Send a Message
to CarlyFiorina




Oct 27, 2011

CarlyFiorina Profile

Forums Owned

Recent Posts

Computer Security

How can I extract data from a web page to an excel document?

Hello Friends, I am searching a contact database online, and I would like to automatically extract data from the web page I am looking at instead of copying and pasting into excel. I do a search by city and I could copy and paste the name, phone number, address, but I am sure there is a quicker way to do this. How can I extract data from a web page to an excel document? Any ideas? Thanks In Advance Carly Fiorina  (Nov 4, 2012 | post #1)

Computer Security

RATs and Poison: Can Cyberespionage Victims Counterhack?

Hello Friends, It turns out that the tools attackers use to control compromised computers are themselves full of security holes. A couple of undergrads interning for Matasano Security have reverse-engineered the Remote Access Tools (RATs) that attackers use to gain control of compromised machines. According to Dark Reading, Jesse Hertz and Shawn Denbow found numerous flaws in commonly used RATs, including SQL injection, arbitrary file reading, and weak encryption.“This shows that it is possible, and that it’s not hard, to pick apart attacker tools and come up with proactive defenses against them,” says John Villamil, senior security consultant with Matasano, who served as Denbow and Hertz’s adviser for the project. “If nothing else, it can help forensics companies analyzing traffic from compromises ... and help build tools that analyze these Trojans, and provide signatures [to detect them].” Vulnerability research into attacker tools is rare, but not unheard of. “It’s very rare to see this type of research,” Villamil says. RATs, which typically conduct keylogging, screen and camera capture, file management, code execution, and password-sniffing, for example, basically give the attacker a foothold in the infected machine as well as the targeted organization. This is great news for cybersecurity. It opens new opportunities for attribution of computer attacks, along lines I’ve suggested before: “The same human flaws that expose our networks to attack will compromise our attackers’ anonymity.” Thanks And Regards Carly Fiorina  (Oct 14, 2012 | post #1)

Computer Security

How can I recover partition after installing windows 7?

Hello Friends, I had some file in my windows 7 desktop. But I installed windows 7 in that C drive again after formatting that drive. How can I recover partition after installing windows 7? How can I recover my files from that formatted C drive? Please suggest me how to create the recovery partition in windows 7 64 Bit or please give the software which Hp uses to create the recovery partition. Any help? Thanks And Regards. Carly Fiorina  (Oct 12, 2012 | post #1)

Computer Security

How to fix wireless problem?

Hello Friends, I just moved in with my cousins and the wireless was working fine on my ipod and their computers with no password needed. I turned on my laptop and tried to connect. All of a sudden it asked for the router pin # because it was a new router? So I guess I'm the admin now? It gave me a network key or something saying in case for setting up future wireless networks or something. But anyway as soon it finished, their network now needs a security key. It doesn't work only on my ipod when i enter it like three times(the network key it gave me)...The laptop that I used doesn't ask for a Security key, doesn't have the padlock symbol. Only on my other laptop, computer and my ipod. The laptop I put the router # in that screwed everything up doesn't even connect, it always says "connecting " then stops and repeats over and over. How do I fix this and change this back to normal? How do I remove the Security Key? I entered in the address bar and nothing happens I Don't know what that's for though. Please help me, and provide appropiate solution? Thanks And Regards. Carly Fiorina  (Oct 5, 2012 | post #1)


What is the main purpose of Email Grabber?

Hi all, I have only knowledge about the Web Grabber. Grabbing is an advanced method of capturing web form data within various browsers. The main purpose of Web Grabber is still confused to me. I also want to know the purpose or functions of Email Grabber. Any idea on it, kindly share with me. I hope your valuable view make me best. Thanks, Carly Fiorina  (Sep 24, 2012 | post #1)


How can I extract data off a dead laptop?

Hello friends, My acer aspire laptop crashed a couple of weeks back but now I've lost loads of important pictures, documents so on. What is the easiest way to extract the data? Thanks in advance Carly Fiorina  (Sep 18, 2012 | post #1)


Web scraping for price comparison using user input?

Hello Everybody, I'm trying to make a website aimed towards a specific region of the country, where locals can search for automotive shops, locate cars, and search for automotive parts. If anyone have any suggestions regarding this, please share. I did not get any suggestion from my search so I think you will help me in this discussion forum. Thanks and Regards Carly Fiorina  (Sep 13, 2012 | post #1)