128 Topics

Member Avatar for
Member Avatar for Vito_6

I need to be verified asap please....the woman is waiting for me to pi k her up but erifi action must be be done first

Member Avatar for Dani
0
17
Member Avatar for happygeek

A VPN, or Virtual Private Network to be formal, is a method of creating an encrypted data tunnel across the Internet from your device to a destination server. Although savvy home users and enterprises will operate their own VPNs (business-grade routers provide this functionality) for most folk, a VPN comes …

Member Avatar for New Beachboy
6
2K
Member Avatar for Vincent_22

Logfile of Trend Micro Hijack This v2.0.5 Scan saved at 12:20:23, on 30/03/2022 Platform: Unknown Windows (WinNT 6.02.1008) MSIE: Internet Explorer v11.0 (11.00.19041.1566) Boot mode: Normal Running processes: C:\Program Files (x86)\EPSON Software\Epson Printer Connection Checker\EPPCCMON.EXE C:\Program Files (x86)\EPSON Software\Event Manager\EEventManager.exe C:\Users\vince\Desktop\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main, Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 …

Member Avatar for rproffitt
0
223
Member Avatar for Scott_22
Member Avatar for Angel_19

The Declaration of Accelerationist Politics" and subsequent works rejected the left-wing blind worship of so-called "folk politics": flat democratic organizations, space restrictions, slowing down of romanticism, and folk localism. Left-wing politics should better deal with global capitalism and its complex government and economic cycles. Here, accelerationists call for cognitive mapping …

Member Avatar for Reverend Jim
-1
43
Member Avatar for orangsunita728
Member Avatar for saif_15
Member Avatar for Dani
0
149
Member Avatar for Neil_12

In the modern world, it’s easy to understand that data is absolutely essential to many corporations and organizations. There is an ever-growing need to understand the needs and desires of your customer base, so that you may tailor your products/services/platform as much as possible to meet these particular needs. However, …

Member Avatar for Mr.M
3
3K
Member Avatar for Lincoln=1cent
Member Avatar for MickeyD

I think MS is getting a bit shifty in how it coerces you to have an MS account. It's finding more and more ways to get you on the inside. One example of many...Diagnostics collected about your device and how you use it. By default,this diagnostics collecting is turned on. …

Member Avatar for rproffitt
0
187
Member Avatar for MickeyD

I'm sure the forum experts can give some very good feedback in response to this question. Due to the fact I'm beginning to feel somewhat paranoid over my privacy concerns, I'd like to hear from others as well. I need some assurance that I haven't gone off the deep end. …

Member Avatar for Reverend Jim
0
452
Member Avatar for keitech

I've encountered an unknown user appear in my calls log and its had a 16mins airtime videocall to this person in messenger. I'm just suprised, it was appear in my call logs even though I didn't do anything Can anyone help me to track this code or identify who is …

Member Avatar for keitech
0
464
Member Avatar for midsbuilders

I would like to inform the people here on this site (Daniwebs) community know that my account here with Daniweb was not only accessed and found to have been accessed on the Darkweb, it was hacked. I have yet figured out exactly what they were using my account for, or …

Member Avatar for Dani
0
978
Member Avatar for Frisko

Hi I am talking GDPR and Data Protection Act 2018. Can an organisation in the UK have its sales staff wearing name tags/badges with the employees' full name displayed on them? Thanks

Member Avatar for happygeek
0
424
Member Avatar for happygeek

I take security and privacy issues seriously, but sometimes I despair when news stories such as that regarding Samsung TVs eavesdropping on private conversation explode across the media as happened last week. The reason for my despondency has less to do with the data privacy debate and more to do …

Member Avatar for happygeek
3
1K
Member Avatar for Saboor880

![Hello to all members! Actuall I have made an simple android app which just redirects its users to theri favorite brands' websites or online stores. I just downloaded free images of famous brands and added them in my app. When any user clicks on his favorite brand's image, app redirects …

Member Avatar for rproffitt
0
357
Member Avatar for Jessica_16

HELP!! I have a windows server 2012 r2 . I can still use my server until i fell asleep and now woke up, And can't log in to my administrator account. I didn't change password at all, i use the same password and i'd make sure that it is correct. …

