I am inform every bady in bar codes

Member Avatar
Member Avatar
+0 forum 2

This is my 1st post on this Forum - Hello My Name is Michael and I'm from Poland :) I have a question about security in Internet. I'm active user of Internet and I have now some anxiety, maybe unjustified, but I have :( I'm logged in webbrowser on my Google (Gmail) account (sometimes Facebook) and in this time I use other websites: This is my Question: Is my activity on these websites (and names of these websites) saving somewhere on servers: google, facebook or others servers information about me? It worries me if in the future someone will be …

Member Avatar
Member Avatar
+0 forum 2

HELP!! I have a windows server 2012 r2 . I can still use my server until i fell asleep and now woke up, And can't log in to my administrator account. I didn't change password at all, i use the same password and i'd make sure that it is correct. But still not working. Only i can access the guest account. I research and tried some tutorials but not working. I don't have installation CD and my physical back is already affected by AMNESIA file, can't copy because it needs admin rights. I found out that all of my files …

Member Avatar
Member Avatar
+0 forum 26

Hi. I'm concerned an ex has installed spy software on my computer (and maybe iPhone, but that's for another thread). I've spent days reading about it and I'm not really any closer to figuring out if this is the case, and if so how to uninstall it. Any help would be much appreciated!

Member Avatar
Member Avatar
+0 forum 1

The second annual Imperva Hacker Intelligence Initiative report, this one entitled [Monitoring Hacker Forums](http://www.imperva.com/docs/HII_Monitoring_Hacker_Forums_2012.pdf), is out and reveals that the threat surfaces being discussed by the hacker community are very different from those that businesses are spending money on defending against attack. ![dweb-hackers](/attachments/small/0/dweb-hackers.jpg "align-right") The Imperva research analysed the content of a number of online hacker communities, including many lesser known forums in order to get a more accurate snapshot of what those doing the hacking are actually discussing. By looking at a total of more than 400,000 different conversational threads, Imperva was able to determine that SQL injection and …

Member Avatar
Member Avatar
+0 forum 2

Hi. Ive actually got a problem in cmd while im trying to repair my computer. (Windows Server 2012 r2) What im trying to do is to reset my password in Admin, since i can't log in on it. What i did is, i insert the bootable usb , then "repair" and go to "CMD", it brings me to X"\Windows\System32 , now, most of the time, the OS is in D: drive now or even in C: right? I do a Diskpart, list volume but only C: drive appear, and the contents of that drive is the content of bootable drive …

Member Avatar
Member Avatar
+0 forum 20

Hey guys! it would be great if somebody here could advise me asap. I have an e-commerce website that was running well. . A week ago, the website got hacked and several pointless pages have been added to it. We found it and removed all pages as soon as we can. But we're worried if the website is infected with spyware or any malware. We couldn't take the risk of clients money and so the website is momentarily closed until a cybersecurity assessment is done. I hope that, after the evaluation, we can make sure whether the website is clean …

Member Avatar
Member Avatar
+0 forum 1

Konami, the Japanese games developer responsible for such genre defining classics as Metal Gear Solid and Silent Hill, has confirmed that tens of thousands of customer accounts have been put at risk due to a breach of the Konami ID portal site. During a period between the 13th June and 7th July, hackers made numerous unauthorised logins. Indeed, during this period it has been suggested that as many as 4 million account hacking attempts were executed. Konami warns that a total of 35,252 customer accounts were hijacked with the attackers having access to personal data including dates of birth, telephone …

Member Avatar
+1 forum 0

[ATTACH=RIGHT]16244[/ATTACH]Ron Bowes has been accused of hacking Facebook. But when he put the information for over a 100 million [URL="http://www.facebook.com"]Facebook[/URL] users into a 2.8 GB torrent stream on his website Skullsecurity.org, he didn't need to hack anything to get it - it was already publicly available on Facebook. All he did, he points out, was "compile public information into a nice format for statistical analysis." Bowes, who is a developer for the [URL="http://nmap.org/"]Nmap Security Scanner[/URL], had been testing the software's new feature Ncrack, and needed a wordlist generated from real life data. So he turned to Facebook. When he realized …

