1,387 Topics

Member Avatar for
Member Avatar for Vito_6

I need to be verified asap please....the woman is waiting for me to pi k her up but erifi action must be be done first

Member Avatar for Dani
0
17
Member Avatar for Susan_22
Member Avatar for happygeek

A VPN, or Virtual Private Network to be formal, is a method of creating an encrypted data tunnel across the Internet from your device to a destination server. Although savvy home users and enterprises will operate their own VPNs (business-grade routers provide this functionality) for most folk, a VPN comes …

Member Avatar for New Beachboy
6
2K
Member Avatar for trayalex812

The rise in data usage and exponential growth of remote work in recent years has increased the need for reliable data centers all around the world. Since data centers are critical for wide-scale networking, data storage, and information sharing, they require exceptional security measures to safeguard them from rapidly evolving …

0
249
Member Avatar for Vincent_22

Logfile of Trend Micro Hijack This v2.0.5 Scan saved at 12:20:23, on 30/03/2022 Platform: Unknown Windows (WinNT 6.02.1008) MSIE: Internet Explorer v11.0 (11.00.19041.1566) Boot mode: Normal Running processes: C:\Program Files (x86)\EPSON Software\Epson Printer Connection Checker\EPPCCMON.EXE C:\Program Files (x86)\EPSON Software\Event Manager\EEventManager.exe C:\Users\vince\Desktop\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main, Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 …

Member Avatar for rproffitt
0
237
Member Avatar for Steven_40

I am recently joined an innstitute to learn ethical hacking from scratch and i am using Parrot os to learn hacking. IS is it good enough as compared to kali linux or shall I continue with parrot os only?

Member Avatar for Steven_40
0
195
Member Avatar for pritaeas

I'm looking to build an ASP.NET WebAPI/REST API (not Core) that should accept client certificates as authentication. I've found several examples, so I hope to be able to succeed. However, I'm looking to find out more on the inner workings so to speak of certificates and such, so I'm hoping …

0
33
Member Avatar for Vrushanjali

As I'm curious to know a instant messaging software for Government collaborations. When I was browsing for a knid of that software I found Troop Messenger though it's not a government app but it's providing messaging services for different platforms like political campaign software, chat api, on-premise and many more. …

Member Avatar for jwenting
0
113
Member Avatar for Scott_22
Member Avatar for Gazza2021

I bought a high end laptop off a guy I met in a pub he showed me the laptop and it was working fine and everything seemed absolutely fine, however 2 weeks later I goto login and it has been locked by the company it has been stolen from so …

Member Avatar for rproffitt
0
54
Member Avatar for dimitrilc

## Introduction ## Although not included in the headlines, the release of JDK 17 also added 3 sets of new methods to the class `java.lang.Process`: 1. `inputReader()` to read from stdout. 2. `inputWriter()` to write to stdin. 3. `errorReader()` to read from stderr. In this tutorial, we are going to …

3
1K
Member Avatar for dimitrilc

## Introduction ## There are many ways to design secure Java objects. In this tutorial, we are going to learn how to create secure Java objects by understanding **Accessibility**, **Extensibility**, and **Immutability**. ## Goals ## At the end of this tutorial, you would have learned: 1. Understand how and why …

Member Avatar for JamesCherrill
2
152
Member Avatar for dimitrilc

## Introduction ## In this tutorial, we will focus on how to manage IO permissions to read, write, and delete local files using the `SecurityManager` class. ## Goals ## At the end of this tutorial, you would have learned: 1. What policy files are and how to use them. 2. …

2
286
Member Avatar for demeateide
Member Avatar for lukevan

**What is phishing?** The idea is to educate the email recipient that the message is something they want or need, such as a request from their bank or a note from a neighbor, and that they should click a link or download an attachment. Every day, more emails are sent, …

Member Avatar for rproffitt
0
120
Member Avatar for Sri Meenakshi

Hi, I have a windows 10, HP 340. Due to the fact that I forgot the password, I added a picture password to access my computer. Today, as I gave the wrong pattern twice, it is asking me to give the initial password which I forgot. In order to change …

Member Avatar for rproffitt
0
61
Member Avatar for jkook

<html> <head> <title> Exercice 6</title> </head> <body> <h1>Hello</h1> <script language= "java script"> var N=prompt("Choisissez entre: 1-addition et 2-multiplication",""); if (N==1) { document.write("<table border="2" align="center" rules="alls">"); for (var i = 0; i<=9 ; i++) { document.write("<tr>"); for (var j=0; j<=9; i++) { var s=i+j; document.write("<td>"+s+"</td>"); if (j%3==0) { document.write("</tr>"); } } …

Member Avatar for rproffitt
0
27
Member Avatar for klipe8876

hello ive been trying to get a sound file to play once i press a button in a situation using winsound but i am unable to get the audio to play here is the code i have

Member Avatar for rproffitt
0
37
Member Avatar for Brakxee
Member Avatar for 44kerrnilly
Member Avatar for 77goldiesingh5
Member Avatar for happygeek

A survey of attendees at Infosecurity Europe earlier this month showed 70 percent in favour of the dictionary definition (in this case the Cambridge Dictionary) of a hacker being amended. The amendment in question being to remove 'illegality' from the definition. The current definition of a hacker is "a person …

Member Avatar for Naheedmir
1
4K
Member Avatar for Angel_19

The Declaration of Accelerationist Politics" and subsequent works rejected the left-wing blind worship of so-called "folk politics": flat democratic organizations, space restrictions, slowing down of romanticism, and folk localism. Left-wing politics should better deal with global capitalism and its complex government and economic cycles. Here, accelerationists call for cognitive mapping …

Member Avatar for Reverend Jim
-1
44
Member Avatar for AccurateAG

PART 1 1. INTRODUCTION: When you are starting with your first SEO project, you may feel as if you have been told to empty the ocean with a teaspoon, there is so much to know and so much to do. Well, don't freak out, it is not as bad as …

Member Avatar for Naheedmir
16
24K
Member Avatar for Angel_19

The characteristics of accelerationism make it difficult to put it into the traditional spectrum of left-right political ideology. From the perspective of the attitude towards this rapidly changing technological world, the right-wing ideology is relatively conservative, and they want to ease or slow down the speed of this change. The …

Member Avatar for rproffitt
-1
42
Member Avatar for myerslarry21

Dell Inspiron is stuck in Network update configuration boot loop will not go into to set up or bios. Hard drive has been erased need to reinstall Windows 10 how do I get it to stop Network booting?

Member Avatar for Naheedmir
0
107
Member Avatar for elton_2

Hello, My company is using Windows Server 2012 and we got attacked. My users lost their permition to enter in some repositorys and they cant change their passwords in some PC's. What I should do? Create a entire new AD? Recovering AD? I rlly need help

Member Avatar for rproffitt
0
37
Member Avatar for kyronsaif

I wanted to ask something for my friend Tcll, how would you link a MAC address with no IP up to a network namespace? I know nothing about network namespaces or much about networking atall, he doesnt know mainly what commands to run or configure it. Thanks :).

Member Avatar for Tcll
0
695
Member Avatar for orangsunita728
Member Avatar for ymh07900

Please save the above xml contents of my Excel Office add-in manifest as manifest.xml. If you insert the add-in using the manifest file the add-in gets installed from the add-in files from my github repository. I want to embed this manifest.xml into Open office xml. So, when I send my …

Member Avatar for rproffitt
0
36

The End.