27 Recommended Topics

Remove Filter
Member Avatar for
Member Avatar for Auditions

what is SSL and HTTPS is there any major distance?

Information Security security
Member Avatar for sankut
0
268
Member Avatar for devotee

We have a mixed set of licenses at my organization: some of use are on Tableau Server, others are on Tableau Cloud. I am having difficulty figuring out how to share a dashboard I made in Tableau Server with a user who only has Tableau Cloud access. I have been …

Information Security tableau-cloud tableau-server
Member Avatar for AndreRet
0
29
Member Avatar for Bam_391

In today's digital age, businesses rely heavily on customer data to enhance their operations, personalize experiences, and drive growth. However, the increasing importance of customer data brings along significant cybersecurity challenges. Protecting this data is not only a legal and ethical obligation but also crucial for maintaining customer trust and …

Information Security cyber-crime hacking security
1
97
Member Avatar for vooz-tech

Drip campaigns are a powerful email marketing strategy that can help you engage and convert your email subscribers. A drip campaign is a series of automated emails that are sent to subscribers over a specific period of time, with the goal of nurturing them and guiding them towards a specific …

Information Security advertising internet-explorer
0
60
Member Avatar for happygeek

A VPN, or Virtual Private Network to be formal, is a method of creating an encrypted data tunnel across the Internet from your device to a destination server. Although savvy home users and enterprises will operate their own VPNs (business-grade routers provide this functionality) for most folk, a VPN comes …

Information Security privacy security vpn
Member Avatar for New Beachboy
6
2K
Member Avatar for Vincent_22

Logfile of Trend Micro Hijack This v2.0.5 Scan saved at 12:20:23, on 30/03/2022 Platform: Unknown Windows (WinNT 6.02.1008) MSIE: Internet Explorer v11.0 (11.00.19041.1566) Boot mode: Normal Running processes: C:\Program Files (x86)\EPSON Software\Epson Printer Connection Checker\EPPCCMON.EXE C:\Program Files (x86)\EPSON Software\Event Manager\EEventManager.exe C:\Users\vince\Desktop\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main, Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 …

Information Security antivirus microsoft privacy
Member Avatar for rproffitt
0
227
Member Avatar for Steven_40

I am recently joined an innstitute to learn ethical hacking from scratch and i am using Parrot os to learn hacking. IS is it good enough as compared to kali linux or shall I continue with parrot os only?

Information Security encrypt hacking
Member Avatar for Steven_40
0
178
Member Avatar for Scott_22
Member Avatar for lukevan

**What is phishing?** The idea is to educate the email recipient that the message is something they want or need, such as a request from their bank or a note from a neighbor, and that they should click a link or download an attachment. Every day, more emails are sent, …

Information Security hacking security
Member Avatar for rproffitt
0
111
Member Avatar for teatear

Thank you all for being here to help me with this problem I'm having. I've used computers for years but this is over my head. I saw a post here when you guys helped a lady a few years back having a similiar problem with her software. I hope you …

Information Security windows-virus
Member Avatar for haibatullahsafi
0
675
Member Avatar for happygeek

A survey of attendees at Infosecurity Europe earlier this month showed 70 percent in favour of the dictionary definition (in this case the Cambridge Dictionary) of a hacker being amended. The amendment in question being to remove 'illegality' from the definition. The current definition of a hacker is "a person …

Information Security language security
Member Avatar for Naheedmir
1
4K
Member Avatar for niki1213

Hey. I am an affiliate marketing, would love to know which antidetect are you using? I need your help.

Information Security
Member Avatar for Naheedmir
1
245
Member Avatar for Neil_12

Businesses all over the world are trying to figure out how to make the most of their digital marketing campaigns. The rise of influencer marketing is quite significant, and many celebrities that charge hundreds of thousands of dollars per Instagram post. However, many companies are already interested in figuring out …

Information Security app
Member Avatar for ElenaCora
3
5K
Member Avatar for saif_15

Do you know how to make user sessions secure on your web app or mobile app?

