Questions & Answers

  • CDR with PC

    Why do we use CDR with PC's?

    Tarekmassoud5 pointsBadges:
  • How to find out who hacked my Facebook

    Today I saw a nude post on my Facebook wall saying inappropriate comments. I want to know who did this. Someone hacked my ID and posted that from my ID. How can I know that who had posted that post?

    KajalSharma5 pointsBadges:
  • Can a cell phone (Android) Viber account be hacked?

    Hi! Someone has been sending text messages with my Viber account in a conversation that was already open. I don't know whether my Viber account has been hacked or my SIM card had been cloned. What do you think?

    diamondback05 pointsBadges:
  • Course for Salespeople in Retail Banking?

    Hello! Does anyone know any course for me to excel further in retail banking? My background: I got my MBA in 2013. Currently working for Tata Capital as a Sales Executive in the personal loan department. I received my BE in 2006 for electronic and telecom. Any suggestions appreciated! Thank you.

    Sandipdhir5 pointsBadges:
  • Cloud Computing Integration Q’s

    Hi, Our school has 4 branches and they are planning to buy a cloud based computing system for training management system integrated with CRM. I have a few questions about this: What are main costs involved with this? Which resources and experts are required for implementation? When and where will...

    fatinali5 pointsBadges:
  • What is the difference between IPLC and MPLS?

    I would like to know details about the working of IPLC and MPLS and the differences between the two. In my company we are shifting some of our services from IPLC to International Ethernet MPLS due to some monitoring problems in IPLC. I need to prepare a comparison between the two for justifying the...

    AnandKajla5 pointsBadges:
  • Coding Question

    Hi, I came across this piece of code in one of the programs in our shops and I am stumped as to what it does. I am referring to the line after %parms condition. The interesting thing is I am getting two different values on var_ind after that operation on ProfoundUI vs Client access....

    sam00725 pointsBadges:
  • Delete my text messages

    Can anyone help me delete my text messages from someone else's phone?

    Gatorguyinfl5 pointsBadges:
  • .PBB File

    I have a .pbb file that is protected by one device only. How can I convert this file to any other app? Can I open up the file in multiple devices?

    waqasali5 pointsBadges:
  • Differences of IP and IPX

    What is the difference between IP and IPX routed protocols? Particularly in their protocol stack and addressing scheme?

    Sano5 pointsBadges:
  • Tor browser gets uninstalled on Windows 10 restart

    Whenever I restart my laptop (that's running on Windows 10), my Tor browser gets uninstalled. The icon is still there but all of my files are missing. Why does this keep happening?

    ITKE1,042,660 pointsBadges:
  • Outlook error when trying to accept an invite

    in Office 2016 try accepting meeting invite and get error "The attempted operation

    marktown5 pointsBadges:
  • Hack into phone through Google+ Stream

    Can someone hack into your phone through Google + Stream?

    melodyamara5 pointsBadges:
  • Source inserted by COPY or INCLUDE

    How do you view the code inserted by COPY or INCLUDE in a COBOL ILE program in AS/400? (Not using STRDBG)

    GreenScreenGirl15 pointsBadges:
  • Best Project Management Software

    We're using Asana right now but can't get our needs met.We're planning on switching to Hitask.What do you guys recommend?Thanks.

    Johnnywhite25 pointsBadges:
  • Hack an Android phone

    Hi, how can I hack an Android phone which I don't have any physical access to it?

    amiblack5 pointsBadges:
  • Hackers & Text Messages

    Can someone hack your phone and send/receive text through it without your knowledge? Example: Phone A sending/receiving with Phone B, but showing on Phone C's phone log.

    Triks685 pointsBadges:
  • Did someone hack my email?

    Recently, I was sent a very eerie email: At first, I thought it was spam, and just for fun I wanted to find out who it was, but when I jokingly tried to log in as the account who sent me the email, I noticed that it was created using my phone number and alternate email. So, via that I actually...

    ITKE1,042,660 pointsBadges:
  • My computer hacked by someone in Afghanistan?

    An AOL person says that my personal computer has been hacked by someone in Afghanistan; how can he tell?

    chrism1225 pointsBadges:
  • Did someone hack my phone?

    I'm finding new friends I didn't send requests to. Did someone hack me?

    Loretta505 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following