Jump to content

Search the Community

Showing results for tags 'security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General Section
    • Announcements & News
    • Introduce Yourself
    • General Discussion
    • Recreational Activities
    • Entertainment
    • Private VIP Lounge
    • Art / Screenshot / PhotoGallery / Signature
    • Suggestion
  • Gaming - Discussion
    • Enemy Territory
    • Call of Duty Series
    • Insurgency Series
    • Day Of Infamy
    • Team Fortress
    • Battlefield Series
    • Counter Strike Series
    • Other Games
    • Console & Mobile Gaming
    • Complaints
  • Help & Discussion Center
    • Tutorials
    • Q&A / Reports / Issues
    • Downloads
    • Software & PC Support
    • Hardware Hangout
    • Reviews by Members for Members
    • Language Learning & Translation
  • ETPRO's Topics
  • ET Trick Jump's Topics
  • Clash of Royal's Topics
  • Clash of Clans's Topics
  • Rocket League's Topics
  • Cards Against Humanity's Topics
  • Eastside Hockey Manager's Topics
  • Trading's Topics
  • Board Games's Topics
  • ET Mapping's Topics
  • Rust's Topics
  • Runescape's Topics
  • GTA's Topics

Calendars

  • Community Calendar
  • Gaming Events
  • ETPRO's Events
  • ET Trick Jump's Events
  • Trading's Events

Product Groups

  • Donation Packages
  • VIP Membership
  • Private Slot
  • ETPRO Events
  • Advertising

