Loading...
Answers
MenuIs it possible to find out a person(crimer) on Facebook?
This question has no further details.
Answers
SS
SS
As such not possible from the front end. But, yes, there is possibility fir it to be done from the back end by Facebook authorities themselves if informed at the earliest.
DJ
DJ
Yes it is,most fake accounts on Facebook use half naked females pictures to attract males and likewise for the female,the easiest way to know a fake account is by going through the persons timeline ,the person never uploads more than 3-4 pics cuz its not the actual person using it,there are order ways to know if you wanna know more contact me let's talk more.
Related Questions
-
Which level of DoS protection is best to start off with for a startup building a social network from the ground up?
Denial of Service protection is a key component of your perimeter defense along with your firewall, intrusion detection/prevention and continuous monitoring. There are several managed service providers that you can choose from. The first vendor you should contact is your Internet Service Provider (ISP), they may have DoS services available as a component of your contract or they will have DoS providers they partner with. Once you have identified the services your provider offers or the DoS protection partners they have you can evaluate which is best for you. If you have more questions on this or other security, data protection or regulatory requirements, PCI may be important for you, feel free to let me know. Best of luck in your venture! -StevenSP
-
What should you do when your business has been hacked and is being defamed online?
In a word: Forensics. Computer forensics is the art of examining a system and determining what happened upon it previously. The examination of file and memory artifacts, especially file timelines, can paint a very clear picture of what the attacker did, when they did it, and what they took. Just as an example - given a memory dump of a Windows system, it is possible to extract not only the command lines typed by an attacker, but also the output that they saw as a result of running those commands. Pretty useful in determining impact, eh? Depending on the freshness of the compromise, it's possible to tell quite a lot about what happened.CF
-
On which platforms can I find a reputable Growth Hacker for hire?
The reality is "reputable" growth hackers - aren't sitting around on freelance sites waiting for you to hire them. If they are good, they are either (very) gainfully employed at a reputable company making very good salaries or more likely using our super powers to create multimillion dollar companies. So the bad news is there is no platform where you can hire reputable growth hackers BUT here is what you can do: You can borrow some of their time on here for just a few dollars a minute and learn what you need to learn to do it yourself (or at least get started) or find courses to learn "growth hacking" yourself. Get the tips, learn the techniques, tons of free resources and sites too. Unfortunately there are no silver bullets and very seldom magic hires that will suddenly get you growth. It's a painful, iterative long process. And the term growth hacker is very broad. Some of us can help you with SEO/SEM, email list building, partnerships and PR (I'm heavily specialized in PR). TL:DR Talk to specialized growth hackers, learn, and apply the techniques yourself.AS
the startups.com platform
Copyright © 2025 Startups.com. All rights reserved.