• How to be a professional hacker

    Can you tell me how to become a professional hacker? Are there any global certifications for it?

    NetworkingATE1,545 pointsBadges:
  • Get into Whatsapp account

    Hi, I know you probably get asked this all the time, but can you help me getting into my girlfriends Whatsapp account. I know there's a way of fooling the servers by cancelling the SMS when you install and sending a spoof to get the code but I can't seem to get it right.. Ryan

    timson665 pointsBadges:
  • Broadband ISP hack

    My ISP allows me to surf www.youtube.com at 10Mbps speed but my normal speed for other site except Youtube is 512kbps. Is there any way to send all data (all other site) from my computer looks like the request is sent for Youtube? I want to convert all request looks like Youtube so that I can get...

    shamim863415 pointsBadges:
  • Hack Skype account password and the chat history from creation of account

    I'm using Ubuntu 12.04 on my machine. I want to hack my son's Skype account without his knowledge and want to check his Skype account history from the creation of the account. I searched a lot but couldn't find the way to hack Skype account. Can someone please help me in this regard?

    rohitp81885 pointsBadges:
  • DOS Attack

    Hello there, This is Faisal Rafiq, I have a problem after Dos attack. I got an error "ISA Server detected routes through the network adapter live that do not correlate with the network to which this network adapter belongs." Thanks & Regards,

    239069370 pointsBadges:
  • Hacking and sabotaging

    Recently I have noticed that my computer will randomly loose connection to the network. Today it happened three times, when I looked in the event viewer this is what I found: `The DHCP Client service was successfully sent a stop control.` This done by another user in my office and on my network....

    Trapdoor35 pointsBadges:
  • Can you stop spoofing?

    I have a user that is getting spoofed. It is only happening to him. Sometime it happens to other users but it goes away after a couple of days. With this one user it has been 3 months. I thought it may have been a virus/spyware on his computer. I have ran every scan I have. I have exchange 2003 is...

    RLD5 pointsBadges:
  • Was this facebook account hacked?

    This is the example scenario.One day,her Facebook status gets updated .Her friends inform her of it.She panics.She logs in to check the account.Before her password was 'India' (example)and this time too she gets access to her account via the same 'India' password.She thought her account was hacked...

    DyuthiDivakar5 pointsBadges:
  • Has my computer been hacked?

    I knew my friend's (completely unrelated with my web accounts) e-mail address and password. One day, I logged in, and saw an e-mail, in which there were lots of photos that I have watched or seen in my computer! Those photos included my and my friends' Facebook photos, Google photos, every single...

    Aygun925 pointsBadges:
  • Was my Hotmail email hijacked?

    I sent an email from my iPhone using Hotmail. The recipient received my email, but with an attachment of a pornographic image. I checked sent items on my PC, and the image is attached to the email in sent items. I have no pornographic images on my PC or my phone. How did this happen?

    Rob4585 pointsBadges:
  • Hacking with key logging

    I am an non IT-mother looking at putting key log software on his laptop. It's remote so I can't physically access it. Is it safe and untraceable? I worry about him. What would you recommend for a program. Will it be visible to him!

    Corina195 pointsBadges:
  • Any place to report Hacker’s ISP?

    Google notified me today that someone in the UK attempted to get into my Gmail, from 86.157.19.222.  I ran a tracert on this address, and it goes back to btcentralplus.com - which has a rather seedy sounding reputation going back many years. BT  is supposed to be an ISP, but the complaints about...

    AndreaF8,055 pointsBadges:
  • Spying on a mobile phone

    Is there any way to spy on a phone other than installing a spy software on the mobile phone? And if not is there a possibility that this could happen? Please reply.

    moustapha725 pointsBadges:
  • How do you know if your computer has been hacked into?

    I have a few error messages coming up on my laptop screen saying someone is trying to hack into your computer. I thought it was just a virus. Does anyone know if it was a virus or was someone really trying to hack in?

    Verynew20 pointsBadges:
  • shdocpv.dll – virus – hijack problem

    Hi, I'm sorry if I had chosen the wrong recipient. I am running Windows 2000. When I open my browser (IE 6.0) I get this:res://shdocpv.dll/blank.htmOrres://C:WinntSystem32shdocpv.dllsecurity.htm Please help me to get rid of this. Thanks!

    CUser020 pointsBadges:
  • Hacked whilst using computer

    Hi. Someone claims to have hacked into the PC I was using and set up and sent an email. They claim it was hidden. Is this possible

    snorman25 pointsBadges:
  • Cracking 32 bit rar file password

    I'm looking for a program to crack a 32 bit password for a .rar file. If you answer this question, please tell me how long the program will take.

    poptartt10 pointsBadges:
  • Need Guidence

    Dear Sir/Madam As a Cyber Security Expert and Jetking Certified & BCA graduate, I was looking forward in the field of Ethical hacking in Government Sectors..... Is there any course or a class you can suggest to me (What to choose & what to do further)? I am interested in Network Securities...

    vinodkumar89465 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:
  • Unknown Threats

    Apart from honeypots, what are the different methods to find unknown threats which are prevalent? How do I find methods to mitigate them. PS: all the vulnerabilities are known to all the n/w administrators and then can take measures to mitigate attacks but this doesn't happen..Hackers are at least...

    Czarleo0 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following