Search Results

Search found 635 results on 26 pages for 'bypass'.

Page 9/26 | < Previous Page | 5 6 7 8 9 10 11 12 13 14 15 16  | Next Page >

  • How to detect Java agents, JVMTI, etc...

    - by Andrew Westberg
    How does one secure the Java environment when running on a machine you don't control? What is to stop someone from creating a java agent or native JVMTI agent and dumping bytecode or re-writing classes to bypass licensing and/or other security checks? Is there any way to detect if any agents are running from Java code? From JNI? From a JVMTI agent?

    Read the article

  • Allowing the specific format of email address in MVC input

    - by user219315
    Hi I have a page in MVC where i want to take the email adddress as the input which can be of format like:"Jone Davi" <[email protected]>, "Ben Miller" <[email protected]>, "Jane Ton" <[email protected]>, Then from this I want to parse the valid emailaddress.But on click of the submit button getting error message" A potentially dangerous Request.Form value was detected from the client " Thus is there any way to take the input of email address in above format and bypass the security error for that specific page. Thanks in advance.

    Read the article

  • Why is the ( ) mandatory in the SQL statement select * from gifts INNER JOIN sentgifts using (giftID

    - by Jian Lin
    Why is the ( ) mandatory in the SQL statement select * from gifts INNER JOIN sentgifts using (giftID); ? The ( ) usually is for specifying grouping of something. But in this case, are we supposed to be able to use 2 or more field names... in the example above, it can be all clear that it is 1 field, is it just that the parser is not made to bypass the ( ) when it is all clear? (such as in the language Ruby).

    Read the article

  • private home proxy server

    - by Ben
    How do I make a proxy site for a home URL (EX: 192.168.1.190) to bypass the web filter we have set? Don't worry, I am in cahoots with the person that monitors this stuff, so this is for that person. Thanks!

    Read the article

  • Deactivate Air app created in AS3 after next monday?

    - by Carlos Barbosa
    Hi, i have an application deployed in Air, written in AS3 that client wants to install and test, i have developed a simple license app, but he is pushing for a full license witch he said he will fully paid on next monday. How would you create a procedure in AS3 to deactivate application next monday? How secure will it be? will simply changing machine date will bypass this?

    Read the article

  • Using @Secured Annotation causes IS_FULLY_AUTHENTICATED problem in grails

    - by TripWired
    I'm using Acegi/Spring Security in grails and when i use the annotations like @Secured(['ROLE_ADMIN']) it denies my login even though the user is part of ROLE_ADMIN. In looking through the login is it seems that it's getting an IS_AUTHENTICATED_FULLY role also but I have never added that to a page so i'm not sure how to bypass that. I read somewhere to preauthorize the user, but i'm not sure how to do that with grails.

    Read the article

  • TFS Check in rules

    - by NPehrsson
    Hi I'm out of setting up an TFS server and I want to set some check-in rules. I for example want to be able to set rules about method lenght, complexity and so on, I found NDepend very convenient can I somehow use NDepend to run some rules on the files trying to check in. I also want to be able to bypass the rules sometimes. Are there any blogs or discussions around this, if it wont work with NDepend are there any other tools or ways I can use?

    Read the article

  • In mercurial, is there a way to disable ALL configurations (system, user, repo)?

    - by Geoffrey Zheng
    On any non-trivial hg installation, the hgrc's tend to contain significant stuff. Is there a way to completely ignore/bypass ALL configurations, from system, user, to repo-level? The use case is to use some hg core functionalities in some automation scripts. Currently, if anything is misconfigured (and I mess with my ~/.hgrc a lot), the scripts will abort for something it doesn't use at all. It'd be perfect is I can just hg <whatever> --config:none.

    Read the article

  • .NET read binary contents of .lnk file

    - by Flores
    I want to read the binary contents of a .lnk file. As long as the target of the shortcut (lnk file) exists this works fine with IO.File.ReadAllBytes(string file). BUT If the target of the shortcut does not exist (believe me I want this) the method only returns zero's. I guess this is because the OS follows the link and if it does not exist it returns zero's Is there some way to bypass the fact that the framework follows the target of the .lnk before displaying the contents of the .lnk file?

