Questions tagged [Protection against hacking] (1)

1
answer

What is the risk from outside rotornogo for Android, is permanently connected to the Internet, but used only with the fixed software?

This question is probably to the specialists in network security Linux application to Android: 1) if Android 9 smartphone rooted 2) and permanently connected to the Internet via SIM card (the same issue if only using WiFi-router), 3) but uses only a fixed set of software for technological industrial purposes: software on...
Gina39 asked April 19th 20 at 12:16
3
answers

How to hack switch hpj9575A 3800?

Guys, this question urgently needs to crack the local switch, the admin before me forgot the log/pass ( don't know how he is admin of this project ) Switch HP J9575A 3800-24G-2SFP+SWITCH There is nothing except the address to which it is possible to walk, if need be you can go and pick it up( located remotely )
margaret.Bernier asked April 19th 20 at 12:15
3
answers

Than to clean the scripts from the virus?

In General, through a hole protrayl site scripting in WP. Than clean what are the solutions? spoiler
3
answers

Is it possible to disable a webcam when you log in? How to protect from hacking a webcam?

Hi habrovany! Is it possible to disable the webcam whenever you log in to the system? Now every time I log on with a hot key turn off the webcam: But, I would like to automate this process. But at the same time, so you can always enable the webcam when it is necessary (very seldom use). Tell me how to do it? How to prot...
1
answer

What courses protection personal PC and personal network to learn?

Once saw a nice guide. But not read in time, and now he's somewhere in the browser history. Please give me the link to the old one article. There was a lot about. Ridiculous.
Malinda_Gusikows asked April 18th 20 at 13:16
3
answers

How to protect against cookie theft not using meta information (ip, etc..) and js?

If someone climbed to the browser by the user and copied its cookies myself - down the drain? Have to use js, the browser localstorage and other pribludy? Pure http and bakenda in any way? What is the security algorithm using php?
kathleen.Klocko39 asked April 16th 20 at 11:18
2
answers

Alice can illegally gain access to Bob's computer through Google Drive?

If anything, tell me what tags to ponastavili Situation: Bob the computer has a folder synced with Google drive, for example, C:\Users\SillyBob\Google Disk. He shared it to Alice. Can Alice download on the PC Bob a batch file to have it automatically added to your startup and everything works, or it's impossible, and Bob c...
Orlo.Cole asked April 16th 20 at 10:58
2
answers

How to identify malicious traffic to a website?

In October 2019 appeared strange transitions to the site from another country. Duration of visits ranged from 1 second to 1 minute. At the current time (02.04.2020) the position of the site in search results has fallen dramatically the deterioration of the position of the site started from Nov. Here are the current logs for...
Art asked April 16th 20 at 10:34
2
answers

How is it possible that in google search console added and confirmed a third-party user?

Hello. The post office has received notification that google search console added and confirmed as the owner (by adding the root of an html token) third-party user. I am the only owner of the site, access would not let anyone except the developers (creating sub-approaches). Checked the root, html-token not found. The poss...
8
answers

Can hack using Mysql open port 3306?

Good day, is about protecting mysql only know about SQL injections and that we need rules password (which could not pick up). Recently I asked an old friend he said its website stopped working. I went and looked and saw what I have not seen: To recover your lost Database and avoid leaking it: Send us 0.06 Bitcoin (BTC) to...
giovanni_Mraz9 asked April 8th 20 at 10:26