Search Results

Search found 18715 results on 749 pages for 'website attack'.

Page 238/749 | < Previous Page | 234 235 236 237 238 239 240 241 242 243 244 245  | Next Page >

  • PayPal for Indian Rupees(INR) any solution

    - by ahammed
    I am developing online shopping website, In shopping website all product are priced in Indian Rupees(INR). I am going to integrate My shopping cart to paypal payment gateway. I knew that pay pal does not support INR. So i have to convert INR to USD. Is there Any API service to convert INR to USD as automatically ?, If yes, give the details about that.

    Read the article

  • The use of Javascript - stats?

    - by Luke
    I am looking at redesigning my website and was wondering if I could get some opinions. I know that the rule is usually to design with users without JS first and foremost, but having looked at the stats, it appears 95% of the users online have JS enabled. Would you recommend designing the website using JS and not bothering about people without it?

    Read the article

  • How can I securely check if a username is already taken?

    - by Geo
    I have a form where someone can create a new user. I'd like to add some AJAX to check if a username is taken, as soon as the input field loses focus. I'm not really sure how to go about this, as this could pave the way to bruteforce attack, since you could check for any username and see whether or not it exists. Any suggestions?

    Read the article

  • Empty "for" loop in Facebook ajax

    - by celticpride
    While surfing facebook and using the Firebug network debugger I noticed that facebook's AJAX responses all start with an empty for loop. Example: for(;;);{...} Does anyone know why this is done? I assume it's to prevent some sort of XSS attack but I don't totally understand. Thanks!

    Read the article

  • Performance, serve all CSS at once, or as its needed?

    - by yaya3
    As far as I know, these days there are two main techniques used for including CSS in a website. A) Provide all the CSS used by the website in one (compressed) file B) Provide the CSS for required by the elements on the page that is currently being viewed only Positives for A: The entire CSS used on the site is cached on first visit via 1 http request Negatives for A: if it's a big file, it will take a long time to load initially Positives for B: Faster initial load time Negatives for B: More HTTP requests, more files to cache Is there anything (fundamental) that I am missing here?

    Read the article

  • Recurring payment, receiving transaction_id

    - by Dmitry Velesnitsky
    What is the data paypal returns if we make recurring payments through a Subscription button on the website? How can we get transaction_id? It's that we want our users to pay with credit cards with no need to register, but so far we can't get transaction_id to get the information for automatic processes on the website directly. Instead we have to manage it all through paypal account. How can we avoid it?

    Read the article

  • CSS: What is the proper way to deal with multiple classes of Text

    - by DavidR
    So I'm on commission for a website, and I'm trying to improve my code. When dealing with a website with multiple types of font (here it's large, there it's small, there it's bold, here it's underlined, etc.) is this where we use the h1-h6, or do we reserve those for times when there is a definite hierarchy, using instead <p class="xxx"> to define different classes for text?

    Read the article

  • IIS 6.0 not sending Expired header though I have turned it on

    - by Umair
    My website is hosted on Windows server 2003, IIS 6.0. The website is developed on ASP.net, with Microsoft Framework 3.5 I have set the content expiry to 12 hours for the complete site using the following settings : IIS Manager-Site-Properties-HTTP Headers-Enable Content Expiration-Expire After-12 Hours(s) The Problem is that when i load the site, Expiry header is not being sent with the site. can any one please help me with this.

    Read the article

  • Page markup maintainability

    - by Tony
    Hi where js folder is under the root. if u put this JS ref in common\SomeControl.ascx, it will work fine if SomeControl is placed on ~/SomePage.aspx because SomePage is under the website root. How to put JS ref in SomeControl and allow it to be placed at any path on the website without losing the JS ref. Thanks

    Read the article

  • Sanitising user input using Python

    - by Steve
    What's the best way to sanitise user input for a Python-based web application? Is there a single function to remove HTML characters and any other necessary characters combinations to ensure that an XSS or SQL injection attack isn't possible?

    Read the article

  • Alternative for PHP mail

    - by Robbert Dam
    In relation to an earlier question I'm looking for an alternative way to send an order from my website to the division in my company that processes the order. Currently I use PHP mail(), but frequently this gives problems. Big delays occur. Are there alternatives to PHP mail() that pushes the order to my company? So I prefer not to poll the website.

    Read the article

  • Apache Rewrite rule confusion

    - by Lee
    I'm trying to convert a simple url (below) in to a blog-style url, but not quite sure how to do it, all of my other rules are working fine, but I can't seem to figure this one out. URL I want to convert: http://www.website.com/myblog.php?id=1&title=My+blog+title URL I want it to create: http://www.website.com/1/my-blog-title What should the rule be? Any assistance appreciated :)

    Read the article

  • cannot access sql server after publishing site in iis7

    - by vinu
    I am created a website using visual studio 2010. On the time of the development of website I am able to access the database.. but after publishing the site using IIS7..i was unable to access the database..the exception occured during that time was "the connection is in the closed state".in IIS7 When I changed the application pool identity to localsystem, it worked. Data base is installed in the same machine. and server is SQL SERVER 2008 R2

    Read the article

  • Error CS0103: The name 'Class1' does not exist in the current context

    - by Mad coder.
    In my website I created a class e.g. Class1.cs in App_Code folder when I am trying to load default page which is using this Class file I am getting the following error CS0103: The name 'Class1' does not exist in the current context for the code String something = Class1.item1(text1.Text, text2.Text); and Class1.cs consists of protected static string item1(string a, string b) { //some action here return null; } Everything works fine in my VS2010 but when I host the website in my server I am getting this issue.

