Questions & Answers

  • Clone another person’s Whatsapp

    Can I clone another person whatsapp. I don't have physical access to the phone, however I have access to the MAC number and I can receive the whatsapp message code.

    p1969garcia5 pointsBadges:
  • Install IBM Data Studio on Open Client Red Hat Linux machine

    Not able to install IBM Data Studio on Open Client Red Hat Linux machine, it is giving 'JVM terminated. Exit code=1'

    PS211235 pointsBadges:
  • Would Rails 3.0 be PCI compliant?

    I apologize for the short question but would anyone happen to know if Rails 3.0 would pass a PCI compliance scan? Thanks!

    ITKE366,725 pointsBadges:
  • Start career in networking

    Hi, I am btech in Electronics and Communication passed out in 2011. I worked in online marketing, totally a different field. I want to go back in field engineering. Somehow, I developed interest in Networking. I have little knowledge in it though I keep learning/reading now about networks, network...

    aakritighai5 pointsBadges:
  • Beginning to develop software

    How to I begin to develop software?

    harshala3115 pointsBadges:
  • Hacking for beginner

    Which Macbook is best for hacking?

    HNYBGR78785 pointsBadges:
  • Mobile phone screen is blurry

    My mobile phone: Huawei Ascend p7. Hey everyone! I have a problem, the game across age isn't working! The screen is blurring and is not clear.

    Sakura11115 pointsBadges:
  • PCI compliance failure: Attempts some buffer overflows

    We were PCI compliant for several months straight and all of a sudden, we got this: Fail Serious Port: 21 Protocol: tcp Summary : attempts some buffer overflows CVSS Base Score : 10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C) CVSS Temporal Score : 8.3 (CVSS2#E:F/RL:OF/RC:C) Public Exploit Available : true...

    ITKE366,725 pointsBadges:
  • Career path to becoming a big data analyst

    Hello everyone, By way of introduction, I am Sean and I am looking for a way out of my confusion as to which path to apply to become an analytics professional in the Big data field. I don't belong to the IT background but have a very deep interest in technical knowhow. I have done Business...

    kirktt2005 pointsBadges:
  • Interfacing C with LotusScript

    I want to use LotusScript and call C function to interface it. How can I do that?

    shivasanjay3,120 pointsBadges:
  • How to call Java / JavaScript function in LotusScript agent

    Is there a way to use Java function or JavaScript function in a LotusScript agent?

    shivasanjay3,120 pointsBadges:
  • Registers on a SPARC machine

    I have 5 register windows active on a SPARC machine, how many total registers are there?

    drummer77712125 pointsBadges:
  • View status of multiple cloud vendors

    If your company has multiple cloud vendors, is there an effective way to pull a view/status from all into a single pane of glass or UI?

    bbullard335 pointsBadges:
  • PCI compliance scan in IIS: Information disclosure vulnerability

    In our PCI compliance scan, we still have this vulnerability in our website: Synopsis : The remote web server is affected by an information disclosure vulnerability. Description : The remote host appears to be running a version of IIS which allows remote users to determine which authentication...

    ITKE366,725 pointsBadges:
  • Changes to the audit log for PCI compliance

    For PCI compliance reasons, we had to configure auditd. Because PCI states that existing logs can't get changed without an alert. So we tried doing this: -w /var/log/ -k Logs_Accessed -p rwxa But will the auditctl command work? Thank you for your help.

    ITKE366,725 pointsBadges:
  • Graphics card for a Dell PowerEdge 830

    How can I be certain that if I place a new graphics card on this computer it will be recognized and work properly. The motherboard has PCI-x, PCI-e x8, and PCI-e x1, slots. I tried an EVGA GeForce 6200 512MB but, it would not even let the computer boot. However n ATI Radeon 64MB did work; but,...

    Alfaone5 pointsBadges:
  • What is Log Pos malware?

    What is LogPos malware like date of the malware detected, coding language, command and control channel, infecting mechanism, hiding mechanism, impact till date?

    apalkar905 pointsBadges:
  • How to share a printer using 1 PC without a network

    How do I share a printer that is connected to 1 computer and share it to other computers without a network?

    paospid45 pointsBadges:
  • Cell Call drop in 2G

    Good morning mates. What are the causes of high call drop in particular cell for 2G?

    cedceb145 pointsBadges:
  • Fingerprint recognition in Java

    I want a programing source code for fingerprint recognition time and attendance payroll system in Java language. I also want the source code for capturing a fingerprint image and storing in MS Access in Java language for the same project.

    Anikketthakre5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following