    Read the article

  • Android: Issue with acceptable file types via bluetooth

    - by poeschlorn
    Hi guys, i've got a problem with pushing files to my nexus one: It seems to me that there is only a small selection of file types that are accepted by my phone (such like jpg, gif and so on). I recently tried to push other files to my phone (in my case gpx) and my phone has rejected it automatically... is there a way to bypass or extent this filter? Is there also a way to catch those files by a service? greets, poeschlorn

    Read the article

  • Watin: file upload ...without file selection window?

    - by user526186
    with "file upload" HTML like this: <input name="input_name" type="file" size="40" /> ...there is no way for users to directly enter text into input area for security reasons, correct? file selection window pops up instead. In Watin automation project, we are wanting to bypass the file selection window and place filename directly in text entry area - but we are not finding a way to do this. How can this be accomplished? ...or perhaps it cannot be done?

    Read the article

  • ajax cross-domain requests

    - by yoda
    Hi, Since Ajax requests are limited for security reasons, there's not much to it, just follow the rules eh .. but I've crossed with this : https://developer.mozilla.org/en/Same_origin_policy_for_JavaScript It's written that you can "bypass" those rules, in case you're working with subdomains of the same domain, with the following javascript line : document.domain = "company.com"; I haven't tried it yet, since I don't know if this only works (perfectly works) with any other browser, or at least the major ones. Is it possible? Thanks.

    Read the article

  • Redirect in Application_Error redundant if using customErrors?

    - by Ek0nomik
    If I have a customErrors section in my Web.config that says to redirect to Error.html, then putting code in the Application_Error method in the Global.asax to redirect to Error.html is redundant is it not? Technically, I could bypass the Web.config by redirecting to a different page in the Application_Error method if I wanted to, but since I don't want to go to a separate page I don't think I need the code.

    Read the article

  • How do I cache query results using LINQ?

    - by Vince
    Hi, Is there any way to cache LINQ to SQL queries by looking at the parameters that were previously passed and bypass the database all together? I know L2S caches some database calls, but I'm looking for a permanant solution as in, even if the applciation restarts, that cache reloads and never asks the database again. Are there any frameworks for C#?

    Read the article

  • JUnit @Rule to pass parameter to test

    - by 01
    I'd like to create rule to be able to do something like this @Test public void testValidationDefault(int i) throws Throwable {..} Where i is parameter passed to the test by @Rule. However I do get java.lang.Exception: Method testValidationDefault should have no parameters is there any way to bypass it and set the i parameter in the @Rule?

    Read the article

  • Will this only allow certain extensions?

    - by Dr Hydralisk
    I found this snippet that says will only allow certain file types. Will it work and could someone bypass it to upload what ever file type they want? And could someone explain the substr part, i don't get how it works.. <?php function CheckExt($filename, $ext) { $name = strtolower($filename); if(substr($name, strlen($name) -3, 3) == $ext) return true; else return false; } ?>

    Read the article

  • Remote Desktop in Linux like Team Viewer

    - by crissangel
    For Remote Desktop Sessions in Linux, I want to know if there something available equivalent for what Team Viewer does for windows? The main advantage I find of Team viewer is that it can bypass firewalls, needs no NAT configurations or port forwarding rules to be setup in the router.

    Read the article

  • How to manipulate JavaScript

    - by bojanski
    Hello, I was wondering if there was any way to manipulate JavaScript execution on predetermined action on a certain website. Thus meaning if there will be an action on mouse hover, is there a way to bypass the Javascript execution? Thank you on your time, bojanski

    Read the article

  • SQL Server 2008 2mb Limit for XML??

    - by Nai
    I am trying to output a long XML result from SMSS. When I right click on the results and 'save results as...', I can only get a 2mb file? I have changed the settings in SMSS via Tools - Options - Query Results - SQL Server - Results to Grid, for XML data to be unlimited. Forever, it still seems to be truncating my XML results? So, how can I bypass this problem and output my XML result to a file? Thanks

    Read the article

  • GoogleAppEngine web proxy

    - by Cal S
    Does anyone know of a simple open source proxy capable of running on google app engine or where to start in making one? (preferably in python, I'm trying to bypass a site blocking system)

    Read the article

  • Sql string adding problem

    - by Woland
    SELECT a.one + ' test ' +b.two from table1 a right join table1 on a.id =b.id The problem is that when one is null then it the whole string is null, is there some kind of trick to bypass this problem msSQL 2005

    Read the article

< Previous Page | 5 6 7 8 9 10 11 12 13 14 15 16  | Next Page >