All Questions
21 questions
0votes
1answer
176views
Site "can't" change username, why? [closed]
There's a website I have an account on, and I needed to change my username. They said they were unable to change that. I requested to just have my account deleted, and then I would create a new ...
0votes
0answers
150views
What are my vulnerabilities with this multi-user ACL database approach?
I would like some expert insight. I want to know what my vulnerabilities for this model are. This is a demo project that I will be following in my production app if all works out securely. My ...
0votes
2answers
873views
Is it possible to hack a database inside of local network by external attacker?
Can an attacker from global network hack a database located on office machine inside of local office network? For example after hacking a router, a gateway or the very machine? Or maybe there is ...
0votes
1answer
526views
public MySQL via XAMPP - security - whitelisting IP's versus VPN
I'm working on app that uses MySQL database on XAMPP Control Panel on Windows. I am concerned about security part. I received advice about connecting to MySQL through VPN so it won't be accessible so ...
6votes
1answer
305views
Working on sensitive data on the cloud
In my current project for an NGO, I have to set up a system that allows members of the organisation to perform basic analysis on highly sensitive data. The data (reports, or form submissions) is ...
1vote
1answer
194views
Is it an security issue to have php change files?
I wrote some code which uses information from database to change content of various files and write something back to database afterwards. This code is completly written in php and gets executed when ...
0votes
2answers
2kviews
Setting up communication between internal database and hosted web server by third party
I am trying to figure out the best and most secure way to do this, if it is possible to do it safe and secure. Small company. We have a hosted web server from a third party that serves our client web ...
-4votes
1answer
472views
Safest SQL database [closed]
I am going to run a Tor Hidden Service on a Linux server. My site will have an SQL database. This DB contains user login, and a few other basic details. If it makes a difference depending on the ...
1vote
0answers
113views
Hosting companies by AS Number [closed]
Is there any website out the like bgp.he.net (Hurricane Electric) or ipv4info.com that has a database with all VPS/Dedicated Server comapnies filtered by AS Number? I know that there are plenty of ...
-5votes
1answer
2kviews
What is the most secure database? [closed]
I need to learn about database systems, but first I need to know which is the safest. For example, information like government data need to be protected, so what is the best database to handle this ...
1vote
3answers
183views
Securing online SQL database and server [closed]
I am trying to build a big project but lack the knowledge of security of servers and SQL. So, please help me by telling what necessary steps should i take. Block all remote access :- I have heard that ...
4votes
1answer
133views
How do I protect the stored clients' public keys on a server?
I'm learning about security at the moment, and I want to store my clients' public keys on the server to facilitate distributing and managing those keys, my question is what are the possible ways to ...
3votes
3answers
1kviews
Is using a sqlite with random name file secure?
As you know, SQLite have no security mechanism. My question is if i change the database file into some random name like '22OYIz23tmpyesTcMVFmw1tquFxzCIQD.sqlite' can someone exploit my database and ...
-2votes
2answers
2kviews
Don't store passwords in database? [closed]
Where might someone keep them besides a database? By storing passwords elsewhere I mean a non-traditional database. Allow me to explain. A couple of my friends run high security websites. They ...
1vote
0answers
334views
Is there a solution for On-the-fly-encryption with active directory rules & policies?
I am looking at having our servers' sql databases for a few program and documents to be always encrypted on the HDD, but available to AD users. So one or multiple users with the right AD privileges ...