Member Avatar
Member Avatar
+0 forum 1

Over the last few hours of the day GoDaddy's (and GoDaddy managed) websites have been [on the fritz](http://blogs.wsj.com/digits/2012/09/10/godaddy-has-glitches-anonymous-claims-responsibility/) as webmasters and visitors alike are unable to access millions of websites held within GoDaddy's datacenters in an apparent Denial of Service [(DDOS)](http://en.wikipedia.org/wiki/Denial-of-service_attack) attack. GoDaddy is currently scrambling to restore service to their customers at this very moment. The individual claiming responsibility for the attack claims to be a member of the internet group [Anonymous](http://en.wikipedia.org/wiki/Anonymous_(group)), though he acted alone and not with the collective organization. Anonymous is infamous for a variety of attacks on various websites & services, including the recent leaking …

Member Avatar
Member Avatar
+0 forum 2

Hello DaniWeb members, I know I'm not the only one who has tried to talk with non-hackers and used the term 'Crackers', to their total confusion. The problem is that the media has always refered to the Black Hat Hackers as just 'hackers', and that has given the **REAL** (White and maybe Grey Hat) Hackers a bad name. At the same time the term 'Cracker' has a slang meaning that many more people know about. So, this day I offer you a challenge! Let's see what all of our wit and creativity can come up with! What are your ideas …

Member Avatar
Member Avatar
+0 forum 6

According to reports, the [URL="http://www.telegraph.co.uk/news/worldnews/northamerica/usa/8578704/CIA-website-hacked-by-Lulz-Security.html"]LulzSec hacking group has claimed responsibility[/URL] for a denial of service hack attack on the cia.gov website resulting in it being inaccessible for a while late yesterday. [attach]21307[/attach] LulzSec appears to have taken up the baton of high profile hacking from the Anonymous group in recent weeks, with attacks being reported to have hit the Senate, News Corp, Sony and even the UK National Health Service. Yet all these hacks have one thing in common: they all seem to be aimed at getting media exposure as much as anything else. It could also be argued that …

Member Avatar
Member Avatar
+1 forum 2

some hackers are hacking my sites again and again can u tell me how to prevent those hackers from hacking my site...??

Member Avatar
Member Avatar
+0 forum 3

"It's unbelievable, the kind of data that's out there about you," Cisco's principal security strategist Patrick Gray told a crowd in Boise, Idaho, this morning. The problem is that criminal hackers can use that kind of information to target a company, Gray said. He described one case where criminals in the Ukraine targeted a particular large company, went onto Facebook to look for employees of that company, and upon finding one, created a Facebook account in the name of one of her high-school friends and asked to "friend" her. When she did so, the "friend" then suggested she click on …

Member Avatar
Member Avatar
+1 forum 6

For some reason I was looking for hackers to do some legal ethical hacking jobs.Someone recommended me this site <SNIP> they are hardcore hackers and I have heard good things about them,but the question is; how safe is to hire hackers?They will know everything about the network and it could be very risky, on the other side only a hackers can protect our network in that level which is actually desired.-

Member Avatar
Member Avatar
+0 forum 3

I will admit that I didn't stumble upon Steven Levy's classic tale of how the IT west was won, for want of a better phrase, until 1993 when it was republished some 10 years after the original book but with the addition of a handful of new pages to celebrate it's anniversary and note the changes the industry had seen. Fast forward to the present, and to celebrate the 25th anniversary of the book (which was actually first published in 1984, go figure) we have another new edition. Well, I say new addition but it's more the 10th anniversary edition …

Member Avatar
+0 forum 0

[ATTACH=right]16006[/ATTACH][I]Part dedicated professional, part creative thinker and part con man.[/I] On a weekly basis a major corporation’s data is compromised in a most public fashion – in an instant slaughtering consumer confidence and bringing immediate disgrace. Who doesn’t remember the Google Aurora attacks and AT&T’s iPad data leak exposing 114,000 users personal information and costing them millions? Yet unbeknownst to the public, legions of ethical hackers (AKA penetration testers) are quietly pilfering passwords, war-driving, finding vulnerabilities and brute forcing their way into protected systems… and doing so with great ease. How much ease? According to Michael Miora, President & Founder …

