Search Results

Search found 17646 results on 706 pages for 'security warning'.

Page 430/706 | < Previous Page | 426 427 428 429 430 431 432 433 434 435 436 437  | Next Page >

  • c#: storing lots of data in my.settings

    - by every_answer_gets_a_point
    i will need to store 3 tables of data instead of implementing an entire database backend, i just want to store the record for these tables in application.settings has anyone done this before? i dont care about security is it advisable to do it with application settings? how else would you do it? perhaps storing a matrix in application.settings would be OK?

    Read the article

  • FormsAuthentication AuthCookie data type

    - by FreshCode
    Does the original data type of the username string in a call to FormsAuthentication.SetAuthCookie(...) make any difference with regards to security or code maintainability? As I understand it, the cookie is encrypted and used to identify a user on each request. I'm curious whether it should affect the design of the primary key on my Users table in my database, eg. Guid vs int or a unique username string.

    Read the article

  • Does anybody actually use the permissions policy controls in tomcat?

    - by stu
    While I can appreciate the point of the fine granularity in which you can enable security for every single little thing for each individual application in tomcat, in reality, it's an insane pain in the ass. Every single file, socket, everything for every single application. Sure if you're writing a "hello world" application, it's not too much to ask, but an enterprise sized application? That's insane. Does anybody actually use it, or does everybody just say "*" for everything?

    Read the article

  • Why is chrome slashing my HTTPS?

    - by John Isaacks
    In Chrome when I view my page the https in the URL has a red slash through it. When I click it, it says: Your connection to www.example.com is encrypted with 256-bit encryption. However, this page includes other resources which are not secure. ... I am not getting the mixed content warning in IE or FF. Is there a way to get Chrome to tell you exactly what/where is causing the issue? I am having trouble finding what is causing Chrome to throw a hissy fit. I searched my source for any http that does not contained https but am not seeing any. It would be nice if there is an easy way to pinpoint the issue.

    Read the article

  • How to fix the size of the <html:select> combo box (contents may be larger but the combo size should

    - by DSB
    Hello all , How to fix the size of the combo box (contents may be larger but the combo size should be fixed).Now my combo size is changed based on the items in the combo. I'm trying to get something similar to the yahoo sign up page security Question combo: https://edit.yahoo.com/registration?.src=fpctx&.intl=in&.done=http://in.yahoo.com/ my code: Text which decides the size of the combo

    Read the article

  • Android Device Management

    - by Jon Hopkins
    I'm looking at the possibility of using Android as a secure corporate mobile platform. One of the pre-requisites for this will be a way of managing multiple devices, security policies, software deployment, that sort of thing - essentially the things the BlackBerry Enterprise Server handles for BlackBerry or MDM (or something 3rd party like SOTI) handles for Windows Mobile. Does such a thing exist for Android? It's a platform we're interested in but without this right now (and we're not in a position to build it ourselves) it's a non-starter.

    Read the article

  • Nightly backups (and maybe other tasks) causing server alerts

    - by J. Pablo Fernández
    I have two independent alert notification systems for my servers. The server is a virtual machine on Linode and one of the alerts comes from Linode. The other monitoring system we use is New Relic. They are both watching out for IO utilization. Every night I get alerts from both of them as the server is using too much IO. I run quite a few tasks in the middle of the night but the one I confirmed that can cause IO-warnings is running the backups. The backup is done by s3cmd sync. I tried ionice but it still generates the warnings. Getting warnings every night reduces the efficacy of warnings when they happen for real. For Linode I could raise the level at which a warning is issued, but it might mean making the whole thing useless as the level is too high. What would be the proper solution for this?

    Read the article

  • IE has restricted this webpage from running scripts problem

    - by moustafa
    Hi, I would like to have some rotating sequential images on my home page of my website. I do not know how to do this and have found code on the internet for only displaying random images. The main problem is this. Every time the page loads I get a pop-up "to help protect your security, IE has restricted this webpage from running scripts or ActiveX controls that could access your computer". Please can someone help prehaps with an example to enable this to work without this pop-up Thanks Richard

    Read the article

  • Fedora 14 - Error 5 - No space on Disk - After installation.

