• Manipulation Engine Definition

    Hi all! I've read the term "manipulation engine" (related to passwords) in a couple of papers but aside from guessing could not find a proper definition of it (not even in this website !!!). Can anyone please redirect me to / provide a clear definition of this term, related to "Security"? Many...

    DiegoDH275 pointsBadges:
  • Android app game hacking

    Ok I really need to know how this person is able to find out my information while I'm in an android game app in the games lobby. Any help would be greatly appreciated. I'm not the only one that this person has gotten personal info from on this app. Help!

    needtoknow1030 pointsBadges:
  • Please help in hacking?

    I have to do disclouser attack using Java...can I do it? If yes, then please help. How can I do it because I am studing about security and I know what is happening in disclouser attack but I have to practically know it.

    dhaval279235 pointsBadges:
  • My computer hacked by someone in Afghanistan?

    An AOL person says that my personal computer has been hacked by someone in Afghanistan; how can he tell?

    chrism1225 pointsBadges:
  • What does localhost on netstat mean?

    I was told by a tech support person that if I type netstat and get anything that says localhost I have been hacked.  Is this true?  I hadn't seen it for a couple weeks after they cleaned up the hacking, but it's back tonight (and everything is REALLY slow tonight).  And once tonight, in the...

    greenmusic23f65 pointsBadges:
  • Indicators your computer has been hacked

    What are some indicators that your PC (XP) has been/is being hacked. EX: I was surfing (MozFire) and the browser seemed to freeze momentarily. I closed and reopened, but when I ended my session I noticed my PC clock had frozen for an hour, I started session at 11:10. I ended at 1:05 but the clock...

    AndricVes15 pointsBadges:
  • End-user awareness education for company newsletter

    I have been given the task of developing user awareness 1-pager fact sheets to be distributed on a monthly basis in our company newsletter and posted on our intranet. I can write these from scratch but was hoping not to have to reinvent the wheel. Help?

    CalendarGirl0 pointsBadges:
  • Do I have hackers?

    I have recently noted what appears to be "suspicious acitivity" on my computer.  In doing so, I went to the Control Panel, clicked on Internet Connections, then "View computers in your workgroup."  I was shocked and afraid when I discovered five (5) different computers.  Upon further research, I...

    Askapro10 pointsBadges:
  • trojan horse downloader

    hi i have a win NT4.0 sp6 server.its a DNS and web server. from few days the IE was redirecting the sites to some search engines.when i scaned with AVG it detected some trojan horse downloader.i healed the trojan and restarted the DNS.the problem was solved.but after some hours the problem arise...

    Redrose0 pointsBadges:
  • Can I set up a shadow copy of an entire drive?

    Using shadow copy can I set up a shadow copy of an entire drive and not just a shared folder? Can I also do this on workstations like Windows 7? Or am I limited to only server os’es. If so are there hacks or workarounds?

    ITKE351,275 pointsBadges:
  • Former employee has credential to webhost, domain reg and dns

    Former employee has credential to webhosting service, domain registration, and dns - what can we do to get back control of our assets?

    Bjfass5 pointsBadges:
  • what is needed to beacome a ethical hacker

    Hi guys i am interested in ethical hacking i just dont know where to start learning. What is needed to do the job i have been told to learn PHP and python but i need a much more concrete answer or suggestion can anyone point me in the right direction i am willing to go as far as needed i am not a...

    Scribble165 pointsBadges:
  • Becoming an ethical hacker

    hi,im a btech student and im very interested in hacking but i dont know wat should i learn and my faculty also poor in giving me the information about hacking ,can any one say me?

    09481A125410 pointsBadges:
  • How do I stop my emails from being hijacked?

    How do I stop my Email from being hijacked.  Right now, having already started from "scratch" because my laptop had viruses from some outside source, I have again had both my aol and yahoo accounts' email contact lists hijacked, whereby mails are being sent to dozens of my contacts and even...

    Susiqbrit5 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Best practices involving admin rights for user on user system

    We are currently in the middle of figuring out the approach we are going to take in regard to a user having admin rights on their system. Typcially we set up a new user as an administrator on their system when they are logged into the domain. They don't have a local admin account on the system,...

    Kevins740 pointsBadges:
  • Workaround for adding a DC for backup to SBS 2003 network

    Can I add a second domain controller for backup to my SBS 2003 network? I know it says that I can't, but there has to be a hack or work around! Anyone? We need to have a backup ad machine!

    ITKE351,275 pointsBadges:
  • Found Trojan.ByteVerify on my computer

    Hi All, Symantec recently discovered Trojan.ByteVerify on my computer. I run system checks weekly and am always cautious about the e-mails I open, the web sites I go to and what I click on, so I was pretty surprised to find I had a Trojan. It was quarantined and removed, but I'm worried about what...

    jwise41020 pointsBadges:
  • Cross-site scripting attacks

    I'm looking for advice on cross-site scripting. What can these attacks do and what can I do to protect Web sites/applications against them? Are there any resources you recommend? Thanks

    Kit1230 pointsBadges:
  • Dos attack

    I have been receiving security alert messages from our firewall nearly everyday. e.g TCP Packet - Source:144.120.8.89,39341 Destination:192.168.1.1,25 - [DOS] TCP Packet - Source:210.7.0.36,3473 Destination:210.7.12.23,135 - [DOS] Thu, 2006-10-19 16:30:03 - UDP Packet -...

    92220990 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following