Member Avatar
Member Avatar
+0 forum 1

Gamers beware. There is an email going around with a subject line that reads something like this: "You Steam will be disabled. Please reactive it." (notice how they cannot even spell "your" properly) [attach=right]14694[/attach] In this email you will find a head banner with the STEAM logo and a couple of links. The link that says "Reactive My Account" takes you to a website that looks exactly like the real [URL="http://www.steampowered.com"]steampowered.com[/URL] site but it is in fact a charlatan, a fake, an imposter. If you click that link you will noticed in the address bar that you are at some …

Member Avatar
+1 forum 0

Responses (from another site) on my recent, "[URL="http://www.daniweb.com/news/story261566.html"]Security Alert: They Should Have Used Linux[/URL]" led me to explore the conclusion that hacking is really only for those seeking the low-hanging security fruit as their prey. These folks, who tout themselves as "Linux Experts" intrigued me so much with their comments that I'm compelled to write this post as an analysis of that dialog. One said that, "Hacking is a business. [URL="http://www.microsoft.com"]Windows[/URL] is targeted because of the size of the target... combined still over 90%, and XP allegedly *still* 65%+." Still another asserted that, "Windows is the most attractive target for …

Member Avatar
Member Avatar
+0 forum 1

I am not an easily shockable person. Anyone who knows me, anyone who has seen me, will understand this. Indeed, other than the usual trio of sexual or racial abuse and mindless violence it takes a lot to drop my jaw in shame and despair while browsing the web. However, a bunch of numbnut griefers managed to achieve just that over the weekend when they used a combination of JavaScript coding and flashing animations with the intent to trigger fits amongst the users of an [URL="http://www.epilepsyfoundation.org/efforums/forum/index.cfm"]epilepsy support website[/URL]. [URL="http://www.theinquirer.net/gb/inquirer/news/2008/03/31/epilepsy"]According to reports[/URL] one user suffered her worst epileptic attack in 12 …

Member Avatar
Member Avatar
+0 forum 5

Recently one of the most talked about things is this Apple Wifi hack that was demonstrated by a group called SecureWorks at one of the largest security conferences, Defcon. [URL="http://www.youtube.com/watch?v=chtQ1bcHLZQ&mode=related&search="]Here is a link[/URL] to the video so you guys can watch the video yourselves. Now Here is a link to an[URL="http://daringfireball.net/2006/08/curious_case"] article [/URL]similiar to most articles saying that this video is a hoax. Now if you have watched the video and read an article or similiar one than a question comes to mind. Why are the people writing all these articles and going on and on about something you would …

Member Avatar
Member Avatar
+0 forum 2

Belkin has announced the launch of their N1 range of next generation wireless routers based upon a new WiFi standard that could extend the range of existing ‘wireless-G’ solutions by a factor of 4, and speeds by as much as 12. This might bring out the excited little geek in me, were it not for the fact that there isn’t any standard yet, no guarantee it will work properly with other 802.11n kit (even from the same manufacturer) now or in the future, and most damning of all: nobody really needs it. OK, so when has need ever stopped an …

Member Avatar
Member Avatar
+0 forum 9

Recently, I noticed some strangeness on my home wireless network. Sometimes the speed would be slower than normal, I couldn't print to my printer, and some of my more advanced router settings (for port forwarding, firewall, etc.) would seem to be "lost". As it turns out, my laptop was attaching to my next-door-neighbor's network. When I went to help him out, we saw that he could see HIS neighbor's network! Both had failed to do some basic wireless security. Failing to secure your network could have several negative consequences. First, it's your network. You don't want freeloaders using your bandwidth. …

Member Avatar
Member Avatar
+0 forum 4

The End.