1,390 Topics
| |
Everyone involved in the DaniWeb community, from the membership right through to the management, would like to offer sympathy and support to those suffering as a consequence of unfolding events in Japan. Unfortunately, some despicable types just see such tragedy as an opportunity to scam the kind-hearted majority out of … | |
I'm sorry. The correct URL for the demo upload is here: [url]http://demo.joomlatools.eu/[/url] I can't find the edit post button. Thanks, Rachel [QUOTE=msrache;1548777]Hi, This issue specifically has to do with the CMS Joomla, particularly the component Docman. Since the only available option I have for posting this was under the category … | |
some hackers are hacking my sites again and again can u tell me how to prevent those hackers from hacking my site...?? | |
Dear All, Please Help me, An E-mail was automatically sent to all contacts that were added in my accounts, That e-mail contain a malicious link inside it. I also received this e-mail on my yahoo account because my yahoo ID was also added in contacts of my AOL id, I … | |
Today as most of new windows are coming from Microsoft (Vista, Seven, etc) and Xp is going to be expire (in 2014). The main cause of ending of XP is "Low Security". Following are some Tricks to raise a little more security on your XP. [QUOTE]1. Immediately create a System … | |
In windows XP most of viruses spread through Autorun (Autorun.inf) Function in windows. It is better to Disable Autoruns in Xp. I am not sure about windows Vista but In WindowsSeven and above this feature is already blocked so you dont need to do anything. Ok Here are the Two … | |
| Hey i was wondering if it would be possible to have this as a security measure. I am in the middle of creating an admin page for my website. I want them to register though. However to register, in one of the fields they must provide a secret number which … |
It's not just [URL="http://www.daniweb.com/news/story231517.html"]phishing scams[/URL] that Facebook users have to worry about right now, According to Roger Thompson, the Chief Research Officer with security vendor AVG, hacked Facebook applications are increasingly reaching out to exploit sites based in Russia. As Thompson says, this is different to the normal run of … | |
Hello I have a question: Suppose I own a site, and a domain, 'mysite.com'. I provide services to different clients, so clients open sub-domains under my site. For example, the site 'test.com' will be at my site, at 'mysite.com/test.com', so the clients of 'test.com' will enter this sub-domain. What I … | |
A new botnet has been discovered which is not only targeting users of UK banks, but doing so in a new and worrying manner. Said to comprise of in excess of 100,000 infected machines, the Zeus 2 botnet is operated and controlled from Eastern Europe according to [URL="http://www.trusteer.com/company-overview"]secure browsing security … | |
Im looking to find out what distinguishes content as unique content in Google's eyes. If I've got a web page selling different items, and want to separate these items onto different web pages so that i can have the exact keywords in the domain name, will Google frown upon this? … | |
The Maine State Bureau of Consumer Credit Protection reported today that it has received a query from an unnamed out-of-state finance company about placing Global Positioning System units into vehicles it finances or that its customers used as collateral, according to an [URL="http://www.bangordailynews.com/story/Statewide/GPS-data-intruding-on-privacy,151289"]article [/URL]in the [I]Bangor Daily News[/I]. Such GPSes … | |
So I have an Xbox 360 and it is NOT hacked in any way. I am a gamer but I do mostly PC gaming therefore I do not my Xbox for gaming much, at least not online. My xbox is used primarily as a Media Center extender and I love … | |
I have been trying to figure out how to build this library on Windows for damn near 6 hours, and I am at a complete loss. I have found a lot of answers on these forums before, so I joined up hoping someone might have some idea. The INSTALL file, … | |
My boss wants me to research weather or not someone can "tell on a company" with unethical seo tactics. Can people make reports to google, or other search engines? If a company creates multiple domains with like content etc... any input? | |
"It's unbelievable, the kind of data that's out there about you," Cisco's principal security strategist Patrick Gray told a crowd in Boise, Idaho, this morning. The problem is that criminal hackers can use that kind of information to target a company, Gray said. He described one case where criminals in … | |
Hi Look at your source and see if you can find <iframe> tags in it with a value of 1 that links to the search site. | |
Hi, guys! My project is to create a chat software in Java. For security i must use Digital signatures+ Java Postgre sql... How to do it? Steps, codes, references, etc... HELP ME! | |
For some reason I was looking for hackers to do some legal ethical hacking jobs.Someone recommended me this site <SNIP> they are hardcore hackers and I have heard good things about them,but the question is; how safe is to hire hackers?They will know everything about the network and it could … | |
| Hi all. Not sure if this is the right forum, but it seemed the most appropriate from the list. I'm helping to develop a ghost-themed site. As it deals with an urban legend, we're pretty sure that kids will come across it, but don't want them to visit. There's really … |
22 Year old, Jon Lech Johansen who previously hacked DVD encryption in his teens has now hacked through the iPod copy protection. This copy protection stops iPod users from playing downloaded music from online music stores other than iTunes. This "copy protection" also stops music that has been bought off … | |
i'm doing a rpg for fun but this one function is giving me problems. it compiles without problems, but when i test it, the hp stats done change. this is the code for the function. [CODE=c]void attack(dragon *d1, dragon *d2) { if(d1->getdef() < d2->getatk()) { d1->changehp(- ( d2->getatk() - d1->getdef() … | |
Microsoft [URL="http://www.zdnet.co.uk/blogs/davey-winder-10015443/microsoft-staying-silent-over-security-patching-10015776/"]recently admitted[/URL], via the Director of it's Security Response Centre, that it doesn't report every Windows security vulnerability discovered and subsequently fixed via patches and updates. No big deal you might think, as long as the holes get fixed that's all that matter. I happen to agree, however that … | |
[ATTACH=RIGHT]16283[/ATTACH]An [URL="http://online.wsj.com/article/SB10001424052748703977004575393173432219064.html"]investigation by the Wall Street Journal[/URL] found that many of the largest websites in the U.S. are installing technologies on the computers of visitors - sometimes tracking them in over a hundred ways. The Journal examined the 50 most popular websites in the United States in order to see … | |
Want to know how to fix an election without resorting to bribery and corruption? Ever thought about throwing some Return Oriented Programming into the voting equation? Ordinarily, the hacking into of an electronic voting machine might spark a little bit of interest if there were an election looming perhaps. That … | |
Got any Suggestions? I'd like to delve deeper into the topic to bring my knowledge base up. This is what I've got so far: Hacking Exposed 6 (10th Anniversary Edition) by; McClure, Scambray, and Kurtz Hacking: The Art of Exploitation 2nd Edition by, Jon Erickson Steal This Computer Book 4.0 … | |
I will be starting school this upcoming week and I am wondering which way to go in the IT field.(Security or Networking) I know that graduation is long down the road but I want to make a sound decision that leads to future possiblities. Any recommendations? | |
hiiii.i need some gd ideas for my final yr project on networking/networking security.... | |
Have you ever thought about measuring the Internet in terms if malware per minute? Me neither, but someone has and it makes for uncomfortable reading if you are a Microsoft Windows user. [attach]17145[/attach]How fast is the Internet? It depends on the metric being used, of course, but one new report … | |
Recently I turned on my laptop and realized my taskbar changed by XP blue to gray with no special icons. The taskbar looks like a boring version of Windows 98. I tried everything and nothing's working. It was normal yesterday. I'm using Trend Micro Internet Security. I tried to click … |
The End.