17 Topics
| |
Hello DaniWeb members, I know I'm not the only one who has tried to talk with non-hackers and used the term 'Crackers', to their total confusion. The problem is that the media has always refered to the Black Hat Hackers as just 'hackers', and that has given the **REAL** (White … | |
Hi, I've been having some issues with my server that at times it runs the application smoothly but lately there has been some irregularities in the performance. We run the server on Rackspace but they are telling us that the problem is in our end. Our site is running on … | |
What is White Hat SEO? How many things or techniques are included in it? Can anyone tell me how it proves better for getting search engine result? Guide me on this subject. | |
Hello, What is gray hat SEO technic in SEO? Is it valid technic in Google? Please post your opinion on this important issue. Thanks, Maketick | |
Hello everyone I am facing a problem that I have never encountered before and googling around just isn't helping. I was assigned to migrate a pmWiki server to a new MediaWiki server which was supposed to run as a virtual machine on a Red Hat Cluster Suite. My coworker and … | |
Im having problems with Tomcat on a red hat virtual box. Tomcat is installed and it talks to java. it work localhost to localhost but when I try to open port 8080 from outsite localhost it wont work. Any ideas why? Im new to Tomcat and JSP | |
Can you tell me if you think Link Exchanges have any marketing or SEO benefit? Or does free Link Exchange risk being swatted by Google for Link manipulation? I've received a few invitations to exchange links with websites with higher rank than me, but have turned them down because it … | |
Not really certain if this is the proper forum for this but can anyone explain what URL Harvesting is? I am asking because while reviewing the google analytics/referring sites info for my company's website I saw referral traffic from a site called trafficfaker.com. Any insight would be welcome. Thank you. | |
Im looking to find out what distinguishes content as unique content in Google's eyes. If I've got a web page selling different items, and want to separate these items onto different web pages so that i can have the exact keywords in the domain name, will Google frown upon this? … | |
My boss wants me to research weather or not someone can "tell on a company" with unethical seo tactics. Can people make reports to google, or other search engines? If a company creates multiple domains with like content etc... any input? | |
Checking the SERP of my site against many of my target keywords and looking at the #1 position for each of them. In each case but one, it's a really ugly page with sub par information and then looking in Yahoo Site Explorer, it has tens of thousands or even … | |
At the [URL="http://www.blackhat.com/"]Black Hat[/URL] conference in Las Vegas, Barnaby Jack gave a demonstration of how he learned to crack the security of various stand alone ATM's. While they have long been at risk for physical theft (someone stealing or physically breaking into the internal safe of the ATM itself), this … | |
Responses (from another site) on my recent, "[URL="http://www.daniweb.com/news/story261566.html"]Security Alert: They Should Have Used Linux[/URL]" led me to explore the conclusion that hacking is really only for those seeking the low-hanging security fruit as their prey. These folks, who tout themselves as "Linux Experts" intrigued me so much with their comments … | |
It seems that Google searches on terms that are related to iPhone SMS information are being used to return results that direct unsuspecting users to rogue AV sites. According to the Websense Security Labs ThreatSeeker Network [URL="http://securitylabs.websense.com/content/blogs.aspx"]blog[/URL] malicious URLs related to Apple iPhone SMS/MMS searches are ranking as high as … | |
There are two things you can be sure of about the annual Las Vegas Black Hat security conference: nobody will use the free wifi as they are all too [URL="http://www.itwire.com/content/view/19935/53/"]worried about being hacked[/URL], and someone will demonstrate an exploit that will scare the living bejesus out of you. The latter … | |
I guess that is what you might call a turn up for the books, as the US [URL="http://www.daniweb.com/blogs/entry1506.html"]Department of Homeland Security[/URL] announces the 16 members which have been sworn in to serve on the Homeland Security Advisory Council. Especially when you consider that one of them, Jeff Moss, is best … | |
There were quite a few interesting stories to come out of the recent [URL="https://www.blackhat.com/"]Black Hat[/URL] security conference in Las Vegas. If all you remember hearing about were the [URL="http://www.periscopeit.co.uk/news/article/web-monitoring-gets-hack-hackers-into-trouble/255"]ejected reporters[/URL] and [URL="http://www.cio.com.au/index.php/id;424905265"]DNS cache poisoning[/URL], then you missed a lot. Network and infrastructure security, the conference's focus, is a vitally important … |
The End.