menu

Recent questions tagged protect-you-from-hacking

1 vote
4 answers
How to find a wordpress hack? Hello, on the server with several wordpress sites was hacked, how can you diagnose the place of the hack? The virus went through the folders on the server, changed the r ...
1 vote
3 answers
How to protect your dedicated server from hacking? I recently purchased a dedicated server from Hetzner. I learned how to install the system and configure it. But what about security? I need practical advice about what p ...
1 vote
1 answer
On what principle do people make cheats for online games? Interested in their approach, going to look at it in detail, and of course to prevent this from happening. I am fully proficient in C++ programming. ...
by MaksSmag
asked Mar 24, 2021
1 vote
1 answer
Is OpenVPN on the organization certified? Is the level of protection of OpenVPN sufficient to meet all the criteria of the Federal Law 152? OpenVPN without FSTEK certificate, what are the consequences of using i ...
1 vote
3 answers
Found a shel in cms wp, what do you think is the main or dig further? The attack began about a week ago, and hard on all sites, there are new users and new plugins one of those that created the problem almost a million wp file manager. Aft ...
by Majestty
asked Mar 21, 2021
3 votes
7 answers
Do people go to jail for spreading schemes about hacking and fraudulent methods? One day I saw a post about some schemes, methods, and materials for hacking and fraud being sold. Forgetting all about it, I went on living my life as usual. Some time l ...
3 votes
4 answers
Protection in php against downloading malicious scripts to the server when the file is loaded? Actually the question is in the header. I found a couple of articles on the Internet, but they date back to the beginning of the last decade. So how can we make the sit ...
2 votes
4 answers
How relevant is low-level knowledge in hacking and what place does development have in it directly? In fact, the essence is specified in the title, but I will make some clarifications. I like working at a low level. I like to understand fundamental things. I tried diff ...
1 vote
5 answers
How do I know the formula that calculates the time to break a password? Here's an example of the site https://password.kaspersky.com/ru/ says that my password is cracked in 4 years, but how he calculated it and under what conditions my pass ...
1 vote
3 answers
How do competitors reach our online customers? Hello, I hope there are people here who can give you a hint. The situation is as follows: We have a static landing page on which clients can submit an application via ...
1 vote
3 answers
How do you turn a VM into a "fortress"? We deliver our product (special https server) to the client as a VM (OS Debian 10.4.0), which he himself runs in VirtualBox on his local network. In other words the clie ...
1 vote
4 answers
Are the Windows images from philka safe? I downloaded Windows 10 LTSC images from philka.ru, the hash sums match the ones stated on philka.ru. How safe is it to use such images? Can there be embedded bookmarks ...
8 votes
6 answers
What books should I start reading for web hacking? Hello, I would like to ask what books you advise to read to start web hacking. I am learning and already more or less mastered with ...
2 votes
7 answers
Website on wordpress hacked, how to find and close the holes? There is a wordpress blog under management. Not so long ago there was a break-in, a folder with articles of "miscellaneous nature" was uploaded to the root of the site, ...
1 vote
3 answers
What does an assembler hacker need? What does a hacker need an assembler for, just reverse-engineering or something else? Processors and microcontrollers can be programmed in SI. And smallwares can be writ ...
by Kaktys_DH
asked Feb 21, 2021
1 vote
2 answers
How can I edit variables in a uniquely formatted file? Good day, there is a program that is used to systematize and display the daily performance of construction equipment (all the data taken is converted into a graph), the ...
2 votes
1 answer
How do playmarket, steam and other platforms filter out malicious apps? What prevents developers from putting an application on the platform with a virus or miner inside? What companies and how do they filter and keep their customers safe? ...
11 votes
2 answers
The "puzzle" sites? Greetings! Came across an ad today on vc.ru - with the site "puzzle." . I remember stumbling across similar and even better ones before. Who knows similar ones, can you ...
1 vote
1 answer
Hacker U Russia. Who tried it? I came across an advertisement for hackeru.pro, proclaiming themselves great experts and "coaches" Based on the news, Rybakov invested something like $3 million in them. ...
1 vote
2 answers
Why would a java hacker need java? Why would a hacker need java if you can write android programs in C or Python or JavaScript? ...
by Kaktys_DH
asked Feb 15, 2021