Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: xqus; Keyword(s):

Search: Search took 0.01 seconds.

  1. Opera claims the exploit is not exploitable....

    Opera claims the exploit is not exploitable. http://twitter.com/opvard/status/10022205189
  2. Replies
    2
    Views
    2,277

    Is that all? No PHP code?

    Is that all? No PHP code?
  3. Replies
    0
    Views
    1,507

    Where to save the key

    I'm working on a web application that require that i encrypt some of the data. I have looked trough some discussions on the net, but most of them are inconclusive.

    Where do I store the key? At...
  4. Replies
    6
    Views
    2,316

    Poll: They should do like Microsoft does with macros in...

    They should do like Microsoft does with macros in office documents. Ask the user if he want to enable JS for the document he is opening.
  5. Replies
    3
    Views
    1,456

    No. Apache reads .htaccess for each request.

    No. Apache reads .htaccess for each request.
  6. Replies
    3
    Views
    1,456

    You could off course make a couple of .htaccess...

    You could off course make a couple of .htaccess files depending on the different access settings you want, and then setup cronjobs to copy the .htaccess you want to be active into your document root....
  7. Replies
    7
    Views
    2,453

    I think I'm actually going to test it a bit...

    I think I'm actually going to test it a bit myself, thanks. I have a couple of harddrives that I'm going to throw away. So I think I'll just try Eraser, and see if I'm able to recover anything when...
  8. Replies
    7
    Views
    2,453

    Thank you nihil! That was most helpfull. :)

    Thank you nihil!

    That was most helpfull. :)
  9. Replies
    7
    Views
    2,453

    This seems like a really nice tool. :) Do you...

    This seems like a really nice tool. :) Do you have indication on how well it does the job? This can be really usefull for my unencrypted drive.
  10. Replies
    10
    Views
    3,982

    At the moment I have implemented support for...

    At the moment I have implemented support for Yubikey (http://yubico.com/products/yubikey/). It does not offer all the same functions as Umikey, but all you need to pay for is the hardware itself....
  11. Replies
    10
    Views
    3,982

    Well, thanks for the advice and input. This...

    Well, thanks for the advice and input. This discussin has proven helpfull, and since this topic is not wery much discussed around the net it's hard to get any feedback at all. So every bit of input...
  12. Replies
    10
    Views
    3,982

    The reason I want to use 2FA is simple. Users are...

    The reason I want to use 2FA is simple. Users are not able to choose a secure password and store it in a safe way. Therefore the "something they know" aspect isnt safe enough in my oppinion....
  13. Replies
    10
    Views
    3,982

    Sounds fair enough. I'm not looking for same...

    Sounds fair enough. I'm not looking for same security as online banks, but I'm aiming close.
    So what I have now is regular username/password login with a one time password sendt to the user on...
  14. Replies
    10
    Views
    3,982

    Distributing one-time passwords

    I'm working on a web service that needs two factor authorization, and therefore I need a way of securely distributing one-time passwords. The primary method will be sending a SMS to the users phone...
  15. Replies
    2
    Views
    691

    Well, it depends on what you know. If you don't...

    Well, it depends on what you know. If you don't know anything about web development. I would suggest you start with the basic fundamentals.

    - How the HTTP protocol works
    - (X)HTML
    - CSS

    Then...
Results 1 to 15 of 15