1
General discussion / Re: buying a new laptop
« on: January 20, 2015, 12:43:29 pm »Why not a desktop? What budget are you on etc?
why not a desktop bec. i need it to be mobile for different reasons.
My Budget is about 900$
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Why not a desktop? What budget are you on etc?
it's not a bad post, like really the info is right but like u say u are an electronic com student more elaborate stuff belong here this stuff isn't meant to be on this forum like 90% of the members know it already. I don't wanna be mean since u put effort in it and I know what u can feel since the first tuto I made received much more negative feedback but keep going and try to be much more elaborate and go into complex things dnt worry we'll deal with it
Apart from the poor formatting, this is what I'd expect to see in a grade 9 Computers Book.Hahahaha , i just tried to be simple bec. my English isn't very good and not a grade 9 books i am a Electronics and communication engineering student.
A cookie for trying, though.
It is in fact possible, you should look into RAW Sockets.\
I do not have any code, but if you are capable of using raw sockets corectly you wont need any example code
Oh, the "hacker tracker" thing? I'll go with d4rkcat and answer logs too. Of course, they can be altered. And there's ip spoofing and all...Thank you i just wanted answers , no more .
Someone said the best hacks are mostly never detected.
It was moved to the Board of Shame because the answer to your question was just a google search away. Use a search engine next time.
I don't know either, that's kind of fucked up.
You didn't ask anything illegal, you just didn't ask the question in very good English.
To answer, I think logs would be your best bet.
You have to find out how they got in, was it sql injection? Did they already have a password? Did they social engineer an administrator?
Logs will be your friend, if they haven't deleted them.
There should be logs for alot of aspects to the website including the admin panel.
Using the process of reduction you can find the suspicious log entries.
The hacker may have used anonymizing proxies or something similar but it is worth a try.
Also you may want to delete everything and start fresh because they will have put additional backdoors everywhere.
good luck.
It's the board beneath this oneYou mean i must check the "members introduction" board fist ?