Blogs

  • Death's blog
  • Excerpts from a Diary
  • A lil piece of my life
  • Dissertation writing
  • Loki's Blog
  • ThuMpeRKA's Blog
  • RoadKILL's Blog
  • CaldasGSM's Blog
  • Sponkala's Blog
  • $kullcollector's Blog
  • Ganja.'s Blog
  • $kullcollector's Blog
  • Chameleon's Blog
  • The ramblings of an internet addict
  • Narug0's Blog
  • Pantha´s life
  • BambooBlog
  • PHANTASM RANTS
  • LeftWingVixen's Blog
  • LeKs!!'s Blog
  • Ol' Smoke's Blog
  • Crips+'s Blog
  • Pvt. Parts' Blog
  • LEKS...HUNTER OF KILLERS Blog
  • StgsL's Blog
  • WET map tutorials
  • My journey in gaming world
  • Tech Blogs
  • FireWienie's Blog
  • leks... se la rifa's Blog
  • Skylark159's Blog
  • Gaming Simplified
  • Be Act!vity's Blog
  • *
  • Be Act!vity's Blog
  • willo's Blog
  • Be Act!vity's Blog
  • Picior's Blog
  • The Scribbles of a Madman
  • crazy mafia fox's Blog
  • Chameleon's Blog
  • crazy mafia fox's Blog
  • Freedom by Exact.
  • 1984's Blog
  • ESPCatalina's Blog
  • Radoria's Blog
  • leks... se la rifa's Blog
  • Deepak Jain's Blog
  • Aphrodite01's Blog
  • Going to California for 3 week training
  • GraveDigger's Blog
  • LordTerror's Blog
  • asassin's Blog
  • 3 Week California Army Reserve training
  • Braveheart's Blog
  • Matt123Mann's Blog
  • Braveheart's Blog
  • blackknight8653's Blog
  • N!tmod Official Blog!
  • Flashing Lights' Blog
  • Nitrox*'s Blog
  • Skillz's Blog
  • BigRich's Blog
  • Skillz's Blog
  • Madgemade's Blog
  • Bowly's Foods
  • Ricardo Puente's Blog
  • kimbohunter007's Blog
  • hisoka's Blog
  • Duckie's Blog
  • FlA Sneaky Guy's Blog
  • FlA Sneaky Guy's Blog
  • severjack's Blog
  • FlA Sneaky Guy's Blog
  • Yep
  • Leichensammler's Blog
  • clxph4l4nxX3ta's Blog
  • I Can Do This Crap Too!
  • The thoughts of an insane white boy
  • Bowly's Thoughts
  • JohnWitman's Blog
  • Medic's Blog
  • AcidParadox's Blog
  • AcidParadox's Blog
  • Devil's Blog
  • Thoughts of an Assassin
  • ladosisletal's Blog
  • ladosisletal's Blog
  • Chameleon's Blog
  • Jonne Mikkola's Blog
  • Hecken's Corner
  • Blog
  • =pb=theblackkill's Blog
  • J35T3R's Blog
  • Recktilectrik's Blog
  • Soup's Blog
  • rolan001 blog
  • Stavros' Blog
  • Marine's Blog
  • The Smoke's Blog
  • The Dramatic Life of a Typical Asian
  • A day in the life of DeCareaux
  • ZIGZAG's Blog
  • Pabbatt Blue's Blog
  • ZIGZAG's Blog
  • Neuro's Blog
  • turkoxp's Blog
  • Verillaxus' Blog
  • Novice's Blog
  • lucianalorrane's Blog
  • BF2 Sandbox
  • Platform
  • zippye87's Blog
  • Success & Failure
  • zippye87's Blog
  • SHINE EDB to PST Converter Software to Convert EDB to PST
  • KonSiX-!7's Blog
  • EdbMails for exchange Recovery
  • TheProOne's Blog
  • TheProOne's Blog
  • Interview: CheepHeep
  • cereal killer's Blog
  • Diary of a Radioman
  • Play Golden Tour Slot Machine Online
  • JohnnyColorado
  • Jasons Days
  • The Life of a Sound&Lighttechnician
  • kimbohunter007's Blog
  • Memoir of eurotrip
  • OMGITSSHMANESBLOG
  • /dev/random
  • sawwasLT's Blog
  • Mapping Sandbox
  • Shagger's Blog
  • Joining a Clan
  • Shagger's Blog
  • Karine's Blog
  • weAsels diary
  • The !Chuck4Abuck's small world Blog
