Search:

Type: Posts; User: bestellen; Keyword(s):

Search: Search took 0.08 seconds.

  1. What hosting did you choose?

    What hosting did you choose?
  2. Replies
    6
    Views
    84,033

    My current system is WinXP + SP2.

    My current system is WinXP + SP2.
  3. Replies
    6
    Views
    62,377

    Basically, you'll need to open a network socket,...

    Basically, you'll need to open a network socket, and then send the email commands over it (just Google the email RFC for the specs). Alternately, there are probably some libraries out there that you...
  4. Replies
    30
    Views
    200,254

    I use Kaspersky on my Windows 7, and according to...

    I use Kaspersky on my Windows 7, and according to the site, it is now compatible with 8!
  5. Replies
    30
    Views
    200,254

    Which Operating System is installed?? ...

    Which Operating System is installed??

    Windows Vista, Win7 & 8 have excellent firewalls and really don't need a 3rd party firewall especially if you are connected to a router that is firewall...
  6. I have a BCD436HP that work's perfectly.

    I have a BCD436HP that work's perfectly.
  7. Replies
    0
    Views
    71,166

    Secure Coding During Agile Development?

    I would like to ask the group for thoughts/experience with secure coding aspects while performing agile development. Within this context, secure coding is a part of software assurance that focuses on...
  8. Replies
    2
    Views
    16,966

    I recommend you to use the next service...

    I recommend you to use the next service
    identitysafe[dot]norton[dot]com/password-generator
  9. Replies
    2
    Views
    11,288

    The MSRC4 plugin in UltraVNC does provide extra...

    The MSRC4 plugin in UltraVNC does provide extra security from normal VNC software that sends packets (including login info) in plain text.

    However, it utilizes just a single key. Compare with key...
  10. I think it is a terrible idea and it will almost...

    I think it is a terrible idea and it will almost certainly wreck your operating system. IMHO encryption should be used only under the following circumstances:
    For sensitive data files.
    If you are...
  11. Replies
    5
    Views
    32,665

    or you can visit the next page and read about...

    or you can visit the next page and read about uninstall of ilivid
    deletemalware[dot]blogspot[dot]com/2013/02/how-to-remove-ilivid[dot]html
  12. On Windows, there is a hidden account named...

    On Windows, there is a hidden account named Administrator. Most of the time, this account has no password set. That means that you can start your computer with this account, open the Control Panel to...
  13. Replies
    1
    Views
    14,913

    I recommend you visit next page -...

    I recommend you visit next page - rfptemplates[dot]technologyevaluation[dot]com/rfp/for/Free-Security-Proposal-Template[dot]html. From this article you'll get answer for your question.
  14. Replies
    6
    Views
    84,033

    Wireless Security Question

    Do you sell an external alarm for my wireless security system?
  15. Replies
    1
    Views
    28,854

    Is my PHP code secure?

    I'm using PHP and want to make an encryption method for storing a random value in the user's cookie as a method of authentication so they don't need to log back in every time they visit the site....
Results 1 to 15 of 15