Member Avatar for Jessica_16
0
1K
Member Avatar for Jessica_24

Hi. I'm concerned an ex has installed spy software on my computer (and maybe iPhone, but that's for another thread). I've spent days reading about it and I'm not really any closer to figuring out if this is the case, and if so how to uninstall it. Any help would …

Member Avatar for rproffitt
0
405
Member Avatar for mike_2000_17

I was just roaming the internet for some interesting reads and I came across [this very interesting paper](http://www.priv.gc.ca/information/research-recherche/2011/forcese_201107_e.asp) about how to define a legal framework for the "reasonable expectation of privacy" when it comes to our new cyber-existence. I thought I'd share it with you guys, and see what you …

Member Avatar for Reverend Jim
2
2K
Member Avatar for Reverend Jim

How is it that the government that tells us that they need a back door into encryption because the tool that we use to safeguard our privacy can also be used by "bad guys" for evil purposes, completely forgets this argument when it comes to guns? "Yeah, bad guys use …

Member Avatar for rproffitt
0
448
Member Avatar for AmritaHasan11
Member Avatar for Reverend Jim
0
1K
Member Avatar for happygeek

The Electronic Frontier Foundation (EFF) has released the latest version of its 'Who Has Your Back?' [report](https://www.eff.org/who-has-your-back-government-data-requests-2015) and accompanying infographic, and it makes for interesting reading. Once you appreciate that what the EFF is talking about here is how good, measured as a response to a handful of yes or …

1
390
Member Avatar for happygeek

The recently revised Facebook community standards page states that the social network is on a mission "to give people the power to share and make the world more open" however it appears that it may have been giving the wrong people the power to share stuff you thought was private. …

Member Avatar for advent_geek
1
474
Member Avatar for happygeek

In his essay '[A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/2013/12/how-does-nsa-break-ssl.html)' Matthew Green, a cryptographer and research professor at Johns Hopkins University, asks "how the hell is NSA breaking SSL?" If this is news to you, following the Edward Snowden revelations in The Guardian, then you obviously haven't read the New York …

Member Avatar for Tcll
3
919
Member Avatar for happygeek

Cancer is a terrible disease which it has claimed the life of a well known technology journalist and a well known coder within the last couple of weeks. Now Facebook has been diagnosed as being in the final stages of that online cancer which is a disregard for user privacy, …

Member Avatar for goodtaste
0
701
Member Avatar for vegaseat

With just about everybody snooping around your emails today with the excuse of hunting the bad guys, coding to keep some resemblance of privacy is getting important. I will start out with some simple encryption examples to get this started. You are invited to give us your thoughts and codes. …

Member Avatar for Lardmeister
3
1K
Member Avatar for happygeek

According to the [Daily Mirror](http://www.mirror.co.uk/news/technology-science/technology/charlie-hebdo-isis-flag-death-4946579), a number of official websites connected to French municipalities were hacked at the end of last week to coincide with the Charlie Hebdo massacre and the hostage taking at the Jewish supermarket. The newspaper reported that the home screens of websites belonging to the towns …

Member Avatar for Warrens80
1
542
Member Avatar for Reverend Jim

I may be getting paranoid (at least my wife thinks so), but every time I hear/read about the internet of things, all that is said is how wonderful it will be to have everything interconnected and accessible from anywhere you happen to be. However, after all the revelations about the …

Member Avatar for vegaseat
0
454
Member Avatar for happygeek

American technology companies are by implication evil, and aiding terrorist groups such as Islamic State/ISIS according to a number of highly influential but terribly ill-informed Western players. Apple and Google have become the command and control networks of choice for terrorists and implementing full-device encryption by default will help Islamic …

Member Avatar for Warrens80
4
946
Member Avatar for somyms

while mining medical data set privacy is a major concern.i want to mine medical data and preserve privacy.so i need to mine medical data and group them according to diseases so that it can be used for research and publishing without revealing patients information .i planned to use lkc privacy …

0
295

The End.