OSX is BSD. You do know that right?
FreeBSD to be exact JAVA Vulnerabilities were cross-platformed....
Nope since Apple does do security patches on their own, and has nothing to do with oracle so that is incorrect.
|
|
|
Somethign about White Dudes that can rap real fast... its sooo... sooo.. Eminemtastic!
if you like white dudes that can rap fast take a look at watsky http://www.youtube.com/watch?v=I6XLswqiX0she is really good but yea they are descent, maybe pass some coins to them
|
|
|
I just had a meeting about this two nights ago. But its not just rap... we are going to use all Genres... If this was serious thread, I find it ironic. ![Smiley](https://bitcointalk.org/Smileys/default/smiley.gif) please keep us up to date, I was very serious! I would love to see some quality hip hop and rap promoting bitcoins
|
|
|
For the love of god, turn this off of a live server right now. It's like a poster child for an SQL injection exploit. Never. Ever. Ever. Ever. Ever. put raw, unsanitized data into your SQL query. mysql_real_escape_string() is not enough.
Also (and I'm guilty of this, I admit) do not die with the mysql_error. Give a generic message and log the error somewhere that is not open to the public.
but PDO would be over his head obviously, so can't really help him
|
|
|
What legal sense of the site?
|
|
|
Update on what the code looks like so far ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title><?php echo $title; ?></title> <!--CSS Files--> <link rel="stylesheet" type="text/css" href="assets/css/style.css" />
<body> <div id="members" class="group"> <?php echo $content; ?>
<?php <?php $con=mysql_connect('localhost', '', ''); if (!$con) { die('Could not connect: '.mysql_error()); } mysql_select_db("", $con); $username=$_POST['username']; $username=mysql_real_escape_string($username); $result=mysql_query("SELECT * FROM users WHERE username='$username'"); $row=mysql_fetch_array($result); echo "Email: ".$row['email']."<br/>"; echo "Username: ".$row['username']; mysql_close ($con); ?> </p> </body> </html>
Login Successful <p><a href="index.php\">Click here to logout!</a></p> </body> </html> remove the ?> at the top
|
|
|
Not an online wallet but Iprefer Armory for security. Paper back ups, offline wallet etc. I havent found anything more secure.
+1 Armory and it is security is amazing! no online wallet would be able to provide that level of security.
|
|
|
lol wow. Just wow. You may be suffering from brain damage.
Are you a troll?
no brain damage here and nope cause when it is fact you can't be a troll ![Wink](https://bitcointalk.org/Smileys/default/wink.gif)
|
|
|
Disable Java. Use a secure browser. Disable pdf extensions/addons in your browser. Get an extension/addon such as FlashBlock (Available for both Firefox and Chrome) which automatically blocks flash on websites until you approve them.
Actually java isn't an issue on mac, it has already been patched, remember any java less than 1.7 or java 7 is under apple's control so apple pushes the fixes and they do it very fast. Not an issue? 600,000 computers were infected through a java exploit. There's always the chance of new exploits in the versions Apple manages. Also, some people chose to install java 7. How many computers infected were mac? NONE! And the latest OS, mountain lion comes with java 6 so the exploit had nothing to do with those. So you clearly have no idea what your talking about. 100%. All 600,000 were macs because it was a mac trojan that used a java exploit (It first was disguised as a flash update). And about mountian lion, I said some people chose to upgrade to java 7. http://arstechnica.com/apple/2012/04/mac-trojan-exploits-unpatched-java-vulnerability-no-password-needed/http://arstechnica.com/apple/2012/04/flashback-infections-not-waning-after-all-650000-macs-still-hijacked/First off that was in april, second the one that was just running around had nothing to do with macs, it was all windows, and people that use java 7 i hope understand the risk but apple doesn't package java 7 they package java 6 which is pretty secure, so again you know nothing, do you even own a mac, probably not since you have no clue. Do you have short term memory loss? I stated twice so far that there are people on who chose to install java 7 (Oracle's build) so those mac users are then vulnerable. I understand that the trojan was in April, I'm pointing out that Java is a security issue against your bold and clueless claim "java isn't an issue on mac". That's what someone like you would say when they patched the java exploit that existed before the flashback trojan one. Java, Flash, PDFs are extremely common attack vectors. Disable autoloading those things to be secure. Even if you are running the latest patched versionHardly anyone installs java 7 look at the numbers, only if you have to, I have java 7 installed on my computer and never had an attack, there are security measures people can take, to prevent these things, but usually if your not doing shady stuff java isn't really insecure and people like you, say that is very insecure and have no idea about java. So get your facts straight and that April trojan was pretty much stop in the coming days. Any I am not arguing with someone who doesn't even have a mac or know anything about java but how to google "java trojan"
|
|
|
<?php $con=mysql_connect('localhost', 'user', 'pass'); if (!$con) { die('Could not connect: '.mysql_error()); } mysql_select_db("db", $con); $username=$_POST['skiz22285']; $username=mysql_real_escape_string($username); $result=mysql_query("SELECT * FROM users WHERE username='$username'"); $row=mysql_fetch_array($result); echo "Email: ".$row['email']."<br/>"; echo "Username: ".$row['username']; mysql_close ($con); ?>
he forgot a ; on the line of $username=mysql_real_escape_string($username)
|
|
|
5btc for a rasberry pi? Does it have gold connections LOL, that is worth 3 tops probably closer to 2
|
|
|
Disable Java. Use a secure browser. Disable pdf extensions/addons in your browser. Get an extension/addon such as FlashBlock (Available for both Firefox and Chrome) which automatically blocks flash on websites until you approve them.
