Login
Discover
Waves
Decks
Plus
Login
Signup
Topics
New
Trending
Hot
New
New
Trending
Hot
New
Payouts
Muted
Promoted
Global
Top communities
Create decentralized community
latest #newshacker created topics on internet
ranuganteng
newshacker
2017-06-25 06:13
delete post
delete post
$ 0.000
4
2
ranuganteng
newshacker
2017-06-24 20:08
delete post
delete post
$ 0.029
4
1
ranuganteng
newshacker
2017-06-19 05:43
What is the use of htaccess file in PHP?
@ranuganteng - htaccess stands for Hypertext Access and is a configuration file used by Apache-based web servers that manage live directories. htaccess file is a method to configure the website details
$ 0.000
22
3
ranuganteng
newshacker
2017-06-18 21:32
Web application attacks: Remote code execution
PHP provides different functions which when called allow shell code execution on the server. This is a list of functions which are used for shell command execution: – system: Executes a command and returns
$ 2.991
31
asterkame
YAF - Young Art Fair
2026-04-06 09:35
Promoted
Bird with Flowers Watercolor Painting
Hello Everyone! Today, I drew a picture of bird and flowers. I drew this picture with pencil first and then painted it with watercolors. I used a lot of colors for this picture. I think it is simple but
$ 0.461
37
6
ranuganteng
newshacker
2017-06-18 21:27
The newest attack for stealing network data!
@ranuganteng - Israeli cyber security expert reveals the newest attack for stealing network data. Security researchers at the Ben-Gurion University of the Negev (BGU) found that attackers can secretly
$ 1.863
33
1
ranuganteng
newshacker
2017-06-18 02:52
Buckle confirms it suffered a credit card breach!
The Buckle, Inc. is a United States fashion retailer selling clothing, footwear, and accessories for men and women. The company operates 465 stores in 44 U.S. states. “On Friday morning, KrebsOnSecurity
$ 3.577
23
1
ranuganteng
newshacker
2017-06-17 21:56
Be careful! your E-Cigarette can be used to hack your computer
Ross Bevington (a security researcher) found that an E-cigarette can hack a computer by fooling it to think that it was a keyboard. It was also able to hack the computer by interfering with its network
$ 4.525
35
2
ranuganteng
newshacker
2017-06-17 21:50
New Fileless Ransomware with Code Injection Ability Detected in the Wild
It is no secret that hackers and cybercriminals are becoming dramatically more adept, innovative, and stealthy with each passing day. While new forms of cybercrime are on the rise, traditional activities
$ 4.432
32
1