Jump to content

Search the Community

Showing results for tags 'and'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches lasting from database fingerprinting, over data fetching from the database to accessing the underlying file system and executing commands on the operating system via out-of-band connections. Changelog v1.7.2 Implements tamper script if2case (#5301) [hide][Hidden Content]]
  2. Complete Guide to InVideo and InVideo Video Creation Learn all About InVideo Service, InvVideo Video Creation and InVideo Marketing all JUST from your Browser! What you’ll learn How To Use InVideo Service How to Make Social Media Videos in MINUTES How to Make Edit Videos with Browser Requirements Computer with 4GB RAM Google Chrome Browser InVideo Account Description Welcome to Complete Guide to InVideo and InVideo Video Creation! The only course you will need to start with InVideo, one of the best online video creators and editors on the market. With InVideo you can create short-form and long-form content for any social media platform, including Instagram, YouTube, TikTok, Facebook, Pinterest, and many more. In addition to all that you are also able to transform your blog posts into full-length videos. In this InVideo Course you will learn everything you need to know about InVideo, including but not limited to: Basics & Interface of InVideo; Tools of InVideo; Creation of Different Video Projects; Practical tips & Tricks & Much More… Everything you will learn here, in this inVideo course, will be based on My practice as a video content creator and Streamer and Everything shown step by step as I am performing everything live on video. I Firmly believe in a practical showcase of the skills, and with InVideo I will show you everything you need to know. Most importantly this course will continue and grow as time passes and all the upgrades will be available for FREE for every enrolled student. And don’t forget that Instructor is here for you. For any questions do not hesitate to ask. Join me in this amazing journey and I hope to see you in class Who this course is for: Social Media Enthusiasts Video Marketers Online Businessmen [hide][Hidden Content]]
  3. Features Easy to use dashboard with settings, statistics, payloads, view/share/search reports Unlimited users with permissions to personal payloads & their reports Instant alerts via mail, Telegram, Slack, Discord or custom callback URL Custom javascript payloads Custom payload links to distinguish insert points Extract additional pages, block, whitelist and other filters Secure your login with Two-factor (2FA) The following information can be collected on a vulnerable page: The URL of the page IP Address Any page referer (or share referer) The User-Agent All Non-HTTP-Only Cookies All Locale Storage All Session Storage Full HTML DOM source of the page Page origin Time of execution Payload URL Screenshot of the page Extract additional defined pages much much more, and, its just ez 🙂 Required Server or hosting with PHP 7.1 or up Domain name (consider a short one) SSL Certificate to test on https websites (consider Cloudflare or Let's Encrypt for a free SSL) ezXSS v4.0 Latest I am excited to announce the release of ezXSS v4.0, a major update to the XSS tool. This version includes at least the following new features and improvements: Completely re-coded, resulting in clean, readable code that is easy to understand and maintain Multi-user setup that allows for roles and payload separation Alerts via Slack and Discord in addition to existing support for email and Telegram Redesigned pages and fixed styling bugs More statistics on the dashboards Improved reports view and search Ability to render collected DOM pages Lots of smaller bug fixes and much much more amazing things! It is highly recommended to update to ezXSS v4.0, as version 3.x will no longer be supported due to its old codebase. If you are currently running an older version of ezXSS, please make sure to first update to version >3.10 before upgrading to v4.0. Also, after updating, the default username will be "admin". Thank you for your continued support and I hope you enjoy using the new and improved ezXSS v4.0! [hide][Hidden Content]]
  4. FirebaseExploiter is a vulnerability discovery tool that discovers Firebase databases which are open and can be exploitable. Primarily built for mass hunting bug bounties and for penetration testing. Mass vulnerability scanning from a list of hosts Custom JSON data in exploit.json to upload during the exploit Custom URI path for exploit [hide][Hidden Content]]
  5. FREE AND FRESH ALWAYS AUTO-UPDATED HTTP SOCKS4 SOCKS5 PROXIES [Hidden Content]
  6. Download and Read Unlimited E-Books Online | for 2022 Collection [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]
