17 Topics

Member Avatar for
Member Avatar for WolfShield

Hello DaniWeb members, I know I'm not the only one who has tried to talk with non-hackers and used the term 'Crackers', to their total confusion. The problem is that the media has always refered to the Black Hat Hackers as just 'hackers', and that has given the **REAL** (White …

Member Avatar for Raunikkapoor
0
416
Member Avatar for renato_francia

Hi, I've been having some issues with my server that at times it runs the application smoothly but lately there has been some irregularities in the performance. We run the server on Rackspace but they are telling us that the problem is in our end. Our site is running on …

Member Avatar for Kevin_18
0
204
Member Avatar for jesicawillss

What is White Hat SEO? How many things or techniques are included in it? Can anyone tell me how it proves better for getting search engine result? Guide me on this subject.

Member Avatar for John_60
0
651
Member Avatar for maketick

Hello, What is gray hat SEO technic in SEO? Is it valid technic in Google? Please post your opinion on this important issue. Thanks, Maketick

Member Avatar for luvseo
0
318
Member Avatar for stavros141

Hello everyone I am facing a problem that I have never encountered before and googling around just isn't helping. I was assigned to migrate a pmWiki server to a new MediaWiki server which was supposed to run as a virtual machine on a Red Hat Cluster Suite. My coworker and …

Member Avatar for stavros141
0
297
Member Avatar for yankeefan24

Im having problems with Tomcat on a red hat virtual box. Tomcat is installed and it talks to java. it work localhost to localhost but when I try to open port 8080 from outsite localhost it wont work. Any ideas why? Im new to Tomcat and JSP

Member Avatar for ajaykiet2
0
161
Member Avatar for carolm456

Can you tell me if you think Link Exchanges have any marketing or SEO benefit? Or does free Link Exchange risk being swatted by Google for Link manipulation? I've received a few invitations to exchange links with websites with higher rank than me, but have turned them down because it …

Member Avatar for carolm456
0
240
Member Avatar for MktgRob

Not really certain if this is the proper forum for this but can anyone explain what URL Harvesting is? I am asking because while reviewing the google analytics/referring sites info for my company's website I saw referral traffic from a site called trafficfaker.com. Any insight would be welcome. Thank you.

Member Avatar for MktgRob
0
179
Member Avatar for JamieLynnSEO

Im looking to find out what distinguishes content as unique content in Google's eyes. If I've got a web page selling different items, and want to separate these items onto different web pages so that i can have the exact keywords in the domain name, will Google frown upon this? …

Member Avatar for MaryDD
0
239
Member Avatar for JamieLynnSEO

My boss wants me to research weather or not someone can "tell on a company" with unethical seo tactics. Can people make reports to google, or other search engines? If a company creates multiple domains with like content etc... any input?

Member Avatar for JamieLynnSEO
0
363
Member Avatar for Brillig

Checking the SERP of my site against many of my target keywords and looking at the #1 position for each of them. In each case but one, it's a really ugly page with sub par information and then looking in Yahoo Site Explorer, it has tens of thousands or even …

Member Avatar for Brillig
0
197
Member Avatar for Niki_Fears

At the [URL="http://www.blackhat.com/"]Black Hat[/URL] conference in Las Vegas, Barnaby Jack gave a demonstration of how he learned to crack the security of various stand alone ATM's. While they have long been at risk for physical theft (someone stealing or physically breaking into the internal safe of the ATM itself), this …

0
1K
Member Avatar for khess

Responses (from another site) on my recent, "[URL="http://www.daniweb.com/news/story261566.html"]Security Alert: They Should Have Used Linux[/URL]" led me to explore the conclusion that hacking is really only for those seeking the low-hanging security fruit as their prey. These folks, who tout themselves as "Linux Experts" intrigued me so much with their comments …

Member Avatar for marqueue
0
369
Member Avatar for newsguy

It seems that Google searches on terms that are related to iPhone SMS information are being used to return results that direct unsuspecting users to rogue AV sites. According to the Websense Security Labs ThreatSeeker Network [URL="http://securitylabs.websense.com/content/blogs.aspx"]blog[/URL] malicious URLs related to Apple iPhone SMS/MMS searches are ranking as high as …

2
201
Member Avatar for happygeek

There are two things you can be sure of about the annual Las Vegas Black Hat security conference: nobody will use the free wifi as they are all too [URL="http://www.itwire.com/content/view/19935/53/"]worried about being hacked[/URL], and someone will demonstrate an exploit that will scare the living bejesus out of you. The latter …

1
457
Member Avatar for happygeek

I guess that is what you might call a turn up for the books, as the US [URL="http://www.daniweb.com/blogs/entry1506.html"]Department of Homeland Security[/URL] announces the 16 members which have been sworn in to serve on the Homeland Security Advisory Council. Especially when you consider that one of them, Jeff Moss, is best …

0
167
Member Avatar for Lisa Hoover

There were quite a few interesting stories to come out of the recent [URL="https://www.blackhat.com/"]Black Hat[/URL] security conference in Las Vegas. If all you remember hearing about were the [URL="http://www.periscopeit.co.uk/news/article/web-monitoring-gets-hack-hackers-into-trouble/255"]ejected reporters[/URL] and [URL="http://www.cio.com.au/index.php/id;424905265"]DNS cache poisoning[/URL], then you missed a lot. Network and infrastructure security, the conference's focus, is a vitally important …

0
167

The End.