[Solved] How can I secure my source code [closed]

As Royal Bg mentions in the comments, if they have the source code, there’s no way you can secure it against them making a separate copy. As you mention, any attempt at a licence key, or any other type of method, they’d be able to get around. solved How can I secure my source code … Read more

[Solved] Virus signature extraction form malware [closed]

Retrieving a “signature” could be as simple as generating a digital signature via hashing for the virus(es) respective binaries. MD5 or SHA. I.E. implementing the following functionality in your code that I’m sure you’ve already started…: md5sum virus -> md5hashofvirus | md5sum virus2 -> md5hashofvirus2 Complete dossier of md5sum available here. MD5 implementation in C … Read more

[Solved] How to secure javascript code from being run on other domain (stolen) ? need more ideas

No matter how complex you make your code, it can always be read, if necessary with abstract interpretation, i.e. automatically capturing the essence of your code. Code without knowledge of internals, variable names (I assume you’re already using minimization, for example with the YUI compressor), documentation, support, and generalization is worthless for anyone else. If … Read more

[Solved] What is the purpose of $connect in mysqli_real_escape_string($connect, $username)? [closed]

Per the docs: Security: the default character set The character set must be set either at the server level, or with the API function mysqli_set_charset() for it to affect mysqli_real_escape_string(). See the concepts section on character sets for more information. And therein lies the reason for having the connection: how to escape your string depends … Read more

[Solved] C++ vulnerability issue with pointers

a=b; After this assignment a points to the same location as b (“Secure Coding”). You have lost any reference to the initial location pointed by a, so essentially “Insecure Coding” is garbage that cannot be freed. Another issue is that you are freeing the same pointer twice. After the first free you no longer own … Read more

[Solved] Numbers only password strength [closed]

The regular expression is: ^((?!(?<ch>.)\k<ch>\k<ch>)(?!012|123|234|345|456|567|678|789|890)[0-9]){8,}$ The (?!(?<ch>.)\k<ch>\k<ch>) will check for the same character repeated thrice. Note that for the various contiguous sequences I had to put them in a list of possible sequences, (?!012|123|234|345|456|567|678|789|890). [0-9] is the character that will be accepted as valid. The {8,} is for the minimum length. 1 solved Numbers only … Read more

[Solved] How to configure the user_token of Damn Vulnerable Web Application within CSRF field while Script based authentication using ZAP?

The modified script within the documentation of Script Based Authentication section for Damn Vulnerable Web Application using ZAP seems incomplete. The complete script is available at Setting up ZAP to Test Damn Vulnerable Web App (DVWA) which is as follows: function authenticate(helper, paramsValues, credentials) { var loginUrl = paramsValues.get(“Login URL”); var csrfTokenName = paramsValues.get(“CSRF Field”); … Read more

[Solved] Reversible Hash in C#

The most space efficient way to store binary data is to store it as bytes. The only way you may get it even shorter is via compression. But for 92 Characters that will not amount to much. As for Base64: There are cases where we are forced to transmit binary data over a medium not … Read more

[Solved] How Secure Is This Login System? (Using Cookies In PHP)

Here’s a non-exhaustive list of problems/solutions: Your code is difficult to read because it is not properly indented. You should use prepared statemens to guard against SQL-injection. You give hints to hackers by having different error messages. When the username is correct and the password wrong you say: “Login/Password Incorrect :(“, but if the username … Read more