  • Christoffer's Blog
  • eagle7wolfensteiner77's Blog
  • eagle7wolfensteiner77's Blog
  • eagle7wolfensteiner77's Blog
  • eagle7wolfensteiner77's Blog
  • Fb!N!nJa's Blog
  • Fb!N!nJa's Blog
  • 1984's Blog
  • viper1's Blog
  • viper1's Blog
  • caca_de_puercp's Blog
  • czarek_pl's Blog
  • MoAZeR's Blog
  • Seppe*'s Blog
  • chips1chips1's Blog
  • St0nedGh0st's Blog
  • Jaaa!&'s Blog
  • test
  • admin's Blog
  • Life The Universe And Everything
  • CSL's Blog
  • Papa recoil's blogy
  • Strato!'s Blog
  • o
  • ET: from zero to hero
  • JayC's Blog
  • Dupstep's Blog
  • GodLui's Blog
  • M4A1+CQB's Blog
  • Chuckun's F|A Experience
  • M4A1+CQB's Blog
  • Diary Of A Wicked
  • ETNam.OrG
  • Computers are Strange
  • angel96's Blog
  • ToXiiCxKKiNg's Blog
  • Zuthus' Blog
  • janno's Blog
  • DJ´s free Software Blog
  • Excellent !!!!
  • Scream's thoughts
  • wesker's Blog
  • Bla Bla Bla
  • mattle's Blog
  • Panzerknacker's Blog
  • OMFG_A_BUNNY's Blog
  • Leaving
  • Fargwire's Blog
  • Fargwire's Blog
  • *SwissArmy*'s Blog
  • monkeysmack's Blog
  • MiNiOn's Blog
  • MiNiOn's Blog
  • Wizbang's Blog
  • Blawg
  • yoyotach's Blog
  • Vendela's Blog
  • King Hexaan's Blog
  • Gotcha
  • DJ´s Hardware Corner
  • azn_wan92's Blog
  • =Death Hunter='s It's those little things...
  • Panzerknacker's Blog
  • Big-E!:)'s Blog
  • SanToS' Blog
  • Pinoy Blog
  • Qlimax's Blog
  • DJ's Rumor Mill
  • tyler's Blog
  • WaaSab:>
  • Colin's Movie Blog
  • Weld21dejo's Blog
  • GI-JOE's Blog
  • Crasher's Blog
  • Ramblings
  • Blade
  • Blade's Blog of Mishaps and Misfortune
  • Panzer-WT?'s Blog
  • Fierce's Toolshop
  • Caulktails and Video Games
  • Caulktails and Video Games
  • YoYoO SonnY's Blog
  • YoYoO SonnY's Blog
  • wuolfe
  • Warning.'s Blog
  • Reviews
  • The Archangel Chronicles
  • Me sports and gaming
  • Yellow Flash's Epic journey
  • H3LLB0Y's Blog
  • How to be a good player at shooting games
  • member for a few days
  • bubading_CZE's Blog
  • Ooops' Blog
  • sssssss
  • Common Sense
  • hUnI's Blog
  • Adroits LAN - Enemy Territory Overview
  • ybmad's Blog
  • mR.d0t's Blog
  • Dennis' Mapping Project and More
  • Boring Monday
  • Battle of the Wits
  • NoCell's Noob explanation blog.
  • Perceivisms
  • Jormehara
  • Alien 01
  • =Death Hunter='s Constitutional Rants
  • Ph0eniX's Blog
  • Phr33 St00f Pl0x
  • Heretic121's Blog
  • B1gM1k3's Blog
  • Rap & HipHop Place
  • Small true story being Australia
  • jaie's Blog
  • redirect tf2 test
  • =FA=GuN's Blog
  • Meh
  • INDIAN**'s Blog
  • jungleo_0's Blog
  • dontkill me's Blog
  • Patrick's Blog
  • Jake P's Blog
  • Junior Tejera's Blog
  • Brain Chow
  • jwills112's Blog
  • halaluia
  • kamikaze's Blog
  • Why not?
  • Dare2BeFair / Captain.'s Blog
  • ronaldounit0's Blog 2/25
  • Journey of a troll to a man
  • Taborham Lincoln's Blog
  • The Adventures of Taborham Lincoln
  • -Shut Down2-
  • Xernicus' Coffee Blog
  • F3@R's Blog
  • Wolfenstein classic vs wolfenstein The New Order
  • Mr.Karizmatic's Blog
  • TrackBase
  • david812's Blog
  • Detorkville's Blog
  • -Shut Down-
  • Chameleon's Blog
  • Prime's Log Entries : The Return of Apha Trion
  • Ktom's Blog

