1,387 Topics

Member Avatar for
Member Avatar for striker_1

Dear All, Please Help me, An E-mail was automatically sent to all contacts that were added in my accounts, That e-mail contain a malicious link inside it. I also received this e-mail on my yahoo account because my yahoo ID was also added in contacts of my AOL id, I …

Member Avatar for crunchie
0
337
Member Avatar for striker_1

Today as most of new windows are coming from Microsoft (Vista, Seven, etc) and Xp is going to be expire (in 2014). The main cause of ending of XP is "Low Security". Following are some Tricks to raise a little more security on your XP. [QUOTE]1. Immediately create a System …

Member Avatar for jholland1964
0
258
Member Avatar for striker_1

In windows XP most of viruses spread through Autorun (Autorun.inf) Function in windows. It is better to Disable Autoruns in Xp. I am not sure about windows Vista but In WindowsSeven and above this feature is already blocked so you dont need to do anything. Ok Here are the Two …

0
382
Member Avatar for OldDeveloper01

Hey i was wondering if it would be possible to have this as a security measure. I am in the middle of creating an admin page for my website. I want them to register though. However to register, in one of the fields they must provide a secret number which …

Member Avatar for diafol
0
97
Member Avatar for newsguy

It's not just [URL="http://www.daniweb.com/news/story231517.html"]phishing scams[/URL] that Facebook users have to worry about right now, According to Roger Thompson, the Chief Research Officer with security vendor AVG, hacked Facebook applications are increasingly reaching out to exploit sites based in Russia. As Thompson says, this is different to the normal run of …

Member Avatar for jingda
2
454
Member Avatar for liran

Hello I have a question: Suppose I own a site, and a domain, 'mysite.com'. I provide services to different clients, so clients open sub-domains under my site. For example, the site 'test.com' will be at my site, at 'mysite.com/test.com', so the clients of 'test.com' will enter this sub-domain. What I …

Member Avatar for davidchilders
0
246
Member Avatar for happygeek

A new botnet has been discovered which is not only targeting users of UK banks, but doing so in a new and worrying manner. Said to comprise of in excess of 100,000 infected machines, the Zeus 2 botnet is operated and controlled from Eastern Europe according to [URL="http://www.trusteer.com/company-overview"]secure browsing security …

Member Avatar for Voidz
0
494
Member Avatar for JamieLynnSEO

Im looking to find out what distinguishes content as unique content in Google's eyes. If I've got a web page selling different items, and want to separate these items onto different web pages so that i can have the exact keywords in the domain name, will Google frown upon this? …

Member Avatar for MaryDD
0
249
Member Avatar for slfisher

The Maine State Bureau of Consumer Credit Protection reported today that it has received a query from an unnamed out-of-state finance company about placing Global Positioning System units into vehicles it finances or that its customers used as collateral, according to an [URL="http://www.bangordailynews.com/story/Statewide/GPS-data-intruding-on-privacy,151289"]article [/URL]in the [I]Bangor Daily News[/I]. Such GPSes …

Member Avatar for rubberman
0
734
Member Avatar for WASDted

So I have an Xbox 360 and it is NOT hacked in any way. I am a gamer but I do mostly PC gaming therefore I do not my Xbox for gaming much, at least not online. My xbox is used primarily as a Media Center extender and I love …

Member Avatar for JamieLynnSEO
0
375
Member Avatar for CrimsonGT

I have been trying to figure out how to build this library on Windows for damn near 6 hours, and I am at a complete loss. I have found a lot of answers on these forums before, so I joined up hoping someone might have some idea. The INSTALL file, …

Member Avatar for vladoX
-1
490
Member Avatar for JamieLynnSEO

My boss wants me to research weather or not someone can "tell on a company" with unethical seo tactics. Can people make reports to google, or other search engines? If a company creates multiple domains with like content etc... any input?

Member Avatar for JamieLynnSEO
0
363
Member Avatar for slfisher

"It's unbelievable, the kind of data that's out there about you," Cisco's principal security strategist Patrick Gray told a crowd in Boise, Idaho, this morning. The problem is that criminal hackers can use that kind of information to target a company, Gray said. He described one case where criminals in …

Member Avatar for jonlucas
1
809
Member Avatar for Kraai

Hi Look at your source and see if you can find <iframe> tags in it with a value of 1 that links to the search site.

Member Avatar for Kraai
0
183
Member Avatar for Ravshan

Hi, guys! My project is to create a chat software in Java. For security i must use Digital signatures+ Java Postgre sql... How to do it? Steps, codes, references, etc... HELP ME!