  7. El Bait and Switch es una técnica de hackeo en la que un atacante utiliza espacios publicitarios para ofrecer a un usuario un enlace o descarga atractiva, pero en su lugar, entrega malware o redirige al usuario a una página web no deseada. Esta técnica se utiliza a menudo para distribuir malware o engañar a los usuarios para que proporcionen información confidencial. Para protegerse contra el Bait and Switch, es importante ser cauteloso al hacer clic en enlaces o descargar archivos de espacios publicitarios de sitios web desconocidos o sospechosos. También es recomendable utilizar un software de seguridad actualizado y tener precaución al proporcionar información confidencial en línea. En resumen, el Bait and Switch es una técnica de hackeo en la que un atacante utiliza espacios publicitarios para ofrecer a un usuario un enlace o descarga atractiva, pero en su lugar entrega malware o redirige al usuario a una página web no deseada. Para protegerse contra el Bait and Switch, sé cauteloso al hacer clic en enlaces o descargar archivos de espacios publicitarios de sitios web desconocidos o sospechosos, utiliza un software de seguridad actualizado y ten precaución al proporcionar información confidencial en línea. View full article
  8. El Bait and Switch es una técnica de hackeo en la que un atacante utiliza espacios publicitarios para ofrecer a un usuario un enlace o descarga atractiva, pero en su lugar, entrega malware o redirige al usuario a una página web no deseada. Esta técnica se utiliza a menudo para distribuir malware o engañar a los usuarios para que proporcionen información confidencial. Para protegerse contra el Bait and Switch, es importante ser cauteloso al hacer clic en enlaces o descargar archivos de espacios publicitarios de sitios web desconocidos o sospechosos. También es recomendable utilizar un software de seguridad actualizado y tener precaución al proporcionar información confidencial en línea. En resumen, el Bait and Switch es una técnica de hackeo en la que un atacante utiliza espacios publicitarios para ofrecer a un usuario un enlace o descarga atractiva, pero en su lugar entrega malware o redirige al usuario a una página web no deseada. Para protegerse contra el Bait and Switch, sé cauteloso al hacer clic en enlaces o descargar archivos de espacios publicitarios de sitios web desconocidos o sospechosos, utiliza un software de seguridad actualizado y ten precaución al proporcionar información confidencial en línea.
  9. Villain is a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machines running Villain) and share their backdoor sessions, handy for working as a team. The main idea behind the payloads generated by this tool is inherited from HoaxShell. One could say that Villain is an evolved, steroid-induced version of it. [hide][Hidden Content]]
  10. Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches lasting from database fingerprinting, over data fetching from the database to accessing the underlying file system and executing commands on the operating system via out-of-band connections. [hide][Hidden Content]]
  11. An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws Features Supports the following types of injection payloads: Boolean based. Error Based Time-Based Stacked Queries Support SQL injection for following DBMS. MySQL Microsoft SQL Server Postgre Oracle Supports following injection types. GET/POST-Based injections Headers Based injections Cookies Based injections Multipart Form data injections JSON based injections support proxy option –proxy. supports parsing requests from txt files: switch for that -r file.txt supports limiting data extraction for dbs/tables/columns/dump: switch –start 1 –stop 2 Changelog v1.1.2 updated code quality for gracefully exiting the threads on user interrupt. updated code to resume the data fetching in threads. updated code for read timeout issue to auto adjust time-sec and timeout [hide][Hidden Content]]
  12. OFRAK (Open Firmware Reverse Analysis Konsole) is a binary analysis and modification platform. OFRAK combines the ability to: Identify and Unpack many binary formats Analyze unpacked binaries with field-tested reverse engineering tools Modify and Repack binaries with powerful patching strategies OFRAK supports a range of embedded firmware file formats beyond userspace executables, including: Compressed filesystems Compressed & checksummed firmware Bootloaders RTOS/OS kernels [hide][Hidden Content]]
  13. Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in the waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exists and is accessible Automatic threads depending on the response to a website (and reconfig if WAF is detected too many times). Max: 30 Search S3 buckets in the source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v2.5 Updated: half of the code has been refactored/reorganized Updated: dichawk endpoints Updated: JS sensitives endpoints Updated: Exclude option (referer to Readme) Fixed: ANy error with exclude option New: Download all js link with specific keyword found [hide][Hidden Content]]
  14. DNS Reaper is yet another subdomain takeover tool, but with an emphasis on accuracy, speed, and the number of signatures in our arsenal! We can scan around 50 subdomains per second, testing each one with over 50 takeover signatures. This means most organisations can scan their entire DNS estate in less than 10 seconds. [hide][Hidden Content]]
