Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 8 years ago.
Improve this question
I live in a college hostel, some other guys do the DOS attacks on rest computers.
The PC gets hanged, CPU uses becomes 100%.
Please help me to prevent from such attacks.
A more elaborate solution would be to put some sort of firewall between you and the rest of your network. and if you now where the attacks are coming from, meaning which ip(s) send the traffic you can block those so your computer doesn't even treat them.
Related
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 1 year ago.
Improve this question
I am new to Kali-linux and I am using it from a USB, my problem is when I shut down my computer and downloaded scripts or changes I have made are gone
That is probably because you are using it from Live mode which is only useful when you want to test few things out. It does not save anything
You can always look into this
persistent kali usb
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 2 years ago.
Improve this question
Please tell me a way to solve this problem
You can try following ways:
Update Windows: (WinKey->Check for Updates)
Change web browser
Disable startup items
Enable High Performance mode
Update Anti-virus
If any of above doesn't work then track manually that where is the disk more utilised.
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 8 years ago.
Improve this question
I am using a company called web-stat to watch for people visiting our website and noticed an entry page of "127.0.0.1:4664/preview" rather than the url of the website or the url of a page.
Does this mean that someone has or is trying to hack our website?
Thanks
Requests to 127.0.0.1:4664/preview are likely from Google Desktop.
Security information about Google Desktop at SMB Security
To know for sure, you should inspect the TCP conversation and source endpoint to observe what exactly is making the requests.
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 9 years ago.
Improve this question
Suppose I'm using the write command to send messages to another host on the server. Can the root user or any other user get to know that we are interacting?
This can easily be done by any user that can capture packets on the interface (including root) and any intermediary devices. Moreover, root could in theory install additional mechanisms to hijack/inspect traffic.
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 5 years ago.
Improve this question
how does browser (firefox/safari) detects that website you are visiting is infected?
Do they have a black list? or they run the URL through some Antivirus scripts? or What happens behind the scenes?
Each browser manufacturer maintains its own blacklist. See:
http://www.mozilla.com/en-US/firefox/phishing-protection/
http://www.microsoft.com/security/filters/smartscreen.aspx