Member Avatar for Ravshan
0
156
Member Avatar for Ad.Bulova

For some reason I was looking for hackers to do some legal ethical hacking jobs.Someone recommended me this site <SNIP> they are hardcore hackers and I have heard good things about them,but the question is; how safe is to hire hackers?They will know everything about the network and it could …

Member Avatar for happygeek
0
536
Member Avatar for diafol

Hi all. Not sure if this is the right forum, but it seemed the most appropriate from the list. I'm helping to develop a ghost-themed site. As it deals with an urban legend, we're pretty sure that kids will come across it, but don't want them to visit. There's really …

Member Avatar for diafol
0
163
Member Avatar for roryt

22 Year old, Jon Lech Johansen who previously hacked DVD encryption in his teens has now hacked through the iPod copy protection. This copy protection stops iPod users from playing downloaded music from online music stores other than iTunes. This "copy protection" also stops music that has been bought off …

Member Avatar for John Ripple
0
311
Member Avatar for writerervin

i'm doing a rpg for fun but this one function is giving me problems. it compiles without problems, but when i test it, the hp stats done change. this is the code for the function. [CODE=c]void attack(dragon *d1, dragon *d2) { if(d1->getdef() < d2->getatk()) { d1->changehp(- ( d2->getatk() - d1->getdef() …

Member Avatar for writerervin
0
461
Member Avatar for happygeek

Microsoft [URL="http://www.zdnet.co.uk/blogs/davey-winder-10015443/microsoft-staying-silent-over-security-patching-10015776/"]recently admitted[/URL], via the Director of it's Security Response Centre, that it doesn't report every Windows security vulnerability discovered and subsequently fixed via patches and updates. No big deal you might think, as long as the holes get fixed that's all that matter. I happen to agree, however that …

Member Avatar for Danarchy
0
1K
Member Avatar for CatRambo

[ATTACH=RIGHT]16283[/ATTACH]An [URL="http://online.wsj.com/article/SB10001424052748703977004575393173432219064.html"]investigation by the Wall Street Journal[/URL] found that many of the largest websites in the U.S. are installing technologies on the computers of visitors - sometimes tracking them in over a hundred ways. The Journal examined the 50 most popular websites in the United States in order to see …

Member Avatar for GlaringFacts
0
759
Member Avatar for happygeek

Want to know how to fix an election without resorting to bribery and corruption? Ever thought about throwing some Return Oriented Programming into the voting equation? Ordinarily, the hacking into of an electronic voting machine might spark a little bit of interest if there were an election looming perhaps. That …

Member Avatar for MosaicFuneral
0
602
Member Avatar for Shinedevil

Got any Suggestions? I'd like to delve deeper into the topic to bring my knowledge base up. This is what I've got so far: Hacking Exposed 6 (10th Anniversary Edition) by; McClure, Scambray, and Kurtz Hacking: The Art of Exploitation 2nd Edition by, Jon Erickson Steal This Computer Book 4.0 …

Member Avatar for zinnqu
0
228
Member Avatar for Rhuck

I will be starting school this upcoming week and I am wondering which way to go in the IT field.(Security or Networking) I know that graduation is long down the road but I want to make a sound decision that leads to future possiblities. Any recommendations?

Member Avatar for Rhuck
0
180
Member Avatar for mayank143srk
Member Avatar for izzaty
0
149
Member Avatar for happygeek

Have you ever thought about measuring the Internet in terms if malware per minute? Me neither, but someone has and it makes for uncomfortable reading if you are a Microsoft Windows user. [attach]17145[/attach]How fast is the Internet? It depends on the metric being used, of course, but one new report …

Member Avatar for Chronister
1
2K
Member Avatar for stressedcomp

Recently I turned on my laptop and realized my taskbar changed by XP blue to gray with no special icons. The taskbar looks like a boring version of Windows 98. I tried everything and nothing's working. It was normal yesterday. I'm using Trend Micro Internet Security. I tried to click …

Member Avatar for r8er4ever
0
172
Member Avatar for Urv73

Hi!! I recently discovered that someone been hacking my wireless network. I do have WPA encryption and I think I now have locked him out. My question is; can he /she have gotten so far that they opened up my computer and searched my files? Or is the main purpose …

Member Avatar for depacket
0
295
Member Avatar for Datsun90

Hi all, I have designed an application in MS Access 2007 that will be used in some schools (over 60 schools). Each time I start the application, it shows an alert in the message bar that the VBA macros are disabled, and gives me the option to enable it for …

Member Avatar for boblarson
0
160
Member Avatar for dreamer_lek91

[B]how can i disable the save function. The database that I am making now is being shared by many users and i do not want them to mess up with my design and programming stuff that i had done. I have tried making the file into ACCDE format but it …

Member Avatar for boblarson
0
184

The End.