Autocomplete & security - retrieving credentials from local cache?
Is it possible to retrieve stored credentials from the browser cache if you use auto-complete to fill in a form? I believe that the data itself is encrypted. ...
Is it possible to retrieve stored credentials from the browser cache if you use auto-complete to fill in a form? I believe that the data itself is encrypted. ...
I have an existing Java web application running through IBM WebSphere (I'm unsure of the version, but could find out if it helps) that I am looking to implement two factor authentication with. The system has a decent user base, and I wanted to distribute hardware tokens to the admin users of the system to ensure strong authentication. ...
Is it safe to use php_include file for mysql login information or is is better to copy/paste the login info for mysql on every page? If you go with php_include, how will you block that file from being seen? ...
How do i prevent php files from being downloaded "illegally" like through the browser. And what are some ways someone can use to download the php files? ...
I've been writing python scripts that run locally. I would now like to offer a service online using one of these python scripts and through the webhosting I have I can run python in the cgi-bin. The python script takes input from an html form filled in by the user, has the credentials and connects with a local database, calculates stuff...
Recently I posted a question about whether it was a good idea to use seperate databases for administration and public logins in an ASP.NET SQL authorization database to prevent compromises to the public site from spilling over into the admin side. I think I was really asking a bigger question though--when securing an application, should...
I know that spam bots scour web sites and harvest emails, however I wasn't sure about the extent of information that they search for (for instance, names, physical addresses, phone numbers, etc.) In essence, my question boils down to: "Do spam bots search web pages for physical addresses, and I am helping them through the use of the <a...
Hey guys, I am trying to decipher the productState property in the SecurityCenter.productState WMI namespace. The product state is for example an int of : 262144 - which you then look at this page of documentation decipher into an actual product state meaning : http://msdn.microsoft.com/en-us/library/bb432509(VS.85).aspx I may have f...
Hi everyone, I am currently working on adding pre-validation to my website. So that pages that require a log-in or other criteria, will only display if your session matches that criteria. I've got most of the system working, but I have one major obstacle. I cannot figure out how to stop CodeIgniter from running the rest of the controlle...
i deployed a jruby/rails app to tomcat6 through a warbler-built war. system is ubuntu 8, running tomcat6. when i try to start the app, i get the following stack trace Sep 13, 2010 7:57:24 PM org.apache.catalina.core.ApplicationContext log SEVERE: Application Error java.security.AccessControlException: access denied (java.ut...
I'm using HttpWebRequest to send request without using a browser but I always get this reply from this old school cgi forum: "duplicate thread". I'm pretty sure the thread is not a duplicate as it is the first time I send it. I'm guessing the forum software is detecting something unusual about my thread as is is machine generated. What c...
what are the ideas of preventing buffer overflow attacks? and i heard about Stackguard,but until now is this problem completely solved by applying stackguard or combination of it with other techniques? after warm up, as an experienced programmer Why do you think that it is so difficult to provide adequate defenses for buffer ov...
As a security measure, I want to hide the technology stack I am using on my server. What are effective ways to do this? I thought about 1) Use mod_rewrite or Rewrite Module to hide any page extensions like .php or .aspx 2) Turn off all error reporting 1b) use mod_rewrite to serve a misleading extension on purpose, like disguising a php...
Given i have compiled linux exe file in my resources/raw directory. Can i execute it using Process.execute("./resources/raw/filename") or i have to have special permissions (like ROOT or smth) ? ...
I've setup CCNet to build under user CCBuild, which publishes the builds to C:\Build\Projects\ProjectName\Version\Package.zip I've allowed several AD domain users to access the folders from C:\Build\Projects\ProjectName But they can't download the packages because the security gets set differently. While they can acccess the ProjectNam...
Hi, I had a win7 x64 box with a local Sharepoint 2010 installed on an SQLEXPRESS DB. Last week I also installed an SQL 2008 R2 instance with integration and analysis services next to the existing database. Because I had issues deploying analysis services solutions, I messed around quite some with the SQL Services Accounts. Eventually...
Hi, I read a lot about cross-site scripting with Flash, Javascript etc. and also found several lists with websites that have a crossdomain.xml that allows access from any server. For example flickr.com trusts all domains. Can somebody explain me why this seems to be secure and doesn't lead to attacks like session-hijacking? Is it becau...
I need a login system to check the user password. I know about salting passwords, but should I store the salt and the encrypted password or should I only store the encrypted password and the salt is somewhere in my app config file? Please pro and cons if there are some, thanks! ...
WARNING: This is a possible exploit. Do not run directly on your server if you're not sure what to do with this. http://pastehtml.com/view/1b1m2r6.txt I believe this was uploaded via an insecure upload script. How do I decode and uncompress this code? Running it in the browser might execute it as a shell script, open up a port or somet...
I have a Flash based game for the browser which sends users' scores to a php backend script which stores the score and the user id in the database. Now I have a url like www.example.com/update.php?score=200&uid=234 The problem is that this is very much exposed to an intelligent user, and he can use this url to store whatever score he w...