Information Security privacy security
Member Avatar for Dani
0
149
Member Avatar for Neil_12

In the modern world, it’s easy to understand that data is absolutely essential to many corporations and organizations. There is an ever-growing need to understand the needs and desires of your customer base, so that you may tailor your products/services/platform as much as possible to meet these particular needs. However, …

Information Security privacy security
Member Avatar for Mr.M
3
3K
Member Avatar for Lincoln=1cent

Is there a way to change a host workstation password using RDP?

Information Security microsoft privacy security
Member Avatar for Lincoln=1cent
0
228
Member Avatar for Mr.M

Hi DW. Well I'm very much interested in the data protection and also giving the best privacy to the public where we protect your passwords. I've seen something that Firefox had introduced to their browsers with also their Apps. This is called LockWise which is a tool to sync your …

Information Security encrypt security ssl-certificate
0
1K
Member Avatar for rproffitt

For those very new to this area, please google SIM SWAP and discover a very nasty security issue with all phones we use today. At first glance the new security researcher might think I'm exaggerating. Do your own research and tell me you don't find this to be one of …

Information Security exploit security smartphone
Member Avatar for Mr.M
0
3K
Member Avatar for charliebrooke

I'm using Windows Defender as full antivirus and Malwarebytes (Free version) So far. I've never had viruses malware on my computers. I started doing this 2016-2017. Are paid antivirus products not worth it now? Back then i used to use Bitdefender and it was pretty good. It had a pretty …

Information Security malware security
Member Avatar for gracelee
0
419
Member Avatar for Ccholic

I am thinking about making a website on a VPS. I've read on internet that if someone hacks my website and puts a malware into links or if he steals personal information(including passwords), not only hacker but the owner of the website is responsible too and a lawsuit may be …

Information Security exploit hacking
Member Avatar for rproffitt
0
313
Member Avatar for Trasser

I have a question for those who are looking for bugs and vulnerabilities for money. How are you looking for customers? Is it freelance or a permanent job or a hobby? I found one blockchain project that offers to find vulnerabilities for money. I will post the text of their …

Information Security exploit hacking
1
1K
Member Avatar for Dani

Living in California, I periodically need to log into my computer that's back in my home in New York. Not that often, typically just a couple times a year. But today, when attempting to connect, I got an error message saying, "The remote TeamViewer is running an old version which …

Information Security
Member Avatar for Dani
0
2K
Member Avatar for rproffitt

Let me share how I began to understand Microsoft: A long time back when I went to Microsoft Redmond's campus for a seminar. I had two things I wanted to share since I thought Microsoft would want to look into this. 1. A CD that when put into the PC …

Information Security microsoft users
Member Avatar for Bllistic
0
2K
Member Avatar for Ayush_5

Ok, So I sell some online services basically there is no need for my clients to put in their shipping address but paypal still asks for shipping address on the checkout page they are taken to from the payapl button. Is there a way to remove that option? I I'm …

Information Security security
Member Avatar for rproffitt
0
307
Member Avatar for useruno1

Hello guys, Recently my site was infected with malware, which caused me a lot of problems. In particular, many spam links have been created and indexed. I managed to get a lot out of them with Google search console, but it still appears in some key searches. Is there any …

Information Security
Member Avatar for useruno1
0
4K
Member Avatar for rproffitt

One of the mantras of computing and just about anything data related is "**We only lose what we don't backup**" but some are taking offense that this is still the current state of computing today. Recently some owners call this out as "blaming the user", "you're holding it wrong" or …

Information Security backup
Member Avatar for Reverend Jim
0
2K
Member Avatar for Danilo22

The Conservative party issued a statement on Saturday which apologised for "any concern caused" and confirmed that "the technical issue has been resolved and the app is now functioning securely." However, not before Boris Johnson's profile image had been changed to a pornographic one and that of Environment Secretary, Michael …

Information Security app backup hacking hosting
0
490

The End.