Search Results

Search found 313 results on 13 pages for 'hacker'.

Page 6/13 | < Previous Page | 2 3 4 5 6 7 8 9 10 11 12 13  | Next Page >

  • Site overthrown by Turkish hackers...

    - by Jackson Gariety
    Go ahead, laugh. I forgot to remove the default admin/admin account on my blog. SOmebody got in and has replaced my homepage with some internet graffiti. I've used .htaccess to replace the page with a 403 error, but no matter what I do, my wordpress homepage is this hacker thing. How can I setup my server so that ONLY MYSELF can view it while I'm fixing this via .htaccess? What steps should I take to eradicate them from my server? If I delete the ENTIRE website and change all the passwords, is he completely gone? Thanks.

    Read the article

  • chmod 700 and htaccess deny from all enough?

    - by John Jenkins
    I would like to protect a public directory from public view. None of the files will ever be viewed online. I chmoded the directory to 700 and created an htaccess file that has "deny from all" inside it. Is this enough security or can a hacker still gain access to the files? I know some people will say that hackers can get into anything, but I just want to make sure that there isn't anything else I can do to make it harder to hack. Reply: I am asking if chmod 700 and deny from all is enough security alone to prevent hackers from getting my files. Thanks.

    Read the article

  • iOS piraté à l'aide d'un chargeur malicieux, des hackers installent un malware sur l'iPhone en moins d'une minute

    iOS piraté à l'aide d'un chargeur malicieux Des hackers installent un malware sur iPhone en moins d'une minuteLorsqu'il s'agit de parler de sécurité de périphériques mobiles, la tendance voudrait que ceux exécutant le système Android soient tout de suite mis au devant de la scène comme les moins sécurisés qui soient. Jamais on a à l'esprit de prononcer le nom iOS parce que considéré par beaucoup comme plateforme très sécurisée.Le mythe vient d'être brisé. Trois chercheurs en sécurité de l'état de Géorgie aux États-Unis viennent de dévoiler une faille permettant à un hacker d'installer une application malicieuse sur iOS sans que son propriétaire ne s'en rende compte.Billy Lau, Yeongjin Lang et Che...

    Read the article

  • Secure Web Apps from SQL Injection in ASP.Net

    In the first part of this two-part series you learned how SQL injection works in ASP.NET 3.5 using a MS SQL database. You were also shown with a real web application which was not secure against SQL injection attacks how these attacks can be used by the hacker to delete sensitive information from your website such as database tables. In this part you will learn how to start securing your web applications so they will not be vulnerable to these kinds of exploits. A complete corrected example of the insecure web application will be provided at the end of this tutorial.... ALM Software Solution ? Try it live! Requirements Management, Project Planning, Implementation Tracking & QA Testing.

    Read the article

  • HTG Explains: How Hackers Take Over Web Sites with SQL Injection / DDoS

    - by Jason Faulkner
    Even if you’ve only loosely followed the events of the hacker groups Anonymous and LulzSec, you’ve probably heard about web sites and services being hacked, like the infamous Sony hacks. Have you ever wondered how they do it? There are a number of tools and techniques that these groups use, and while we’re not trying to give you a manual to do this yourself, it’s useful to understand what’s going on. Two of the attacks you consistently hear about them using are “(Distributed) Denial of Service” (DDoS) and “SQL Injections” (SQLI). Here’s how they work. Image by xkcd HTG Explains: How Hackers Take Over Web Sites with SQL Injection / DDoS Use Your Android Phone to Comparison Shop: 4 Scanner Apps Reviewed How to Run Android Apps on Your Desktop the Easy Way

    Read the article

  • 1,5 million de comptes Facebook en vente, un pirate russe fait le bonheur des réseaux de phishing

    1,5 million de comptes Facebook en vente, un pirate russe fait le bonheur des réseaux de phishing «Kirllos», un hacker russe, vient de mettre en vente 1.5 million de comptes Facebook sur un forum est-européen. Et, période de soldes oblige, il propose des prix de gros avec des tarifs attractifs : 25 dollars les 1.000 comptes avec moins de 10 amis, 45 dollars les 1.000 avec plus de 10 contacts. Il est vraisemblable que les "utilisateurs" avec très peu ou pas de contacts aient été crées par ses soins, et les autres compromis avec un vol de mot de passe. Le pirate semble agir seul, mais les spécialistes se penchant sur le cas n'excluent pas qu'il puisse n'être qu'un intermédiaire. Quant aux clients se ruant sur...

    Read the article

  • Disk drive won't let go of password prompt at bootup?

    - by user54003
    I had a hacker intrude into my system, at the time it was obvious, so I reinstalled. However, I am left with what appears to be a fatal problem as far as one of my disk drives goes. When I install that drive in my system, a prompt comes up for the disk password, and what it is asking for is a root password. The disk works otherwise normally but despite all my efforts, I have not been able to fix this disk. I have gotten the operating system parted magic and done the most extreme clean up available, the internal one which sends a signal to the disk electronics which runs a built in clean up program. Darik's boot and nuke, I've tried them all but I can't seem to remove this with anything in the Linux line. Does anyone have any suggestions? I've run gparted, created a Sun, an Apple and various other schemes to partition the disk, all to no avail. Can anyone help?

    Read the article

  • Site Suspended -message at my site and Facebook fan page? [on hold]

    - by Jere_Sumell
    I'm writing blog at Wordpress, and bought Domain park for it for a shorter web address for my readers who I redirect to my blog. Yesterday there was a first time message titled "Account Suspended due to registration information verification failure". I've never changed my contact information at my Web Host, and my contact Information has not been changed. I have Fan page on Facebook too, that my readers' could follow my blog easier, and there was same kind of message on my Facebook site too. Can you tell me, what's going on? I've not been broking any terms of use at my host, and writing good language on my blog. I think it's a some kind of hacker -thing? Is there nothing else to do than contact my web host that they can fix the problem? Can they? I Contacted last night my host, but got no answer yet.

