• Security of Android phone

    If a person is using an Android phone just for personal use to send messages, pictures and news, does that need security? Also what is best for security?

    anilasha75 pointsBadges:
  • SoHo email server unified threat management

    Looking for options for SoHo email server and unified threat management. I want to stay away from the Gmail and Outlook services.

    johnwall5 pointsBadges:
  • Remote access technology used for hacking

    I have 4 Laptops and every one has been hacked by Remote Access Technology. I reformatted my HD at least 60 times b4 I found out the technique that was being used. I did a Google search on: "How to hack a PC that is not connected to the Internet" I found out that the hackers were using the RAT...

    dougster625 pointsBadges:
  • Hack into phone through Google+ Stream

    Can someone hack into your phone through Google + Stream?

    melodyamara5 pointsBadges:
  • Website is currently unavailable

    Hi, there is a website that I'm hosting and it is supposed to expire sometime next year but for some reason it is down and there is a message saying "This site is currently unavailable. If you are the owner of this site, please contact us at 1-480-505-8855 at your earliest convenience."

    leungjohn30 pointsBadges:
  • Integrate MQ with DataPower

    How do I integrate MQ with DataPower?

    khaleelkhaja5 pointsBadges:
  • Did upgrade remove Windows 10 antivirus software?

    For antivirus purposes, I was using Trend Micro Titanium (this was when I had Windows 7). Now, ever since I upgraded to Windows 10, I can't seem to find it. It's not in the list of apps or add/remove programs. Did my upgrade remove the antivirus software? Thank you.

    ITKE440,485 pointsBadges:
  • Location based technology query

    How to servers, GPS, mobile phones and the Internet use location based technology?

    george895 pointsBadges:
  • Help for mom experiencing IP & posting fraud

    A post online from My IP & Appears from my device, yet I did not post. Can someone fraudulently do this & it be traced to the wrong computer? (Nobody else uses the device)

    motherlove445 pointsBadges:
  • How can I disable my Linux firewall?

    I'm trying to disable my Linux firewall but every time I reboot it, it says it's enabled. Is there a way to disable it altogether? Thank you so much.

    ITKE440,485 pointsBadges:
  • laptop login

    WinXP laptop, part of domain, when disconnected frm domain uses cached login. While disconnected, changed from domain member to workgroup member. :( Now login only has name/pwd text boxes - can't get domain selection box. Thus, can't login. How to get domain option back at login screen? (How to...

    ITDefensePatrol0 pointsBadges:
  • Hacking for beginner

    Which Macbook is best for hacking?

    HNYBGR78785 pointsBadges:
  • How to connect to BSNL WLAN having security as 802.1x EAP?

    When I try to connect to BSNL WLAN router with my Android, I am asked to give identity and password. However I know the password but unknown about identity. Please help me to solve out my problem.

    dishantkhatri5 pointsBadges:
  • How can I get my Yahoo password back?

    It's been many days to use Yahoo mail and I have forgotten the password even not able to reset it manually? I need help?

    ariana12885 pointsBadges:
  • What factors in security affect the development side of mobile software technologies/tools?

    How does SDK and REST/SOAP provide security in mobile software application?

    Sophiecathryn5 pointsBadges:
  • Can I hack Wi-Fi password without aircrack device?

    Can I get into a Wi-Fi password with Wi-Fi slax or Kali Linux in my laptop? a|And without aircrack device for example (alpha device)?

    Mjrem9315 pointsBadges:
  • I forget my password

    How can I reset my password

    loriandskip3215 pointsBadges:
  • how can I remove Anti spoofing feature in the check point

    I need to remove the anti spoofing feature from my checkpoint /....what to do for it

    Ritesh2r5 pointsBadges:
  • My ex-husband is accessing my laptop remotely

    My ex-husband is accessing my laptop remotely to sign into my outlook email account. I know the sign in was not me, but it has the IP address for my laptop as the IP used. I signed out of the account at 6:40pm last night from the laptop and today I see a sign in attempt at 11:17pm using my IP...

    thesabrina65 pointsBadges:
  • Decrypt Word (docx) password protected document

    HiĀ  how can I decrypt a Microsoft Word document that is password protected?

    mpexmabuya5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.