• Security Topics

    February 14th, 2011
    Security TopicsContent Management Software
    content/attachments/13408-createwithwordpress-jpg.html YNOT Ė In the previous article, we saw how to configure Apache to prepare for the installation of WordPress.

    Today we will focus on using WAMP and phpMyAdmin to configure MySQL, the database we installed.

    WAMP (installed here) creates a root account in MySQL, but the security is very weak because no password is required to gain access to the root account. The first thing we will do is create a special access key to increase the level of security for our database.

    Launch WAMP, and then left-click on the system tray icon that looks like a tachometer. Select phpMyAdmin from the pop-up menu. Your default browser will open to an administration panel that will allow you to manage ...
    Read More Read More
    December 16th, 2004
    Security Topics
    Article Preview If you read last weekís article on privacy and security then you have a pretty good idea where this series is heading. Last week I introduced the basic topic of online security and privacy and focused on the advantages of anonymous web surfing.If you read last weekís article on privacy and security then you have a pretty good idea where this series is heading. Last week I introduced the basic topic of online security and privacy and focused on the advantages of anonymous web surfing. We covered the basic privacy issues that arise from unmasked IP addresses, and we discussed some basic scenarios where anonymity might prove important to an adult webmaster; but we ...
    Read More Read More
    December 9th, 2004
    Security Topics
    Article Preview Despite a number of high-profile attempts by members of various business, civilian and political groups to elevate the discussion on security and privacy, most internet users know very little about these topics.Despite a number of high-profile attempts by members of various business, civilian and political groups to elevate the discussion on security and privacy, most internet users know very little about these topics. Security for most users means buying a virus package from one of the major vendors and hoping the default settings are sufficient protection. Yet the casual approach to security and privacy is just what the ďbad guysĒ are ...
    Read More Read More
    November 18th, 2004
    Security Topics
    Article Preview When I got started in the security of adult sites back in 1995 it was all about passwords. Every time a password would get posted to the web the exposed siteís server would quickly get overloaded and crash.When I got started in the security of adult sites back in 1995 it was all about passwords. Every time a password would get posted to the web the exposed siteís server would quickly get overloaded and crash. I remember writing complex scripts to thwart password sharing and hacking attempts. I even went so far on some sites as to generate random passwords instead of letting the users choose their own passwords, which made things even more secure. We used all available methods to keep ...
    Read More Read More
    October 28th, 2004
    Security Topics
    Article Preview If you are serious about your adult business then we suggest you read this article. An adult Webmaster who believes that PC security issues havenít changed recently is truly mistaken. Let me show you why hackers will always be one step ahead, and let me explain to you why it is important to choose your protection wisely.If you are serious about your adult business then we suggest you read this article. An adult Webmaster who believes that PC security issues havenít changed recently is truly mistaken. Let me show you why hackers will always be one step ahead, and let me explain to you why it is important to choose your protection wisely. Without taking the proper precautions you might be asking for big trouble without even knowing it.


    Password Authentication


    The need to authenticate a ...
    Read More Read More

    May 27th, 2004
    Security Topics
    Article Preview If you are serious about your adult business then we suggest you read this article. An adult Webmaster who believes that PC security issues havenít changed recently is truly mistaken. Let me show you why hackers will always be one step ahead, and let me explain to you why it is important to choose your protection wisely.If you are serious about your adult business then we suggest you read this article. An adult Webmaster who believes that PC security issues havenít changed recently is truly mistaken. Let me show you why hackers will always be one step ahead, and let me explain to you why it is important to choose ...
    Read More Read More
    November 20th, 2003
    Security Topics
    Article Preview The very first thing that should be on your network is a GOOD firewall. I canít tell you how many times that I have seen people think that Black ICE and other software-like firewalls will protect you.For those of you hosting your own sites or thinking about it, let me fill you in on what steps you really need to go through to protect your network.

    Hardware:

    The very first thing that should be on your network is a GOOD firewall. I canít tell you how many times that I have seen people think that Black ICE and other software-like firewalls will protect you. They can show you an attack ...
    Read More Read More

    November 20th, 2003
    Security Topics
    Article Preview The very first thing that should be on your network is a GOOD firewall. I canít tell you how many times that I have seen people think that Black ICE and other software-like firewalls will protect you.For those of you hosting your own sites or thinking about it, let me fill you in on what steps you really need to go through to protect your network.

    Hardware:

    The very first thing that should be on your network is a GOOD firewall. I canít tell you how many times that I have seen people think that Black ICE and other software-like firewalls will protect you. They can show you an attack ...
    Read More Read More

    November 6th, 2003
    Security Topics
    Article Preview Password protection and user authentication for http servers like the open source Apache and Microsoft iis comes in two standard flavors. These password protocols are defined in rfc 2617 as Basic Authentication and Digest Authentication.Password protection and user authentication for http servers like the open source Apache and Microsoft iis comes in two standard flavors. These password protocols are defined in rfc 2617 as Basic Authentication and Digest Authentication. You might also see them called security protocols or authentication protocols. These mechanisms are expected to be supported universally in all standards-compliant http clients and http servers.

    ...
    Read More Read More

    November 6th, 2003
    Security Topics
    Article Preview Password protection and user authentication for http servers like the open source Apache and Microsoft iis comes in two standard flavors. These password protocols are defined in rfc 2617 as Basic Authentication and Digest Authentication.Password protection and user authentication for http servers like the open source Apache and Microsoft iis comes in two standard flavors. These password protocols are defined in rfc 2617 as Basic Authentication and Digest Authentication. You might also see them called security protocols or authentication protocols. These mechanisms are expected to be supported universally in all standards-compliant http clients and http servers.

    ...
    Read More Read More

    Page 1 of 4 123 ... LastLast
1 2 3 4 5