I have a PHP script and it will be connected to my FTP server. Is there a good way I can secure my script so I can login in multiple times without having to worry? To clarify - this is for the FTP server. I'm worried about a bruteforce attack.
Thanks! We'll email you when relevant content is added and updated.
Hello, this is Muhannad Battikhi from Jordan. Sometimes the legal procedures need to race the personal and secrecy information of the networks participants to know the cyber crimes doers and that require some cooperation from the social networks companies to know some important and necessary...
Thanks! We'll email you when relevant content is added and updated.
Can a phone be hacked and controlled from a remote location? Like from a laptop? Can you hack it and send and receive text from that phone but not be on it and not actually have it or access to it?
Thanks! We'll email you when relevant content is added and updated.
On my website - obviously users view different information and documents. But on one PDF file - there's a bit of sensitive information on it. Would there be a way for me to prevent these users from saving it locally? Thank you.
Thanks! We'll email you when relevant content is added and updated.
I plug my iPhone into the USB port to charge during work. I own the phone, work owns the computer. Are they able to view and monitor my activity on my personal phone while charging on the laptop? (Email, Internet, text, etc)?
Thanks! We'll email you when relevant content is added and updated.
SQL Server 2016 uses AES-256 symmetric encryption algorithm for backups. However, it uses an asymmetric key in conjunction with AES-256. As we know, asymmetric keys are not designed for large data encryption. Does the system, under the hood, generates a sort of symmetric session key and encrypts...
Thanks! We'll email you when relevant content is added and updated.
I need help finding a solution that enable storage of pictures/ information of certain containers that are shipped from warehouses to customers. Readily accessing those pictures from warehouse facilities is vital. It also has to be able to centrally store these photos so that you do not have to go...
Thanks! We'll email you when relevant content is added and updated.
A particular app reveals app_secret but has server side verification, still there is little risk in revealing app_secret. Can anyone let me know the possible attacks that can be done using app_secret and proof of concept?
Thanks! We'll email you when relevant content is added and updated.
I have formatted one PC, after re-installing all software system won't allow to open all excel,word files showing "file access denied...encrypted file or read only", though I logged through administrator with all rights. All files was encrypted by earlier user and created certificate, before...
Thanks! We'll email you when relevant content is added and updated.
An old friend said they received a text message from me, which I did not send. When I asked what number it came from, they gave me the number of an old land line that I had disconnected 3 or 4 years ago. I called the number and it is still out of service. I texted the number and received an error...
Thanks! We'll email you when relevant content is added and updated.
I have a problem with IFS security, I’m allowing users to create symbolic links to IFS files which they then cannot remove. I try to use CHGAUT on the link after creating it so the user have sufficient authority but this does not work, I am guessing this is because if you create a symbolic link...
Thanks! We'll email you when relevant content is added and updated.
This might be an odd question but it's necessary for me. I have two accounts for a specific website. Would I be able to login with both accounts if I used two different tabs (I'm using Internet Explorer)?
Thanks! We'll email you when relevant content is added and updated.