Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 2 years ago.
Improve this question
Back in 2016 all of my data on my laptop hard drive was encrypted by the CERBER ransomware. I refused to pay Ransome money to hacker.
I have all of my important data preserved in an external hard disk. After 4 years now, I am hoping that some solution is there to decrypt my data.
In these data, there are my childhood images which are once in a lifetime memories.
Please guys I'll appreciate any kinda help. If you are professional then any premium support would work too.
Can't wait to hear from you guys.
Thank you so much in advanced,
Siddharth shah
If you are looking for some tool to decrypt your encrypted files and if your extension of those encrypted files is something like
{10 random characters}.cerber,
Well, you are in luck!. There's a decryptor tool available. Here's the direct link :
Trend micro decryptor
Good luck!
Related
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 2 years ago.
Improve this question
A ransomware encrypted all my files with the extension .nlah
I used Spyhunter 5 to scan my Windows 10 and delete the malwares.
Then I had to look for a way to recover my files with no success. This is the tool: EMSIsoft: ransomware-decryption-tools
I'm a doctor, and I save very important informations about my patients in that computer. So it's vital to recover those files. Can you help me please?
enter image description here
It is almost impossible to decrypt the files without knowing key and encryption mechanism.
Please make sure you have completed removed the ransomeware from your computer to avoid further damage.
If you have backup copy of your files then get it recovered from backup.
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
Closed 5 years ago.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Improve this question
Where do linux systems keep the users encrypted passwords and how can it be decoded? Or maybe there is a workaround for getting the initial user's password? Thanks
the default directory to the file that keeps passwords in Unix systems is
etc/passwds
and in macOS
etc/master.passwds
https://docs.python.org/3/library/crypt.html
you can read about crypt library of python which may help you to decode the Unix password. One of the ways I do it is I generate all possible Strings of a certain length 8, and then compare the hash from that file with the hash of each of these words. I am not sure that it is the optimal way of solving this question but it works.
Take a look here:
Python generate all possible strings of length n
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 9 years ago.
Improve this question
For a networking class, I want to do a presentation and project on DDoS attacks. I have been researching them for a while and am interested in conducting a small scale attack against a victim server with no security (I'll most likely set this up using nginx or apache) running on a Raspberry Pi. I want to run a demo of this happening in class - first with no security, and then a few other times - each time adding another layer of security.
Does anyone have an idea how much traffic I would need in order to take this down? Also what would be the best way to generate this traffic? I'm not sure if this part is even possible as I don't have access to a lot of computers...I do have a mac pro with 24GB of ram so I have been considering running several virtual boxes with that.
Thanks for the help!
I was able to get it working locally using nginx on the Pi and LOIC.
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 9 years ago.
Improve this question
I have a requirement of streaming millions of videos on demand. I read that CDN are the best option for that. But i recently came to know about IIS Smooth Streaming. Can anybody tell me, will IIS Smooth Streaming perform same as a CDN in streaming millions of files or does it has its own limitations (and is not a good option).
Thanks in advance.
IIS smooth streaming cannot ever come close to CDN. A CDN is a large distributed system of servers deployed in multiple data centers across the world, and the CDN takes the responsibility of sending the users the the nearest physical server when a request comes.
To stream millikns of videos on demand, CDN is your only hope !
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.
Closed 9 years ago.
Improve this question
Can some one help me out here, it is necessary to complete my assignment.
I need to know,
how a process created in UNIX...? and
how a process created in MS-DOS...?
How is the unix process is different from MS-DOS process...?
I have fair knowledge about Operating Systems.I tried to find better answer on the internet, but I was unable to find in google, yahoo answers, etc...
Thank you........
You can do better than "the internet"...
Try:
Tannenbaum's Modern Operating Systems.
Page 735 for Linux, page 857 for Windows Vista (including MS-DOS).