Categories

  • Fearless Assassins Software
  • Enemy Territory
    • Software
    • Maps
    • Map Scripts
    • Mods
    • Soundpacks
    • Skinpacks
    • LUA
    • Player Configs
    • Waypoints
    • Punkbuster
  • Call of Duty 4
    • Software
    • Mods
    • Maps
    • Player Configs
  • Other Games
    • Insurgency
    • Minecraft
    • Team Fortress 2
    • Counter Strike Series
  • Windows Software
  • Sounds

Marker Groups

There are no results to display.

Categories

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Youtube


Steam


Xbox Live


PSN ID


Discord


Battlelog


Website URL


Skype


Occupation


Alias


Admin


Interests


SL


TB


Location


W:ET GUID


S:ET GUID


N:ET GUID


COD4 GUID


BF3 GUID


Steam ID


steamID64


T-M


S1


HC


B2

Found 15 results

  1. HIGHLIGHTS: - More than 33 million downloads - 111 malicious or fake Chrome extensions (from the GOOGLE Official Store - removed in JUNE 2020) - 15,160 malicious/suspicious domains MILLIONS of Google Chrome users may have had their intimate web browsing history hacked as security experts discover malicious spyware extensions, which have been downloaded more than 30 million times. Exemple of FAKE extension (infected): Discovered by Awake Security Team, these 3 months they have harvested 111 malicious
  2. This appeared on an Opera updates page that opened for me. I don't really know if this really a valid test or just an "always use Opera" sort of thing. I will have to try it with my other browsers, via Private-Incognito type modes. https://cryptojackingtest.com 1) I just tried it with IE 11 and the test-page said "protected", BUT my Norton AV said that it blocked a intrusion attempt by a a JSCoinminer site and a coinhive IP. 2) Tested on Chrome and Norton said that it blocked a JSCoinminer site before I even pressed "start" for the test...which said that my Chrome is "protected." 3) Teste
  3. This site says that MS will install Emergency Updates today, at 5pm EST and 2pm PST...I just received mine at 1pm PST. It included updates for ARM and Windows Server 2016. https://www.theverge.com/2018/1/3/16846784/microsoft-processor-bug-windows-10-fix NOTE: "The update will also be available for older and supported versions of Windows today, but systems running operating systems like Windows 7 or Windows 8 won’t automatically be updated through Windows Update until next Tuesday. Windows 10 will be automatically updated today." Nest Tuesday is the traditional "Patch Tuesday".
  4. Hallo! With the growing security concern via the net, I thought I'd share my security tips,etc and how ive secured my PC w/o $$ and so far, so good. Maybe others can contribute their knowledge/wisdom. I was watching youtube and saw all the "web analytics" blocked in the site (see blocking) Good old Kaspersky I.S. I recommend, built in browser protection, I have a trial reset, G2G. Also, I cant emphasize enough, use a host file(see block2) block imbedded ads, if you really wanna get technical, clear browser cookies, visit a site, and then check options/remove individual cookies and see
  5. Email and phone scams claiming to be the Windows 10 upgrade "... cybercriminals are trying to capitalize on the great momentum of Windows 10, with nefarious email, web, and phone scams directing our customers to install ransomware and other malware." more here: https://support.microsoft.com/en-us/kb/3086823 Warn your less-knowledgeable friends and relatives!
  6. There's a way to compromise a home network without actually being on it. It's called "cross-site request forgery." It starts by redirecting a user to a malicious website, typically by phishing. The site uses the prey's browser to send requests to the home router. The router thinks the prey is sending the requests from the home network. "Home routers are very naive," said Incapsula's Ofer Gayer. Most consumers pay as much attention to routers as they do to doorknobs. That's not the case with Net marauders. They're finding the devices ripe targets for mischief. "We've seen a big increase i
  7. Symantec says a critical vulnerability within some Apple Mac models could allow hackers to inject systems with persistent rootkit malware. Cyberattackers could, in theory, reflash the computer's firmware and install Extensible Firmware Interface (EFI) rootkit malware. The security firm confirmed the existence of the security flaw late on Thursday. The flaw, called the Apple Mac OS X EFI Firmware Security Vulnerability, was originally disclosed May 29 by Apple's security researcher Pedro Vilaca. The problem l
  8. I received this email today: Keep Your ID and Accounts Safe March 2015 Dear Bone-Head, In the last several years, scammers have increased their "phishing" attempts (e-mails asking individuals to divulge sensitive information). Financial Center has learned about a new phishing scam that is currently circulating the Web, and wanted to pass the information along to you so you and your family can stay safe. The Scam The National Credit Union Administration (NCUA) has issued a warning to consumers about a website with a logo and design that is similar to the NCUA's site. U
  9. I've been getting PayPal phishing emails every two weeks recently. Paypal says they will always address you by your first and last name, and I say that they will never have a little tab for you to click to log onto their site. (I have hovered my mouse pointer over such tabs and the address shown at the bottom of the browser is never to Paypal.com) Forward any suspicious emails to spoof@paypal.com Ironically the reply-to: and from: in this latest attempt were for "security . org", to whom I also forwarded the email. It nothing else, it will help them understand if they ever get t
  10. Apple Inc. said it plans additional steps to keep hackers out of user accounts but denied that a lax attitude toward security had allowed intruders to post nude photos of celebrities on the Internet. In his first interview on the subject, Apple Chief Executive Tim Cook said celebrities' iCloud accounts were compromised when hackers correctly answered security questions to obtain their passwords or when they were victimized by a phishing scam to obtain user IDs and passwords. He said none of the Apple IDs and passwords leaked from the company's servers. To make such leaks less likely, M
  11. Every Android application has its own unique identity, typically inherited from the corporate developer’s identity. The Bluebox Security research team, Bluebox Labs, recently discovered a new vulnerability in Android, which allows these identities to be copied and used for nefarious purposes. Dubbed “Fake ID,” the vulnerability allows malicious applications to impersonate specially recognized trusted applications without any user notification. This can result in a wide spectrum of consequences. For example, the vulnerability can be used by malware to escape the normal application sandbox a
  12. So over the past month I have had 2 different credit cards and a debit card incur an international charge of $49.50. All of them coming from a different fake websites setup to look like customer service sites. I googled one of the websites ( HCINCSUPPORT.COM ) and I am not the only one getting hit from this supposed company. After the first card was hit I thought it was a travel agents fault in their email security since i sent them my credit card info. So i just blew it off got a new card. A week later my second credit card was hit for the same charge. This past week my debit card was hit fo
  13. From the album: Helper Pics

    unexpected popup, probable source: xfire
  14. I've owned a mac for quite a while now. I'm just wondering whats the best/most useful antivirus/security programmes designed specifically for the Mac. I've used all the free ones from the apple store but never found them that great. You maybe wondering why I use them. Well to protect my mac as the threats of virus' have increased and to protect friends and family from windows virus' that I may have on my mac. So back to the original question what's the most useful?
  15. Firstly, a little introduction to these tutorials. I am currently working on a clients website, and when I want to take a break, I've decided I will be posting about techniques I've used to cater for different needs, which people may find interesting. Today, I'll be showing you how you can easily protect your downloadable media. Why would you want to do this? Well, often we want to hide the location of the downloads, to stop people leeching your content. And most measures can be easily swerved. Here is a method I quite like. I have annotated everything for your convenience.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.