Hi,
This is my first time building a website and using CodeIgniter for a school project. I was wondering whether you have any tips on uploading CI to a free web host , my database, free webhosting and basic security tips.
Can I just upload the entire CI folder? Or do I have to upload individual files (God no!)? What are my options?
Wh...
In this case security means building security (access control, alarm systems, etc). And I am not talking about working directly with the hardware, more focused on web based applications/api's that clients or companies can use?
Are there technologies that are commonly used? Are there technologies that shouldn't be used? Are there any re...
Hi,
I am looking for an example for OCSP validation of client certificate in java 5. Also how the configuration in java.security file is used for this purpose?
...
So, it's been about 3 years since I wrote and went live with my company's main internet facing website. Originally written in php, I've since just been making minor changes here and there to progress the site as we've needed to.
I've wanted to rewrite it from the ground up in the last year or so and now, we want to add some major featur...
I had a problem with accepting invalid SSL certificate in my iPhone program. That problem is solved now, however I came to understanding that I have very abstract idea on how exactly the whole thing is working:
how web browser is verifying that received certificate is really for host it communicates to and not faked by same party in th...
Hello,
I have a password hash that is stored in a table and is put there by the following coldfusion script-
#Hash(Encrypt(Form.UserPassword,GetSiteVars.EnCode))#
I am trying to add some outside functionality within a c# application. I would like to be able to take advantage of the data that already exists so that I can authenticate ...
I know this question is crazy - but my employers client is demanding that email verification be removed from the sign up process (they feel it is impeding sign up).
I wanted to garner feedback from the programming community at large as to their experience and opinions regarding sign up and email verification - and the possible consequen...
Hi,
I have to implement User base security in my Web project using .Net3.5. Followings are some we need:
Roles can be Admin, Manage, Editor, Member etc
User can have multiple roles
Every roles has its own dynamic menus and restrictions/resources
All menus and interface will populate dynamically from Database
I heard some where this ...
Can somebody give me a link to PKCS#11 test suite? This may be a simple utility or part of big project no matter.
I now only this one: Netscape PKCS #11 Test Suites
...
<servlet-mapping>
<servlet-name>myName</servlet-name>
<url-pattern>/aName</url-pattern>
</servlet-mapping>
<security-constraint>
<web-resource-collection>
...
<url-pattern>
/*
</url-pattern>
</web-res...
Does someone know of a good example of a SQL Injection vulnerability that isn't in a web application? What is the user input for this attack? I am looking for a real vulnerability, not speculation. The following picture is an example of a speculated attack.
...
i'm a newbie to server-side programming, so please forgive me if this gets messy. i've been contracted to create a web service to allow authenticated users to access a database. users have to enter a login and password. been reading and reading about REST vs SOAP, and i thought i'd settled on a RESTful design when i came across this s...
I know about all the issues with session fixation and hijacking. My question is really basic: I want to create an authentication system with PHP. For that, after the login, I would just store the user id in the session.
But: I've seen some people do weird things like generating a GUID for each user and session and storing that instead o...
Is there a framework or api to let multiple isolated sandboxes run in a single java vm?
...
There is a new Open Source poker bot called PokerPirate. I am interested in any creative ways in which a web application could detect/thwart/defeat a poker bot. (This is a purely academic discussion, in the same spirit that PokerPirate was written.)
...
I was going through an article today when it mentioned the following:
"We've found many errors over the
years. One of the absolute best was
the following in the X Window System:
if(getuid() != 0 && geteuid == 0) {
ErrorF("Only root");
exit(1);
}
It allowed any local user to get root
access. (The ...
Hi all -
I'm creating a flash application that will post images to a url for saving to disk/display later. I was wondering what are some suggested strategies for making this secure enough so that the upload is verified as coming from the application and not just some random form post.
Is it reliable enough to check referring location r...
Hello SO's
i am trying to create a directory in drive C: (at a win7 target machine) with Directory.CreateDirectory but so far no luck.
I believe the problem has to do something with permissions-security... So here i am..
How can i create a directory in drive C?
...
How can I create a "security aware" action link that detects if a user is authorized to click (invoke) the action?
Hide link if user is not allowed to use that action...
Depending from
web.config (authorization) and
[Authorize] attributes on actions
PS
I guess it is bad practice to mix those 2 in MVC?
...
This is a very generic question about software products. I would like to know what compliance standards are applicable to any software product.
I know that question gives away nothing. So, here is an example to what I am referring to.
CiSecurity Security Certification/Compliance lists out products ceritified by them to be compliant to ...