  15. Description Have you ever thought the car you drive can also be hacked and it’s also vulnerable to hackers ? Yes modern day vehicles are as vulnerable as your phone or your laptop even its vulnerability is much higher. Today’s modern vehicle is a complex set of microprocessors and microcontrollers which can be hacked just like computers. In this course we will see how modern vehicles can be hacked and how we can find vulnerabilities in it. Since this topic will be new to most of you, we will start this course from a very basic level. First we will look into the communication protocols of embedded systems and see how systems communicate with each other. After creating our base we will see Controller Area Network or CAN for short. CAN is the protocol on which modern vehicles operate so first we will look at this protocol and see how the protocol works, why we need this protocol and how vehicles operate on this protocol. After understanding Controller Area Network (CAN) we will install virtual car simulator so virtual simulator is similar to real car and we can do all the basic things on this simulator which we can do on real car so before moving to real vehicle first we will see how we can work on CAN protocol in virtual car. Also this section will be helpful to everyone so those who just want to learn automobile security without touching the real car can learn all the things from a virtual car simulator. After practicing on a virtual simulator we will move on to a real vehicle so first we will see all the hardware requirements and how to create the device to communicate with the car. After creating the device we will go into the real car and test the device. Then we will perform vulnerability tests on the real car which we did with a virtual car. We will cover this course on virtual car as well as on real car, so you will have a better understanding of vulnerabilities in automobiles. So this course is for ethical hackers, pentesters and all types of security researchers. Who this course is for: For Cybersecurity Researchers Ethical Hackers Hobbyist and Learners Requirements Basic Knowledge of Linux Hardware Requirements for Communicating with Real Vehicle (Find details inside course) [Hidden Content] [Hidden Content]
  16. HaE is used to highlight HTTP requests and extract information from HTTP response messages or request messages. The plugin can custom regular expressions to match HTTP response messages. You can decide for yourself whether the corresponding request that meets the custom regular expression match needs to be highlighted and information extracted. Note: The use of HaE requires a basic regular expression foundation for testers. Since the Java regular expression library is not as elegant or convenient as Python when using regular expressions, HaE requires users to use () to extract what they need The expression content contains; for example, if you want to match a response message of a Shiro application, the normal matching rule is rememberMe=delete, if you want to extract this content, you need to become (rememberMe=delete). [hide][Hidden Content]]
  17. Description Become a white hat hacker and learn all the practical techniques for penetration testing with this amazing course which will provide conceptual framework to your security training. The course not only covers theoretical concepts but cover the practical demonstrations of various tools like The course is divided into the following main sections: Ethical Hacking Concepts -What is Ethical Hacking? Know about different types of hackers. Get to know about hacktivism and practical pen testing techniques Real World Information Gathering -Learn about foot printing and reconnaissance, Email harvesting, Learn and master SSL scan, Maltego, Whatweb, HttpRecon. Work on techniques like IP address geolocation, DNS and Mail Server Enumeration Scanning and Vulnerability Gathering -Learn to use scapy for packet crafting and port scanning, Learn to use network scanning techniques and work on vulnerability identification Network Attacking Techniques Master techniques for password cracking, MITM, Sniffing SSL and RDP attacks Web Exploitation Techniques Learn about password attacks, SQL Injections, RCE and DOS attacks Wireless Network Security Standards in Wireless security, WEP encryption, Wireless sniffing, Protecting Wireless networks Metaspoilt Learn to use the metaspoilt tool for your projects Detection Evasion Learn about the detection evasion techniques This exhaustive course covers everything you need to know about white hat hacking. Get the Knowledge, Get the Expertise. Who this course is for: Students who want to be system security professionals Students who want to learn Ethical Hacking Requirements Students should have some background in testing and knowledge of web servers, networks and web technologies [Hidden Content] [Hidden Content]
  18. "All-in-one app to help you to improve your Windows 11 and 10 experience." Latest Version: 3.9.4 Supported OS: Windows 11 and 10 [Hidden Content] [Hidden Content]
  19. HACKING LINUX: The Complete Beginners Programming System Guide With Practical Hacking Tools And Essentials Basics Of Hack. Includes Kali Linux Step By Step, Security Testing And Penetration Testing How the hackers do the hacking? Well, keep reading and you will find out.. [Hidden Content] [hide][Hidden Content]]
