Skip navigation
Help

online banking

warning: Creating default object from empty value in /var/www/vhosts/sayforward.com/subdomains/recorder/httpdocs/modules/taxonomy/taxonomy.pages.inc on line 33.

Chrome’s malware warning page. Image: Google.

Nothing drives away your visitors quite like a message from Google that “this site may harm your computer” or “this site may have been compromised.”

Hopefully you’ll never need it, but if your site does get hacked Google has set up a new site dedicated to helping websites that have been hacked.

The “Help for Hacked Sites” section of Google’s Webmaster Tools offers up articles and videos to help you not only recover from compromising hacks, but take steps to make sure it doesn’t happen again.

Part of what makes hacked sites difficult to deal with is that oftentimes developers don’t even notice that they’ve been compromised. “Hacks are often invisible to users,” says Google in its new help section. “For example, unbeknownst to the site owner, the hacker may have infected their site with harmful code which in turn can record keystrokes on visitors’ computers, stealing login credentials for online banking or financial transactions”

Google has an 8-step program for unhacking your site, which include basics like identifying the vulnerability that was used to compromise your site, as well as how to request a review so Google will remove the dreaded “this site has been compromised” message from its search results.

For more info and all the details on what to do if you’ve been hacked, check out the new Help for Hacked Sites section of Google’s Webmaster Tools.

0
Your rating: None

Aurich Lawson / Thinkstock

Encryption, the transformation of data into a form that prevents anyone unauthorized from understanding that data, is a fundamental technology that enables online commerce, secure communication, and the protection of confidential information.

Encryption algorithms are the mathematical formulae for performing these transformations. You provide an encryption algorithm with a key and the data you want to protect (the plaintext), and it produces an encrypted output (the ciphertext). To read the output, you need to feed the key and the ciphertext into a decryption algorithm (sometimes these are identical to encryption algorithms; other times they are closely related but different).

Encryption algorithms are designed so that performing the decryption process is unfeasibly hard without knowing the key.

Read 55 remaining paragraphs | Comments

0
Your rating: None

bs0d3 writes "Last year, piratebay co-founder Peter Sunde gathered coders to begin a decentralized dns system. This is a direct result of the increasing control which the US government has over ICANN. The project is called P2P-DNS and according to the project's wiki, this is how the project is described: 'P2P-DNS is a community project that will free internet users from imperial control of DNS by ICANN. In order to prevent unjust prosecution or denial of service, P2P-DNS will operate as a distributed and less centralized service hosted by the users of DNS. Today the project continues, barely. A majority of interest shifted to namecoin once the idea was realized, but coder Caleb James DeLisle continues on the first project. So far he has DHT nodes and routers worked out, and awaits help on his IRC channel whenever volunteers are willing to join."

Read more of this story at Slashdot.

0
Your rating: None

Ask Reddit's got a fun thread: "what is the most painful way you have seen your co-worker accomplish something very simple?" As painful as this stuff is to read, it's a reminder that intelligent, experienced people often find familiar computing interface elements and metaphors impossible to parse.

Opens XP Internet Explorer, inhabited by so many toolbars that the actual display window resembles the eye slit on a hunting blind.

Uses Yahoo! toolbar to search for www.Yahoo.com.

Selects Yahoo! search engine from top of search results.

Types URL she has been given in full into Yahoo! search.

Selects random results on front page, and if they do not open desired website, closes IE and starts again from step 1.

what is the most painful way you have seen your co-worker accomplish something very simple? (self.AskReddit)

0
Your rating: None