1,390 Topics

Member Avatar for
Member Avatar for JKAH55
Member Avatar for Johnny2x4

So I've been plagued by things like this for almost three years now. Anything I do online. If its related to money or employment, I cannot do it. Why? Because of things like these (screenshots). https://ibb.co/dkX08gN https://ibb.co/nnQQc3b Lets see if I can explain whats going on. Anything employment related inevitably …

Member Avatar for Johnny2x4
0
182
Member Avatar for rproffitt

Or just phishing. Here's the message I received from another Daniweb member. I redacted their name: > It is my pleasure to contact you discreetly as to discuss a mutually beneficial business, I will want to have your trust and to go into partnership investment with you which must be …

Member Avatar for gce517
2
26
Member Avatar for Vito_6

I need to be verified asap please....the woman is waiting for me to pi k her up but erifi action must be be done first

Member Avatar for Dani
0
19
Member Avatar for Susan_22
Member Avatar for happygeek

A VPN, or Virtual Private Network to be formal, is a method of creating an encrypted data tunnel across the Internet from your device to a destination server. Although savvy home users and enterprises will operate their own VPNs (business-grade routers provide this functionality) for most folk, a VPN comes …

Member Avatar for New Beachboy
6
2K
Member Avatar for trayalex812

The rise in data usage and exponential growth of remote work in recent years has increased the need for reliable data centers all around the world. Since data centers are critical for wide-scale networking, data storage, and information sharing, they require exceptional security measures to safeguard them from rapidly evolving …

0
279
Member Avatar for Vincent_22

Logfile of Trend Micro Hijack This v2.0.5 Scan saved at 12:20:23, on 30/03/2022 Platform: Unknown Windows (WinNT 6.02.1008) MSIE: Internet Explorer v11.0 (11.00.19041.1566) Boot mode: Normal Running processes: C:\Program Files (x86)\EPSON Software\Epson Printer Connection Checker\EPPCCMON.EXE C:\Program Files (x86)\EPSON Software\Event Manager\EEventManager.exe C:\Users\vince\Desktop\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main, Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 …

Member Avatar for rproffitt
0
244
Member Avatar for Steven_40

I am recently joined an innstitute to learn ethical hacking from scratch and i am using Parrot os to learn hacking. IS is it good enough as compared to kali linux or shall I continue with parrot os only?

Member Avatar for Steven_40
0
198
Member Avatar for pritaeas

I'm looking to build an ASP.NET WebAPI/REST API (not Core) that should accept client certificates as authentication. I've found several examples, so I hope to be able to succeed. However, I'm looking to find out more on the inner workings so to speak of certificates and such, so I'm hoping …

0
34
Member Avatar for Vrushanjali

As I'm curious to know a instant messaging software for Government collaborations. When I was browsing for a knid of that software I found Troop Messenger though it's not a government app but it's providing messaging services for different platforms like political campaign software, chat api, on-premise and many more. …

Member Avatar for jwenting
0
120
Member Avatar for Scott_22
Member Avatar for Gazza2021

I bought a high end laptop off a guy I met in a pub he showed me the laptop and it was working fine and everything seemed absolutely fine, however 2 weeks later I goto login and it has been locked by the company it has been stolen from so …

Member Avatar for rproffitt
0
55
Member Avatar for dimitrilc

## Introduction ## Although not included in the headlines, the release of JDK 17 also added 3 sets of new methods to the class `java.lang.Process`: 1. `inputReader()` to read from stdout. 2. `inputWriter()` to write to stdin. 3. `errorReader()` to read from stderr. In this tutorial, we are going to …

3
1K
Member Avatar for dimitrilc

## Introduction ## There are many ways to design secure Java objects. In this tutorial, we are going to learn how to create secure Java objects by understanding **Accessibility**, **Extensibility**, and **Immutability**. ## Goals ## At the end of this tutorial, you would have learned: 1. Understand how and why …

Member Avatar for JamesCherrill
2
162
Member Avatar for dimitrilc

## Introduction ## In this tutorial, we will focus on how to manage IO permissions to read, write, and delete local files using the `SecurityManager` class. ## Goals ## At the end of this tutorial, you would have learned: 1. What policy files are and how to use them. 2. …

2
310
Member Avatar for demeateide
Member Avatar for lukevan

**What is phishing?** The idea is to educate the email recipient that the message is something they want or need, such as a request from their bank or a note from a neighbor, and that they should click a link or download an attachment. Every day, more emails are sent, …

Member Avatar for rproffitt
0
124
Member Avatar for Sri Meenakshi

Hi, I have a windows 10, HP 340. Due to the fact that I forgot the password, I added a picture password to access my computer. Today, as I gave the wrong pattern twice, it is asking me to give the initial password which I forgot. In order to change …

Member Avatar for rproffitt
0
64
Member Avatar for jkook

<html> <head> <title> Exercice 6</title> </head> <body> <h1>Hello</h1> <script language= "java script"> var N=prompt("Choisissez entre: 1-addition et 2-multiplication",""); if (N==1) { document.write("<table border="2" align="center" rules="alls">"); for (var i = 0; i<=9 ; i++) { document.write("<tr>"); for (var j=0; j<=9; i++) { var s=i+j; document.write("<td>"+s+"</td>"); if (j%3==0) { document.write("</tr>"); } } …

Member Avatar for rproffitt
0
30
Member Avatar for klipe8876

hello ive been trying to get a sound file to play once i press a button in a situation using winsound but i am unable to get the audio to play here is the code i have

Member Avatar for rproffitt
0
39
Member Avatar for Brakxee
Member Avatar for 44kerrnilly
Member Avatar for 77goldiesingh5
Member Avatar for happygeek

A survey of attendees at Infosecurity Europe earlier this month showed 70 percent in favour of the dictionary definition (in this case the Cambridge Dictionary) of a hacker being amended. The amendment in question being to remove 'illegality' from the definition. The current definition of a hacker is "a person …

Member Avatar for Naheedmir
1
4K
Member Avatar for Angel_19

The Declaration of Accelerationist Politics" and subsequent works rejected the left-wing blind worship of so-called "folk politics": flat democratic organizations, space restrictions, slowing down of romanticism, and folk localism. Left-wing politics should better deal with global capitalism and its complex government and economic cycles. Here, accelerationists call for cognitive mapping …

Member Avatar for Reverend Jim
-1
49
Member Avatar for AccurateAG

PART 1 1. INTRODUCTION: When you are starting with your first SEO project, you may feel as if you have been told to empty the ocean with a teaspoon, there is so much to know and so much to do. Well, don't freak out, it is not as bad as …

Member Avatar for Naheedmir
16
24K
Member Avatar for Angel_19

The characteristics of accelerationism make it difficult to put it into the traditional spectrum of left-right political ideology. From the perspective of the attitude towards this rapidly changing technological world, the right-wing ideology is relatively conservative, and they want to ease or slow down the speed of this change. The …

Member Avatar for rproffitt
-1
46
Member Avatar for myerslarry21

Dell Inspiron is stuck in Network update configuration boot loop will not go into to set up or bios. Hard drive has been erased need to reinstall Windows 10 how do I get it to stop Network booting?

Member Avatar for Naheedmir
0
107
Member Avatar for elton_2

Hello, My company is using Windows Server 2012 and we got attacked. My users lost their permition to enter in some repositorys and they cant change their passwords in some PC's. What I should do? Create a entire new AD? Recovering AD? I rlly need help

Member Avatar for rproffitt
0
41

The End.