Search Results

Search found 120608 results on 4825 pages for 'code access security'.

Page 276/4825 | < Previous Page | 272 273 274 275 276 277 278 279 280 281 282 283  | Next Page >

  • After Windows 8 installation I can't access BIOS settings anymore

    - by Diogo
    Today I installed Windows 8 Consumer Preview on one of my notebook machines and I noticed that I can't access BIOS settings if I use the "Shut down" Windows option on Settings/Power menu. If I use the "Restart" option, my BIOS allow me to enter on it's settings over "F2" again. Is this happening to someone else? I looked over Windows 8 oficial forum and couldn't find such event. Is this something foreseeable to the new Windows 8?

    Read the article

  • Redirecting access from a domain name to IP:port

    - by hexacyanide
    Right now I have a server running on IP:Port. If I wanted to use DNS but redirect to the port, how would I do so? I've heard that it's possible, but how would I do so, even if it includes creating something such as a proxy? For example, visiting: domain.tld would instead access IP:Port and the port could be anything I wanted it to be. If no direct solution exist, how would I go along using a "VirtualHost"?

    Read the article

  • Using a password to generate two distinct hashes without reducing password security

    - by Nevins
    Hi there, I'm in the process of designing a web application that will require the storage of GPG keys in an encrypted format in a database. I'm planning on storing the user's password in a bCrypt hash in the database. What I would like to be able to do is to use that bCrypt to authenticate the user then use the combination of the stored bCrypt hash and another hash of the password to encrypt and decrypt the GPG keys. My question is whether I can do this without reducing the security of the password? I was thinking I may be able to use something like an HMAC-SHA256 of a static string using the password and a salt as the secret key. Is there a better way to do this that I haven't thought of? Thanks

    Read the article

  • [Vista] Can not access control panel.

    - by Amby
    I can not access Contol panel in my windows vista machine. As soon as i click the "conrol panel" item in start items, it shows up a window and then its closed automatically ( same happens if i use "control" command). Is there some program or some registry entry thats restricting it? is ther a way to control this behaviour?

    Read the article

  • PHP has encountered an Access Violation at ***

    - by JT
    Win 2003, PHP 5.2.1 and IIS 6. I have PHP configured as ISSAPI and it is serving PHP pages. When I try a page that requires MySQL I am getting just: PHP has encountered an Access Violation at (and a RANDOM number) What is all. Google has not provided me with results that help me fix. Does anyone have any thoughts?

    Read the article

  • VirtualBox no network access

    - by Frantumn
    I'm on a work machine, setting up a virtual ubuntu image using virtual box. After I installed the image, I can't seem to connect to the internet. If I look at network and sharing center on my host OS (W7) I see that the VirtualBox Host-Only Network reads as "no network access" How can I set it up so that it uses the same network as the host OS. UPDATE! Okay, is there a way I can tell virtual box host-only network to use a proxy script?

    Read the article

  • share git rep access on unix machine with ssh

    - by Daniel
    at my school we have a student unix server with our accounts. i have installed git on my account, created a repository, and created the acl permissions on the folder repository so other users can access the repository # file: tp1 # owner: my_account # group: groupxxx user::rwx user:friend_account:rwx group::--- mask::rwx other::--- default:user::rwx default:user:friend_account:rwx default:group::--- default:mask::rwx default:other::--- but friend_account cant even cd to my tp1 directory (permission denied), so i think the problem should be in unix acl permissions..

    Read the article

  • About SQL Server security

    - by Felipe Fiali
    I have an ASP.NET application which runs under the Classic .NET AppPool in IIS. I have a report to render from my website. The problem is SQL Server keeps telling me that it failed to create a connection to the datasource, because login failed for user IUSR. After adding that user directly to the databse I could get the report to work, but I'm concerned about security. By doing that, am I opening my specified databases to all websites hosted on IIS? Or is that account identity-specific?

    Read the article

  • iptables: Allow only HTTP access for web browsing

    - by user1448260
    Have a linux box, want it locked down but just be able to surf internet on it. Why is this script blocking http too? #!/bin/sh # # iptables -F # #Set default policies for INPUT, FORWARD and OUTPUT chains # iptables -P INPUT DROP iptables -P FORWARD DROP iptables -P OUTPUT DROP # # Allow TCP connections on tcp port 80 # iptables -A INPUT -i eth0 -p tcp --dport 80 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -A OUTPUT -o eth0 -p tcp --sport 80 -m state --state ESTABLISHED -j ACCEPT # # Set access for localhost # iptables -A INPUT -i lo -j ACCEPT # # List rules # iptables -L -v

    Read the article

  • Is web.config more secure than a class?