    Read the article

  • PTS in flash game

    - by Erik Persson
    Hi, A friend to me made a flash game for my website. The game makes a request to /game/p00ints with the points in $_POST['points']. But, a hacker can easy find out how to get more points I guess, so, how can my friend or I fix this security hole? Best regards, Erik Persson

    Read the article

  • Points (PTS) in flash game

    - by Erik Persson
    Hi, A friend to me made a flash game for my website. The game makes a request to /game/p00ints.php with the points in $_POST['points']. But, a hacker can easy find out how to get more points I guess, so, how can my friend or I fix this security hole? Best regards, Erik Persson

    Read the article

  • What happened to programming-books.com?

    - by Kurtosis
    A couple years ago I found a great site called something like 'programming-books.com' (but not exactly that). It let users submit links to their favorite books for various programming languages, and write a short blurb about why they're so good. You could include their Amazon page and the website would grab a cover picture. I've since lost that bookmark and am trying to find it again, anyone know what site I'm talking about? Is it still around? (cross-posted @ hacker news)

    Read the article

  • How do you determine an acceptable response time for DB requests?

    - by qiq
    According to this discussion of Google App Engine on Hacker News, A DB (read) request takes over 100ms on the datastore. That's insane and unusable for about 90% of applications. How do you determine what is an acceptable response time for a DB read request? I have been using App Engine without noticing any issues with DB responsiveness. But, on the other hand, I'm not sure I would even know what to look for in that regard :)

    Read the article

  • What is a dictionary attack?

    - by Chris
    When we say dictionary attack, we don't really mean a real dictionary, do we? My guess is we mean a hacker's dictionary i.e. rainbow tables, right? My point is we're not talking about someone keying different passwords into the login box, we're talking about someone who has full access to your database (which has hashed passwords, not plain passwords) and this person is reversing the hashes, right?

    Read the article

  • Arrays become null after passing to function in PHP

    - by William
    So when I pass my filled arrays to the function createform the form is created with $max_avatars options, but they have no name or value. Why are my arrays becoming null? <?php $avatar_image_name = array('hacker','samurai','cool','happy','thatsnice','angry','tv','bang'); $avatar_name = array('Hacker','Samurai','Cool','Happy','That\'s nice','Angry','TV','Bang'); $max_avatars = 6; createform($max_avatars, $avatar_image_name, $avatar_name); ?> The function createform: function createform($max_avatars, $avatar_image_name, $avatar_name) { $string ='<table id="formtable"> <tr><td class="formtext">Name:</td><td><input type="text" name=name size=25 /></td></tr> <tr><td class="formtext">Trip:</td><td><input type="text" name=trip size=25 /> (<font style="color: #ff0000">Don\'t use your password</font>)</td></tr> <tr><td class="formtext">Comment</td><td><textarea name=post rows="4" cols="50"></textarea></td></tr> <tr><td class="formtext">Avatar:</td> <td> <select name=avatar>'; for($i = 0; $i < $max_avatars; $i++){ $string = ($string . '<option value="'.$avatar_image_name[i].'">'.$avatar_name[i].'</option>'); } $string = ($string . '</select> </td> <tr><td class="formtext">Extra</td><td>Fortune: <input type="radio" name="extra" value="fortune" /> Poker: <input type="radio" name="extra" value="poker" /></td></tr> </table> <input type=submit value="Submit" id="submitbutton">'); echo $string; }

    Read the article

  • What is an MQ and why do I want to use it?

    - by daveslab
    Hi folks, On my team at work, we use the IBM MQ technology a lot for cross-application communication. I've seen lately on Hacker News and other places about other MQ technologies like RabbitMQ. I have a basic understanding of what it is (a commonly checked area to put and get messages), but what I want to know what exactly is it good at? How will I know where I want to use it and when? Why not just stick with more rudimentary forms of interprocess messaging?

    Read the article

  • How do you determine an acceptable response time for App Engine DB requests?

    - by qiq
    According to this discussion of Google App Engine on Hacker News, A DB (read) request takes over 100ms on the datastore. That's insane and unusable for about 90% of applications. How do you determine what is an acceptable response time for a DB read request? I have been using App Engine without noticing any issues with DB responsiveness. But, on the other hand, I'm not sure I would even know what to look for in that regard :)

    Read the article

  • Cookiless Session Is it a security risk?

    - by Costa
    Hi http://msdn.microsoft.com/en-us/library/aa479314.aspx You have a user who successfully log in from a machine in Cybercafe, Hacker H able to sniff the network and get the sessionID of the user, Can H use the sessionId and act as the user from another machine? Can H enter http://folder/(session id)/CreditCardInformation.aspx to know the credit card number of the user?

    Read the article

  • Application self aware of external database record modifications.

    - by Khou
    How do you make your application aware that a database record was changed or created by an external application rather than the application itself? Do you add a special check sum to the database record or what do you do to stop external changes to the database? (in case it was hacked and the hacker decides to add a new record or change an existing database record)

    Read the article

  • Security-Active Application in background-Does it store image of current screen

    - by user1509593
    Is this a probable security flaw. A user in public (lets say Starbucks) tries to log in to iOS application. He enters user id and password [Password is hidden using xxxxxxxx (not exposed)] and a call comes in or he presses home and the application goes to background. a) Does iOS store an image of current screen b) A malicious hacker with intent takes control of the device. Can he read the password ? Do we have to clear out sensitive information while going to background

    Read the article

< Previous Page | 2 3 4 5 6 7 8 9 10 11 12 13  | Next Page >