    Read the article

  • How do you encourage users to fill out their profile?

    - by mattdell
    Hello, I wanted to open up the topic to discuss ways to encourage or incentivize users to fill in information in a user profile on a website, such as skills, location, organization, etc. More information in a user profile can give a website an improved capability for its users to search, network, and collaborate. Without bugging users to fill in their profiles (ie - via annoying e-mail reminders), what other ways have you guys come up with to encourage user input? Best, -Matt

    Read the article

  • Security review of an authenticated Diffie Hellman variant

    - by mtraut
    EDIT I'm still hoping for some advice on this, i tried to clarify my intentions... When i came upon device pairing in my mobile communication framework i studied a lot of papers on this topic and and also got some input from previous questions here. But, i didn't find a ready to implement protocol solution - so i invented a derivate and as i'm no crypto geek i'm not sure about the security caveats of the final solution: The main questions are Is SHA256 sufficient as a commit function? Is the addition of the shared secret as an authentication info in the commit string safe? What is the overall security of the 1024 bit group DH I assume at most 2^-24 bit probability of succesful MITM attack (because of 24 bit challenge). Is this plausible? What may be the most promising attack (besides ripping the device out off my numb, cold hands) This is the algorithm sketch For first time pairing, a solution proposed in "Key agreement in peer-to-peer wireless networks" (DH-SC) is implemented. I based it on a commitment derived from: A fix "UUID" for the communicating entity/role (128 bit, sent at protocol start, before commitment) The public DH key (192 bit private key, based on the 1024 bit Oakley group) A 24 bit random challenge Commit is computed using SHA256 c = sha256( UUID || DH pub || Chall) Both parties exchange this commitment, open and transfer the plain content of the above values. The 24 bit random is displayed to the user for manual authentication DH session key (128 bytes, see above) is computed When the user opts for persistent pairing, the session key is stored with the remote UUID as a shared secret Next time devices connect, commit is computed by additionally hashing the previous DH session key before the random challenge. For sure it is not transfered when opening. c = sha256( UUID || DH pub || DH sess || Chall) Now the user is not bothered authenticating when the local party can derive the same commitment using his own, stored previous DH session key. After succesful connection the new DH session key becomes the new shared secret. As this does not exactly fit the protocols i found so far (and as such their security proofs), i'd be very interested to get an opinion from some more crypto enabled guys here. BTW. i did read about the "EKE" protocol, but i'm not sure what the extra security level is.

    Read the article

  • MySQL More Tables or More Rows

    - by Pez Cuckow
    I am working on a game that I am going to open to the public to have on their game. The game stores lots of information (about 300 rows) per website and spends a lot of time updating values within this MySQL database. Is it better (faster/efficient) to add a new table for every website or to just have 1000's of rows in one table and add a column "website_id" or similar?

    Read the article

  • How to remove the port number from a url string

    - by Brono The Vibrator
    I have the following code snippet: string tmp = String.Format("javascript:window.open('{0}');", url); ClientScript.RegisterClientScriptBlock(this.GetType(), "NewWindow", tmp); the url generated by this code include the port number and I think that is happening becasue port 80 is used by the website and in this code I am trying to load a page from a virtual directory of the website. Any ideas on how to supress the port number in the url string generated by this code?

    Read the article

  • How add column order in careers table???

    - by Mahran Elneel
    this table i want to create and how assign job to first position??? job_id dynamic Jobs Title text Job Description text Order combo box to choose after what job or at first position in the website i create this table and cannot choose first job to view in my website

    Read the article

  • Show hidden scrollbar

    - by ceebecee
    A client is opening our website into a popup window using JavaScript with window.open. They are turning off scrollbars and making the window a fixed height, causing the pages to not be scrollable. I control the code of the website being loaded this way, but not the calling JavaScript. Is there any way I can force the display of scrollbars?

    Read the article

  • which of these modes : cbc,cfb,ctr,ecb,ncfb,nofb,ofb,stream are secure and which are absolute no-no

    - by user393087
    By security I mean that encoded string is indistinguishable from random noise and is different on every encryption of the same text so it is impossible to make a guess on encryption algorithm used or do any dictionary attack on the encoded text. Second: output string length does not correspond to the input string length in easy way, so it is not possible of make guessing on that account. Third: it is possible to verify that the provided password is incorrect so the decoding function could return false instead of supposedly decoded random string.

    Read the article

< Previous Page | 234 235 236 237 238 239 240 241 242 243 244 245  | Next Page >