  20. Description KALI= Kali Linux is a Linux distribution that is specialized for cybersecurity. It is an open-source product that involves a lot of customization for penetration testing, which helps companies to understand their vulnerabilities. While many experts recommend against Kali Linux for beginners, those who are interested in cybersecurity often benefit from using this specific Linux distribution. Kali Linux offers “single root user” design as a way to handle privileges, and users can disable network services by default. That is helpful for the penetration testing and data forensics that can be used to determine a company’s weak points in a risk mitigation project. Kali Linux has over 600 preinstalled penetration-testing applications to discover. Each program with its unique flexibility and use case. Kali Linux is used by Security Administrators – Security Administrators are responsible for safeguarding their institution’s information and data. They use Kali Linux to review their environment(s) and ensure there are no easily discoverable vulnerabilities. Kali is also used by Forensics Expert and Network administrators are in charge of keeping the network running smoothly and securely. They audit their network with kali Linux. Kali Linux is mainly used for advanced Penetration Testing and Security Many systems. So let’s get started…. For Windows= You will learn most of the important tools and techniques used to test the security of your Computer System and Mobile Devices. You will learn how to hack your device and how to protect them from various external Threats. System Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access to personal data or business data. An example of system hacking can be: using a password cracking tool to gain access to a computer system. You may also perform System Hacking without using any kind of tool. Learning computer hacking and security is an important aspect in today world. Let’s have a look on the topics you will learn in this course. Topics Covered in this Course are: 1. Footprinting 2. Scanning 3. Gaining Access 4. Maintaining Access 5. Clearing Tracks 6. Generating Reports 7. Quick Hacking Tips 8. Hands-on Training 9. Hacking Mobile Device 10. Securing your Computer and Mobile. Anyone who is interested to learn about Cyber Security may join this course. This course doesn’t make you an expert in the field of cyber security. But, this course will teach you practical things which are must to learn for an individual if you want to know about latest attacks and their defence. Also learn Ethical Hacking with Kali for 2022. Let’s get started…. Who this course is for: Anyone who want to learn Kali and Win OS Hacks Requirements No experience needed [Hidden Content] [hide][Hidden Content]]
  21. Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber security activities, with an increased focus on Pen testing and Red Teams. Written by subject matter experts, with numerous real-world examples, the Fourth Edition provides readers with a clear, comprehensive introduction to the many threats on the security of our cyber environments and what can be done to combat them. The text begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. Part II provides a technical overview of hacking: how attackers target cyber resources and the methodologies they follow. Part III studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on distributed devices. Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! Click here to learn more. [Hidden Content] [hide][Hidden Content]]
  22. Track User's Smartphone/Pc Ip And Gps Location. The tool hosts a fake website which uses an iframe to display a legit website and, if the target allows it, it will fetch the Gps location (latitude and longitude) of the target along with IP Address and Device Information. This tool is a Proof of Concept and is for Educational Purposes Only. Using this tool, you can find out what information a malicious website can gather about you and your devices and why you shouldn't click on random links or grant permissions like Location to them. [hide][Hidden Content]]
  23. The Exegol project Exegol is a community-driven hacking environment, powerful and yet simple enough to be used by anyone in day to day engagements. Script kiddies use Kali Linux, real pentesters use Exegol, megachads maintain it 👀 Exegol is two things in one. Try it, and you’ll stop using your old, unstable, and risky environment, no more Kali Linux as host or single VM. a python wrapper making everyone’s life easier. It handles all docker and git operations so you don’t have to, and it allows for l33t hacking following best practices. No more messed-up history, libraries, and workspaces. Now’s the time to have a clean environment with one container per engagement without the effort. Exegol handles multiple images and multiple containers. Want to test a new tool without risking messing up your environment? Exegol is here, pop up a new container in 5 seconds and try the tool without risk or effort Like the idea of using docker containers without effort but don’t want to sacrifice GUI tools like BloodHound and Burp? Exegol is here, new containers are created with X11 sharing by default allowing for GUI tools to work. Like the idea of using docker containers but want to use USB accessories, Wi-Fi, host’s network interfaces, etc.? Exegol handles all that flawlessly Want to stop pentesting your clients with