Actually java isn't an issue on mac, it has already been patched, remember any java less than 1.7 or java 7 is under apple's control so apple pushes the fixes and they do it very fast. Not an issue? 600,000 computers were infected through a java exploit. There's always the chance of new exploits in the versions Apple manages. Also, some people chose to install java 7. How many computers infected were mac? NONE! And the latest OS, mountain lion comes with java 6 so the exploit had nothing to do with those. So you clearly have no idea what your talking about. 100%. All 600,000 were macs because it was a mac trojan that used a java exploit (It first was disguised as a flash update). And about mountian lion, I said some people chose to upgrade to java 7. http://arstechnica.com/apple/2012/04/mac-trojan-exploits-unpatched-java-vulnerability-no-password-needed/http://arstechnica.com/apple/2012/04/flashback-infections-not-waning-after-all-650000-macs-still-hijacked/First off that was in april, second the one that was just running around had nothing to do with macs, it was all windows, and people that use java 7 i hope understand the risk but apple doesn't package java 7 they package java 6 which is pretty secure, so again you know nothing, do you even own a mac, probably not since you have no clue.
|
|
|
Disable Java. Use a secure browser. Disable pdf extensions/addons in your browser. Get an extension/addon such as FlashBlock (Available for both Firefox and Chrome) which automatically blocks flash on websites until you approve them.
Actually java isn't an issue on mac, it has already been patched, remember any java less than 1.7 or java 7 is under apple's control so apple pushes the fixes and they do it very fast. Not an issue? 600,000 computers were infected through a java exploit. There's always the chance of new exploits in the versions Apple manages. Also, some people chose to install java 7. How many computers infected were mac? NONE! And the latest OS, mountain lion comes with java 6 so the exploit had nothing to do with those. So you clearly have no idea what your talking about.
|
|
|
Disable Java. Use a secure browser. Disable pdf extensions/addons in your browser. Get an extension/addon such as FlashBlock (Available for both Firefox and Chrome) which automatically blocks flash on websites until you approve them.
Actually java isn't an issue on mac, it has already been patched, remember any java less than 1.7 or java 7 is under apple's control so apple pushes the fixes and they do it very fast.
|
|
|
There is a HUGE security issue with your site, you just send me my password in CLEAR PLAIN text back to my email, not cool, better get work on adding some security.
I noticed that too and was gonna make a post about it. Also I don't think the site stores the pw in plaintext at least. Sites that do usually have a "recover password" option, but his site has a "reset password" option like most sites do that only store hashes. Either way plain text password being sent in emails is not smart.
|
|
|
It was a pass thru to an investment. That tier 1 investment has since default and has yet to pay out the bitcoins to the users. That is why they are so cheap.
|
|
|
There is a HUGE security issue with your site, you just send me my password in CLEAR PLAIN text back to my email, not cool, better get work on adding some security.
|
|
|
i have a mac. is there anyone out there that uses linux on your mac instead of os x? i want my computer to be as secure as possible, and i am willing to spend the time to learn. can someone point me in the right direction please?
I use a mac and love it, why you want to switch to linux? Mac is pretty secure, and get true crypt and learn to love it!
|
|
|
|