 of Thunderbird 22.214.171.124 & am wondering how
"Enabling FIPS" will improve my security? I can't seem to find any
explanation of FIPS under Thunderbird help.
Have a good day R Schwager
Content-Type: text/html; charset=ISO-8859-1
<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Tr...Password secure...is it secure?
Yes I just got this baby and I LOVE it! Its great. I have stored all my
passwords inside of it (and yes made a few backups from them in secure
locations) How secure is this program really? It uses blowfish to encrypt
the database but how strong blowfish? 128bits? 256? 448?
Anything else I should think about it? I have putted it and its databases
inside PGPdisk just to play it safe...but then again Im a paranoid. :)
My privacy related homepage and PGP keys:
********...How secure is secure enough?
July 28, 2008 (Computerworld) This story originally appeared in
Computerworld's print edition.
If there is a Holy Grail in the information security industry, it surely is
the answer to the question, "How secure is secure enough?"
It's a question that many security managers have either avoided answering
altogether or tried to quickly sidestep by throwing a fistful of mainly
pointless operational metrics at anyone who cared to ask.
"Never d...Windows Security vs. SQL Server Security: Procedure?
I'm so new to DNN that I'm installing it on a development server for the first time. I'm following the procedures for installing DNN as set out in the book DotNetNuke ASP.NET Portals by Shaun Walker, et al. The book indicates two security paths for setting up the database for SQL Server 2000: 1. Windows Security and 2. SQL Server Security. Although it recommends Windows Security, it then provides the steps for SQL Server Security, which it acknowledges as the less secure of the two options. I understand why it proceeds down the SQL Server Security ins...