by: Faraz |
last post by:
Hi,
Is there any tool or application out there which when given an website url
(maybe in ASP.NET) , it will run a comprehensive security test. So it would
analyze all the known security threats...
|
by: oopaevah |
last post by:
What are the pitfalls of passing a token in the url once a user is
logged on so I can remember who they are?
I can easily implement this by adding &token=abcdefghijklmnop123 to
each internal...
|
by: Frank Miverk |
last post by:
Hi,
I have a situation which I think is fairly common.
1. Public area
2. Secure area accessed via SSL
e.g.
MyWebsite/
/MySecureWebsite
|
by: Luqman |
last post by:
I want to display Administer WebSite (Security Tool provided by Microsoft in
Visual Studion 2005) at runtime, using my Application, without Visual Studio
2005, how can I ?
Best Regards,
...
|
by: JimLad |
last post by:
Hi,
First of all I didn't design this website, but I have been asked to
fix it with the minimum fuss!
Website is using .NET on IIS6 with an Excel Interop to produce
reports. The website...
|
by: Sunfire |
last post by:
I was wondering exactly how secure publishing a website using vs2005 publish
command would be with the make this website updatable box checked in the
publish wizard compared to having it checked....
|
by: Sunfire |
last post by:
Is there any difference between an uncompiled and compiled website when it
comes to security and safety? or is it all the same?
|
by: =?Utf-8?B?U3ViYQ==?= |
last post by:
Hi
In my application we have ssl turned on with load balancer. my page has a
flash piece. so whenever the client opens the page a security warning pops
up. I wrote a custom http response filter...
|
by: =?Utf-8?B?QnJldHQgU2hlYXJlcg==?= |
last post by:
I have developed a simple loyalty system that I would like to host for
clients, but have it appear in an IFrame on their site. The security being
used is 'out of the box' using the standard login...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|