    - by o-logn
    I was reading a tutorial on ASP.NET and third party API's and it mentioned that the API KEY and SECRET KEY should be stored in the web.config file, for security on production servers, instead of in the classes that use them. However, I'm not quite sure what's more secure about a web.config file than a class? I understand the convenience of storing it in a config file, but I don't see the security benefit?

    Read the article

  • Citrix Plug-in with TCP/IP access

    - by Mat Banik
    I have created for user file named serverDesktop.ica with following content: [ApplicationServers] XenApp= [XenApp] TransportDriver=TCP/IP Address=IP or DOMAIN NAME of the Server ProxyType=auto WinStationDriver=ICA 3.0 Username= Domain= Password= InitialProgram= WorkDirectory= ClientAudio=On ScreenPercent=100 DesiredHRES=1024 DesiredVRES=768 DesiredColor=8 [WFClient] Version=2 The above just gives the user remote desktop to the server. The question is how do I bring up all the Apps in farm via TCP/IP. The Citrix online plugin does not allow the same access as Program Neighborhood did to farms. Please help.

    Read the article

  • Ngingx max worker_connections and access log

    - by MotoTribe
    I'm troubleshoot an issue with my site. I'm seeing in the ngingx-error.log that the max worker_connection limit has been reached when the site went down. I'm not seeing an increase of requests during that time in the ngingx-access.log. Does that mean the mysql database had a bottleneck at that time that caused the requests to queue up? Or would it not log any requests that where made after the max worker_connection limit has been reached?

    Read the article

  • Java Security filter together with thickbox pop-ups

    - by user197127
    Hi, I have a java application that uses a security filter to protect certain resources. If there is no user logged on, it will keep in session the request path and redirect to a logon page. After a successful logon, user is redirected to the original requested page. I have now added some thickbox (ajax bases pop-up) popups to the application. Unfortunately, when I get now a popup that is "secure" the filter redirects to a logon page (which is not a popup) and makes the whole application messy. Anyone with ideas on how to solve this? Thanks

    Read the article

  • Access to MediaShield RAID utility

    - by Serg
    I'm using RAID-1 configuration on a PC which will be accessible by many people who are not very experienced with computers. So I'd want to restrict access to MediaShield RAID configuration utility with pops-up on every boot proposing to press F10 button. Is there a way to hide that boot message or protect the utility with a password?

    Read the article

  • ASP .Net User Roles - ordering for a drop down.

    - by ilivewithian
    We are using the standard aspnet security features, we have need to set the order of the roles, purely for display purposes. We could just have a sequence number onto the end of the aspnet_roles table, but that feels kinds of hacky to me. Also if in future versions of asp the security get changed we will be in trouble. Is there a better way to do this that won't make me loose sleep each time a new version is pushed out?

    Read the article

  • How to access this server?

    - by George Edison
    I have a server that I cannot access. At first I thought it was just some temporary failure with the server, but checking from other IP addresses reveals that it is working just fine. It's only my IP address that's failing. So here is what I've tried: nslookup - resolves correctly ping - 100% packet loss using the IP address or domain traceroute - first few hops work, but from about 6 and on, I just get stars Edit: I am using OpenDNS for DNS resolution, and as mentioned above, the problem is not DNS resolution anyway.

    Read the article

  • Security in HTTP Adapters

    - by Debopam
    I just started using IBM Worklight 5.0. I have been going through the HTTP Adapters recently and have successfully been able to Run as "Invoke Worklight Procedure". But I am stuck with the Adapter execution in the App. To my knowledge I think this is some kind of security issue where the client request to Worklight Server is unauthorized (401). Can any tell me or refer to some blog/website where there are steps to overcome this problem? I already got some of the websites but at this moment I am really confused on how to use them.

    Read the article

  • Postfix configuration (relay access)

    - by jome
    I have just installed POSTFIX on a Debian box, I pointed the relay host config setting to an exchange server which will deliver the mail to external users. So what I am trying to do is telnet to the debian box and send an email to [email protected] which will then be past to the exchange server for delivery. The problem is I get the following: rcpt to:[email protected] 554 relay access denied I have seen a section in the config "mydestination" but i want the exchange server to decide which domains it will deliver for and not the POSTFIX server.

    Read the article

  • Security when writing a PHP webservice?

    - by chustar
    I am writing a web service in PHP for the first time and had ran into some security problems. 1) I am planning to hash passwords using md5() before I write them to the database (or to authenticate the user) but I realize that to do that, I would have to transmit the password in plaintext to the server and hash it there. Because of this I thought of md5()ing it with javascript client side and then rehashing on the server but then if javascript is disabled, then the user can't login, right? 2) I have heard that anything that when the action is readonly, you should use GET but if it modifies the database, you should use POST. Isn't post just as transparent as GET, just not in the address bar?

    Read the article

< Previous Page | 272 273 274 275 276 277 278 279 280 281 282 283  | Next Page >