Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: bestellen; Keyword(s):

Search: Search took 0.01 seconds.

  1. Replies
    4
    Views
    5

    My current system is WinXP + SP2.

    My current system is WinXP + SP2.
  2. Replies
    6
    Views
    7

    Basically, you'll need to open a network socket,...

    Basically, you'll need to open a network socket, and then send the email commands over it (just Google the email RFC for the specs). Alternately, there are probably some libraries out there that you...
  3. Replies
    24
    Views
    5,067

    I use Kaspersky on my Windows 7, and according to...

    I use Kaspersky on my Windows 7, and according to the site, it is now compatible with 8!
  4. Replies
    24
    Views
    5,067

    Which Operating System is installed?? ...

    Which Operating System is installed??

    Windows Vista, Win7 & 8 have excellent firewalls and really don't need a 3rd party firewall especially if you are connected to a router that is firewall...
  5. Replies
    7
    Views
    8

    I reccomend you to do next: redirect from...

    I reccomend you to do next:
    redirect from site.ext to www.site.ext
    Code(.htaccess):
    RewriteEngine On
    RewriteCond %{HTTP_HOST} ^site\.ext
    RewriteRule ^(.*)$ http://www.site.ext/$1 [R=permanent,L]...
  6. I have a BCD436HP that work's perfectly.

    I have a BCD436HP that work's perfectly.
  7. Secure Coding During Agile Development?

    I would like to ask the group for thoughts/experience with secure coding aspects while performing agile development. Within this context, secure coding is a part of software assurance that focuses on...
  8. Replies
    2
    Views
    3

    I recommend you to use the next service...

    I recommend you to use the next service
    identitysafe[dot]norton[dot]com/password-generator
  9. Replies
    2
    Views
    3

    The MSRC4 plugin in UltraVNC does provide extra...

    The MSRC4 plugin in UltraVNC does provide extra security from normal VNC software that sends packets (including login info) in plain text.

    However, it utilizes just a single key. Compare with key...
  10. I think it is a terrible idea and it will almost...

    I think it is a terrible idea and it will almost certainly wreck your operating system. IMHO encryption should be used only under the following circumstances:
    For sensitive data files.
    If you are...
  11. Replies
    5
    Views
    6

    or you can visit the next page and read about...

    or you can visit the next page and read about uninstall of ilivid
    deletemalware[dot]blogspot[dot]com/2013/02/how-to-remove-ilivid[dot]html
  12. On Windows, there is a hidden account named...

    On Windows, there is a hidden account named Administrator. Most of the time, this account has no password set. That means that you can start your computer with this account, open the Control Panel to...
  13. Replies
    1
    Views
    2

    I recommend you visit next page -...

    I recommend you visit next page - rfptemplates[dot]technologyevaluation[dot]com/rfp/for/Free-Security-Proposal-Template[dot]html. From this article you'll get answer for your question.
  14. Replies
    4
    Views
    5

    Wireless Security Question

    Do you sell an external alarm for my wireless security system?
  15. Replies
    1
    Views
    2

    Is my PHP code secure?

    I'm using PHP and want to make an encryption method for storing a random value in the user's cookie as a method of authentication so they don't need to log back in every time they visit the site....
Results 1 to 15 of 15