    - by amitahire
    I am new to Fedora, am still figure my way through it. I was going about tweaking it and preparing it to my needs, While installing through yum I dont have much other than the fact that I have to search for the packages. But when I open "Add/remove software" of Fedora. I am greeted with " No space left on the disk" and when I seek for more details it says " Disk Error :[errno 5] Input/output error" I did some research and I saw that it usually occurs during installation, but here I have successfully installed it. Can someone help me with it? Later on I even had notification of the same warning. And mind you I got loads of free space. Thanks for the help

    Read the article

  • Looking for a simple CMS with WYSIWYG and image gallery

    - by abeger
    I'm building a new site that consists entirely of: 8-10 pages of static content that rarely changes (like once every few months or once every year) An image gallery Since I don't plan to be the primary maintainer of the site, I'd like to use a CMS with some security and a WYSIWYG editor so non-web-savvy people can tweak the site when necessary. I started out using Drupal, but started wondering if it was overkill. So, two questions: 1) is it overkill? 2) What CMS would you recommend for a project this simple?

    Read the article

  • SVNNotify Where is it? how do I find it?

    - by John Isaacks
    I am on ubuntu. ok first of all I am running a post-commit script. I need the path to svnnotify to run it. The path the turotial I am reading has it as /usr/local/bin/svnnotify but nothing is in that location on my computer. I tried it anyways and I get something like: Warning post-commit hook failed: not found so I think I need to replace /usr/local/bin/svnnotify with the correct path to svnnotify. Well I do a search (Places>Search for Files) for svnnotify and nothing comes up. I know svnnotify is installed becuase if I open a command line and run svnnotify it tells me I am missing the required path argument. So how can it be installed if its not in the file system anywhere? I don't really know how linux works, its very new to me, so I am confused. Is there something I am missing?

    Read the article

  • Replacing a non-failing drive in a RAID-0 array [migrated]

    - by TallFurryMan
    I have a Windows 7 machine booting on a RAID-0 pair of 500GB disks, controlled by an ICH9R. One of those is indicating an end-To-end SMART failure. I added a spare disk as a temporary workaround, before receiving another to replace the failing one (prices are awful these days). The RAID-0 rebuilt on the spare and dropped the failing one from the array, as expected. Now that I received the new drive, what are my options to reintegrate it in the array? My first thought was to simply clone the temporary disk to the new one while the array is offline, but shouldn't there be a way to force a second rebuild, just as if the temporary drive had a warning, and drop that temporary from the array?

    Read the article

  • Nagios state transition and event handler issue

    - by Dattatray
    We are using Nagios to check duplicate processes. define service { use local-service host_name xxx service_description xxx Duplicate Processes check_interval 1 max_check_attempts 1 contact_groups admins event_handler restart-dependent-processes check_command check_procs_duplicate!2!3!2!2!2 } check_procs_duplicate checks if there are any duplicate processes and returns the state - e.g. CRITICAL. The event handler kills the duplicate processes and it's dependent processes and starts one instance of the process and dependent process. At the end of this again Nagios checks if there are any duplicate processes and sets the state accordingly - OK/WARNING/CRITICAL. The event handler takes more time to start the processes and during this time if someone manually starts the process, the state will remain in CRITICAL itself. During the next interval, Nagios will again check for duplicate processes and it will find it again CRITICAL. The event handler will not get executed now, as the previos and current both the states are CRITICAL. Any pointers about how to fix this issue?

    Read the article

  • How to delete a file with javascript?

    - by Tommy
    Did not have luck with these examples: Javascript File remove Javascript FSO DeleteFile Method Deleting a File There are no special permissions on the file. Is there a way to do this in JQuery? The requirement is - a certain file must be deleted from the web directory when another page is loaded. There is no security issue as this is on a closed network. Any help is appreciated. Thanks.

