verification

Types in Bytecode

Hey everyone, I've been working for some time on (Java) Bytecode, however, it had never occurred to me to ask why are some instructions typed? I understand that in an ADD operation, we need to distinguish between an integer addition and a FP addition (that's why we have IADD and FADD). However, why do we need to distinguish between ISTO...

Importance of verifying user email on web signup

I know this question is crazy - but my employers client is demanding that email verification be removed from the sign up process (they feel it is impeding sign up). I wanted to garner feedback from the programming community at large as to their experience and opinions regarding sign up and email verification - and the possible consequen...

Programmatically confirm the existence of a mobile number

How do I confirm that a phone number is legit, or that it is connected? I want to prevent users signing up with bogus numbers. Is there a way to programmatically make a call or something? Or find out if the phone is alive, connected? ...

Age verification forms and crawlers

I have created a website about some beer brand and had to include age verification page. The verification script is written in PHP and uses sessions to store verification variable. The script works the way that no matter form which link you will try to enter the website it will take you to the verification page first. The verification is...

How to verify that post to website is coming from a specific purchased iPhone application?

I have an iPhone application that posts data to a web application ... and I want to only accept data posted from an iPhone application that was purchased from the iTunes store. Is there a way to do this? Is there something (or somethings) I can pass from the iPhone app to the web application that I can use to do such verification? Tha...

Bytecode and Objects

Hey everyone, I am working on a bytecode instrumentation project. Currently when handling objects, the verifier throws an error most of the time. So I would like to get things clear concerning rules with objects (I read the JVMS but couldn't find the answer I was looking for): I am instrumenting the NEW instruction: original bytecode ...

How to deny payment via PayPal IPN?

Hello all, I need to create dynamic 'Pay Now' buttons on my site, and PayPal says the way to do this is via an HTML FORM with preset variables for the price, currency, and item of the purchase. I use PayPal IPN to notify me when a payment has complete. However, what's to stop someone from modifying the query parameters of the Pay Now ...

Ideas for a TLA+ project

Please give me some suggestions regarding a project topic in the TLA+ language. I'm taking a course on the language, it's the first year I'm learning about specification and verification and I have no clue what to choose to implement in two weeks time. Any ideas? ...

Verifying university membership/attendance via email address

My client's web app allows members to sign up (Rails using AuthLogic) and those signups are limited in that they must be under the auspices of a university. To wit: A university organizer can sign up to be the representative of a university, and students can sign up as "attendees" of that university. I've been tasked with finding if the...

More information wanted on error: CREATE ASSEMBLY for assembly failed because assembly failed verification

I have a small application that uses SQL Server 2005 Express with CLR stored procedures. It has been successfully installed and runs on many computers running XP and Vista. To create the assembly the following SQL is executed (names changed to protect the innocent): CREATE ASSEMBLY myAssemblyName FROM 'c:\pathtoAssembly\myAssembly.dll...

Is it better to do verification of data at every level that it is used?

If you have a chain of functions that operate on some data, is it better to have each function verify the data is valid before using it, or do that verification at the start of the chain and have every function in the chain just "trust" that it is valid? ...

Verifying that something has been "done" through hashes/encryption

So, to start off, I want to point out that I know that these things are never fool-proof and if enough effort is applied anything can be broken. But: Say I hand a piece of software to someone (that I have written) and get them to run it. I want to verify the result that they get. I was thinking of using some sort of encryption/hash tha...

Combining age verification and google indexing

As spiders will generally not execute javascript i am thinking of taking one of the options below in order to successfully get them to index the content of a website that requires age verification. My preferred solution: Checking for a cookie 'ageverification'. If it does not exist, add some javascript to redirect the user to ~/verify...

USB serial verification in C++

Hi, I have a DLL which I intend to send to a 3rd party and I'd like to protect it by restricting it to run only if a specific USB device is connected. I'm using the setupapi to get the device's serial number (by calling SetupDiGetDeviceInstanceId()). I would like to make the verification hard to track in case someone disassembles the DL...

Clarifications on Bytecode and objects

Hello everyone, I am writing a Bytecode instrumenter. Right now, I am trying to find out how to do that in the presence of objects. I would like some clarifications on two lines I read in the JVMS (section 4.9.4): 1) "The verifier rejects code that uses the new object before it has been initialized." My question is, what does "u...

Translating a VHDL monitor into a PSL assertion

Hello, I have an interesting question about PSL assertion. Here is a VHDL monitor process. It is a process dedicated to an assertion, and thus a non-synthesizable one. This monitor checks the current FSM state and stores the values of two registers: "input1" and "reg136". Finally, it triggers an "assert" statement to compare the values ...

Codeigniter IonAuth Library - redirect after a group member logins

Hi, I have just used and installed IonAuth on my Codeigniter app. I have setup 3 user groups.. Admin Members Media Partners Would it be possible to redirect each user group to their unique dashboard area rather than the home page? e.g. admins log in and are redirected to => /admin/dashboard/ members log in and are redirected to =>...

In Subversion, how do I verify that everything was successfully loaded into the repository?

I have got a Subversion repository, but how can I tell if it really has everything it's supposed to? The file and folder counts are widely different between the Working Folder and the original folder I used to create the repository, even accounting for the contents of the .svn folder in each repository folder. (assuming they all are th...

[Win32] Lightweight file verification with PKI

I am trying to extend the legacy code of an online game to provide a reasonable assurance that the resource files associated with the game are the latest version, and not tampered with. I'd like to do this without DRM, without going into kernel mode, and without hardware assistance. What I ultimately settle on should ideally be about as ...

Java, send e-mail: verify whether valid host is provided in e-mail address

Our website sends e-mails to the e-mail address which a user enters on our website. Some people enter garbage e-mail addresses. How can we find out, whether at least the host of the entered address is a valid one? Simply trying to open a socket at port 25 of the entered host? Update: I've found a Java library for DNS stuff. What record ...