the same environment every time, interconnecting everything, and risking being a weak link? Exegol is here, pop multiple containers without breaking a sweat and lead by example! Do you like this idea but don’t want to lose your work when quitting/removing a container? Exegol shares a workspace directory per container with your host, allowing you to work knowing your progress won’t be lost. a set of pre-built docker images and dockerfiles that include a neat choice of tools, awesome resources, custom configs, and many more. Fed up with the instability and poor choice of tools of Kali Linux? Exegol is here, trying to correct all this by being community-driven. Want some not-so-famous tool to be added? Open an issue and let’s talk do it! Tired of always having to open man or print the help for every tool because the syntax varies? Exegol includes a command history allowing you to just replace the placeholders with your values, saving you precious time Want to improve productivity? Exegol includes all sorts of custom configs and tweaks with ease of use and productivity in mind (colored output for Impacket, custom shortcuts and aliases, custom tool configs, …). Want to build your own docker images locally? It’s absolutely possible and the wrapper will help in the quest. Tired of always having to search github for your favorite privesc enumeration script? Exegol includes a set of resources, shared with all exegol containers and your host, including LinPEAS, WinPEAS, LinEnum, PrivescCheck, SysinternalsSuite, mimikatz, Rubeus, PowerSploit, and many more. [hide][Hidden Content]]
  24. Description In recent years, the international order from the Ukraine to the United States has been seriously impacted by botnets, the remotely controlled networks of computers with nefarious intentions. The virus, ransomware, and disruptive services offered by various botnets have a variety of unique consequences and characteristics. Therefore, strengthening the defenses against them is crucial. To more or less successfully combat botnets, one should examine their code, communication, kill chain, and other technological characteristics. However, the Business Model for Information Security asserts that in addition to technology characteristics, their skills and behavior also have a human and organizational component. The purpose of this course is to describe the elements of various attacks and to give a framework for analysing the technical and human characteristics of botnets. Five botnet attacks were used as case studies for testing the specified framework. ElectrumDoSMiner, Emote, Gamover Zeus, Mirani, and VPNFilter were the botnets that were selected. The comparison concentrated on the following factors: motivation, the used business model, cooperation readiness, capabilities, and attack source. Due to the dynamic behavior of cyberspace and botnets, it is difficult for defending organizations to achieve the target level of defending capabilities with a one-time development. The methods described in this research should be used to construct cyber defense and gather threat intelligence on botnets. According to the BMIS paradigm, this framework combines human and technology characteristics, giving the defender a uniform classification system. This is a beginners course that is aimed at explaining what BotNets are, how they are built and operated. It also discusses how BotNets attack and have avoided detection in the past by Anti Virus solutions. This course starts with the basics then moves on to more details and then finally shows examples of BotNets and how to detect if clients are infected with BotNet clients. After the course you will be able to: Explain what a BotNet is Explain and describe the components and architecture of BotNets Explain the ecosystem of BotNets Explain BaaS (BotNet as a Service) Explain different types of BotNets Explain the difference between SocialBots and “normal” BotNets Discover infected clients that are part of a BotNet Understand different types of attacks that BotNets can do This course is meant to give any student that takes it critical knowledge and skills to understand the unique threats that BotNets pose to an entity. Who this course is for: People interested or involved in IT Security or Cyber Security People Interested in IT Forensics and Cyber Espionage, War and Crime attack tools People interested in understanding Botnets and other security threats when using the Internet or any computer Red, Blue and Rainbow Team Members that want some more hands on experience with Botnets, Detection and Analysis Requirements Be curious about computers and technology Have a working knowledge of computers and smartphones Be interested in learning about security threats and how they are made Know a little bit about networks, clients and analysis [Hidden Content] [Hidden Content]
  25. Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches lasting from database fingerprinting, over data fetching from the database to accessing the underlying file system and executing commands on the operating system via out-of-band connections. [hide][Hidden Content]]

Chat Room

Chat Room

Chatroom Rules

No support in chat, open a thread.

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.