    Read the article

  • php joomla session lifetime settings

    - by jtanmay
    I have searched through the google and also joomla forums but didn't got what exactly I was looking for. My main purpose is to set the joomla session live for ever. Many forums says its not good to keep a higher value (security issues) but I don't want to consider that right now. My question is : What if I set the session lifetime value to "0" (Zero), will the session be active for ever? or the user will NOT be able to login completely? Thanks, Tanmay

    Read the article

  • session fixation

    - by markiv
    Hi All, I am new to web development, and trying to get a hold on security issues. I went through this article on http://guides.rubyonrails.org/security.html these are some of the steps the author has mentioned how an attacker fixes session. 1. The attacker creates a valid session id: He loads the login page of the web application where he wants to fix the session, and takes the session id in the cookie from the response (see number 1 and 2 in the image). 2. He possibly maintains the session. Expiring sessions, for example every 20 minutes, greatly reduces the time-frame for attack. Therefore he accesses the web application from time to time in order to keep the session alive. 3. Now the attacker will force the user’s browser into using this session id (see number 3 in the image). As you may not change a cookie of another domain (because of the same origin policy), the attacker has to run a JavaScript from the domain of the target web application. Injecting the JavaScript code into the application by XSS accomplishes this attack. Here is an example: <script>?document.cookie="_session_id=16d5b78abb28e3d6206b60f22a03c8d9";?</script>. Read more about XSS and injection later on. 4. The attacker lures the victim to the infected page with the JavaScript code. By viewing the page, the victim’s browser will change the session id to the trap session id. 5. As the new trap session is unused, the web application will require the user to authenticate. 6. From now on, the victim and the attacker will co-use the web application with the same session: The session became valid and the victim didn’t notice the attack. I dont understand couple of points. i) why is user made to login in step5, since session is sent through. ii) I saw possible solutions on wiki, like user properties check and others why cant we just reset the session for the user whoever is login in when they enter username and password in step5? Thanks in advance Markiv

    Read the article

  • Knowing the user name in a Page

    - by ctacke
    Let's assume the following: I have an IIS web site set up IIS is configured to use Digest authentication I'm running an ASP.NET page The page has a code-behing assembly that overrides Page_Load When a user navigates to that page, I get a security prompt for the username and password. If the username and password are invalid (i.e. incorrect password) is there a way for the called page, in Page_Load to know, or does IIS handle this and return the 401 before the ASP.NET engine ever gets around to resolving the actual Page class that will get executed?

    Read the article

  • Business Units vs Teams in CRM 2011

    - by GuruJ
    I've been told a few times that Business Units in CRM 2011 are "tricky" and shouldn't be set up lightly since they have irreversible consequences for a CRM 2011 implementation. On the other hand, teams in CRM 2011 seem much more flexible in managing record security. For what reason would I still choose to set up Business Units in CRM 2011? What can I do with Business Units that I can't with Teams (and vice versa)?

    Read the article

  • load and execute assembly from arbitary directory

    - by bitbonk
    How can I load, reflect on and then instanciate types of an assembly that is in an arbitary directory on the system using Assembly.Load or similar without having to modify any security settings for the runtime on the machine. The user should be able to specify the name and location at runtime.

    Read the article

  • User permission check steps in CakePHP

    - by bancer
    I want to understand the sequence of steps how it is verified that a user has permission to particular application page ('Acl', 'Auth', 'Security' components are used). For example, a visitor clicks a link on another site that directs him to my application. What is the sequence of steps that my application does to verify that this user has access to the page? What controllers and methods are called?

    Read the article

  • Is there a way I can find if my hard disk data was stolen? [closed]

    - by Bridget
    How can I tell if the repair shop stole my hard drive? I had my computer in the shop for a couple of days to get a diagnostic check and he quoted me $130. I have a family member who said he would do it for $30 so I rejected the offer and requested it back. When he returned it I hooked it back up and now I get a low disk space warning; when I dropped it off I had at least 50 gb of space left, on a total of 149 gb and all my pictures movies, and music are gone. Can I find if he indeed did steal my hard drive or something?

    Read the article

< Previous Page | 426 427 428 429 430 431 432 433 434 435 436 437  | Next Page >