So its lose my favorites or trust some data recovery people and shell out a ton. Thanks for the advice but at the moment i cant be without my hd so looks like i might have to trwal back through the websites again.eh
cheers net_buster
Thanks for the help but i am not sure if i have confused you or not, i backed up internet explorer on my usb hd but then deleted it.(dosent go to recycle bin.)
1) will my favorites be stored in the Ie folder.
2)If they are is it ossible i can recover them from my use hd.
Ok i know this was a stupid thing to do but here goes, my computer needed to be restored to its factory settings and i decided to backup my "program files" on my portable hd. I forgot to backup my favorites.(export from IE as HTML file)
Once my computer was restored and the files...
By the way sorry if this is an appopriate forum to post this in but i couldent think of any other one if i am wrong (sorry admins) then feel free to point me in the right direction.
Ok i know this was a stupid thing to do but here goes, my computer needed to be restored to its factory settings and i decided to backup my c: on my portable hd. I forgot to backup my favorites. Once the computer is restored and the files copied back across i deleted the files that the computer...
Linux is an excellent firewall (trust me i speak from experience.) Despite it being much harder to get past the linux firewall you can enable dynamic i.p.'s so if anyone portscans you, buy the time they even think about trying to get in your server your i.p. will have changed.
I support your...
Well if you have linux then your i.p. should be dynamic and will change as soon as they port scan you,so it wont matter for a security aspect but it is alredy a good idea to see if you can find out who it is and if you can make back as good as you got ;)(and better if possible)
cheers
Just a quick question, you are obviously using linux for a webserver but how do you know the other guy was using linux and what FTP he was using (as you were looking for an exploit for a specific linux FTP program)
SO did you have a trojan (like that link states)... what was the exploit...
Exactly what i thought when i first read this thread... you could be in genuine trouble or you could be a skript kiddie but im gonna sugges something either way.Run regedit to go to the registry (presuming you know how to use the registery... if not then steer well clear as making mistakes in...
Yes it could quite easily be your wireless as with standard LAN connections (using rj-45) thennyou can be sure that no data packets are entering the outside world but with the wireless which uses radio the data packets could easily be picked up by hackers etc.... and from what ia have heard the...
ISDN (baseband transmission) is also used in the u.k. for remote or rural areas when people require more than 56k and adsl is not avaliable (let alone cable)
There is also " B-ISDN", which uses broadband transmission and is able to support transmission rates of 1.5 Mbps. B-ISDN...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.