Questions & Answers

  • Delete personal photos from another phone

    I need to delete personal photos from another person's phone? How can I do that?

    Nikhil4795 pointsBadges:
  • Password pops on HP laptop running Windows 8.1

    When I'm on my HP laptop that's running Windows 8.1, the password pops up on its own and I always have to clear it up (roughly five times) before it should let me enter mine. How can I stop that?

    IYKOMO4905 pointsBadges:
  • Registers in the CPU volatile or not?

    Are the registers within the CPU volatile or non-volatile? Thanks.

    canyoupleasehelpme5 pointsBadges:
  • Create heat map on Microsoft Excel 2013

    For a project at my job, I need to create a heat map in Microsoft Excel 2013. I'm trying to do it using Power Map but I'm not seeing it on the Insert tab. The add-in is available and I checked it off. What's the issue? How can I get it to appear?

    ITKE977,905 pointsBadges:
  • GEF file conversion

    How to convert text file to GEF file?

    aminul08040435 pointsBadges:
  • Call Reject list

    Ho, how can I tell if someone has placed me on their call reject list?

    JustLaur5 pointsBadges:
  • Can a keylogger-infected video be uploaded to Instagram?

    I was infected with a keylogger trojan on a brand new computer. The only thing I had done on that laptop online was download a video from someone's Instagram. Can someone bind a keylogger to a video and upload it to Instagram? If they can and I downloaded it, would I be infected?

    Ratscrapper25 pointsBadges:
  • AS/400 (language – RPGLE)

    I want to fetch combination of some records from PF file, so how should I do that?

    Shrikant3155 pointsBadges:
  • How to setup Gmail encryption

    My friend is an accounting for a finance company and he asked me what's the best way to exchange several documents with his clients. I told him the best way to do it was through PGP but he just wants to send emails through Gmail. If there's a way, can he encrypt his emails through Gmail?

    ITKE977,905 pointsBadges:
  • Tracing a remote user activity

    Can the user activity for a file access on a remote machine be traceable? Example, If a user access files/folders on my machine through network (\\machine name\c$\folder\files), then can I trace the user activity on my machine?

    Santhoshk15 pointsBadges:
  • External IT company auditing security and policies

    We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?

    Troubleshooter24755 pointsBadges:
  • Neighbor controls my computer

    How can I bump him off once and for all. He knows my passwords but even more he has studied this area of hacking? Can I take him to court and what will the govt do for if anything? Yes, I do have evidence.

    targeted35 pointsBadges:
  • Change number in SQL Server

    How do I convert an English number to an Arabic number in SQL Server?

    elenahasooni5 pointsBadges:
  • Create Microsoft Excel files in ASP.NET

    Hello experts, I have a more broad programming question for everyone. For ASP.NET, is there some package/interface that would allow me to create Microsoft Excel files? I haven't been able to find anything.

    ITKE977,905 pointsBadges:
  • OPNQRYF command runs ok interactively but errors out in batch

    I have a CL (call it RUN) that calls multiple CLs. This was done to run several steps that were run manually. Two of these CLs ( STEP ONE and STEP TWO)  use an OPNQRYF against the same file. When I called RUN it worked fine interactively but when I submit it through WRKJOBSCDE, STEP...

    Georgeann10 pointsBadges:
  • How to do analysis of composite materials in SAP 2000

    For my research, I'm really struggling with SAP 2000 to get the analysis for the composite materials. I have placed a steel shell back to the masonry shell to make it to stand against lateral loads but it's only analyzing the lateral load effect on masonry. How can I merge those two different...

    SheronKrishnan5 pointsBadges:
  • Mail import from Microsoft Outlook to Lotus Notes

    How do I import my Outlook mail into my Lotus Notes mail inbox?

    liz30 pointsBadges:
  • Unsecure privilege mode

    What does it mean my tablet is in "high privilege mode"' (I.e. has been rooted)

    kindaichi5 pointsBadges:
  • Scan result

    Scan result threat says my tablet is running in insecure privilege mode. Suggests using only genuine firmware. No idea what that means...can it be corrected, and if so, how? Thank you.

    rob319515 pointsBadges:
  • What is SAS?

    What does SAS do? What is it's purpose?

    SearchStorageATE215 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following