• Cybersecurity courses for my career

    I am an undergraduate student of computer science from India and I am currently studying Bachelor of Computer Application. For further studies now I want to study cybersecurity. I want to be a cybersecurity expert or specialist. But I don't know from where I start to learn will you please provide...

    karanjoshi5 pointsBadges:
  • How to patch a computer

    How do you patch your computer?

    nastynan5 pointsBadges:
  • Is there a training session for the potential Information security officer, one level below CISO, on how to implement the security practices

    Is there a detailed guideline on the roles and responsibilities of Information Security Officers, not CISO? An ISO is expected to implement security practices at the ground level and also work with the CISO w.r.t. the business goals

    mlijuraj5 pointsBadges:
  • Strange message above Yahoo browser tab

    Hello, When I sign onto Yahoo, there's an odd message in the top left corner. It's right about the tab. It says STR.FP. TITLE. Is this a virus? If not, what is it? Thanks.

    ITKE1,047,345 pointsBadges:
  • Which IT security certification should I choose?

    I have overall 17 Years of IT experience on application development and Project / Program Management. In the recent years, my focus is more in to the program management. I am very much interested to get certified on the Information Security / CyberSecurity side, as the focus on the information...

    Jerish5 pointsBadges:
  • How to setup Wi-Fi with multiple passwords

    I'm trying to setup a Wi-Fi service in my small town. I would like give free Wi-Fi to everyone. But here's my question: Should I give everyone a different password so they don't use another network. If so, what's the process? Any help is appreciated.

    ITKE1,047,345 pointsBadges:
  • Program to burn .ISO files in Windows 10

    A week ago, I finally upgraded from Windows 7 to Windows 10. For work, I have to burn several .ISO files. I used to be able to use a Windows 7 default program but I'm not seeing it in Windows 10. Is it gone? If not, where is it located?

    ITKE1,047,345 pointsBadges:
  • L2 versus L3 on your WAN

    We are running Comcast Fiber between sites.  I was wondering what the best practice is for using Layer 2 or Layer 3 across the link.  We current use both.  Are there security reasons for doing one versus the other?  Also interested in hearing general thoughts on it.

    ITKE1,047,345 pointsBadges:
  • Best security programs for organizations

    What's the best security program or system out there (with management) for organizations / companies?

    Nimcaan123455 pointsBadges:
  • Who hacked my iPhone and Facebook?

    Is there any way I can see who hacked my phone and Facebook?

    mblanco025 pointsBadges:
  • Strange URL discovered on random news article

    So while browsing my FB, I came across an interesting news article posted by a friend. I opened the page and read the article, later when I went to close any opened tabs I saw the aforementioned article but when I saw the URL this is what I saw:...

    JoeAnarchy5 pointsBadges:
  • Secure Samsung smart TV

    How can I make my Samsung smart TV safer?

    makkink5 pointsBadges:
  • How to verify digital signature in Microsoft Outlook 2016

    For my job, I have Microsoft Outlook 2016. Would there be a way for me to verify our client's digital signature? How can I do that?

    ITKE1,047,345 pointsBadges:
  • Data security in cloud computing

    Just asking for your favour for the information regarding how the following process mentioned herewith is maintained/implemented in existing Cloud architectures.Whether the following encryption/decryption of hardware related information for security aspects are followed or not YES/No in existing...

    Shweta98315 pointsBadges:
  • How are other organizations classifying sales proposals and contracts to distribute outside of their organization to keep them from being blocked?

    We have a need to send sales proposals and contracts outside of our organization to clients. We currently classify these types of documents as confidential however because we have added "confidential" to our list of words that are blocked, these documents are getting blocked from going out. We...

    katek475 pointsBadges:
  • Is this the right BYOD security plan?

    Dears, we have many users with mobile devices (not owned by The Business) need to check the Email, send report via Whatsِapp or other APP and they use direct connection to the internet as you know vulnerabilities with Android. They may be send message infected by malware to person on our local...

    Elyassalman5 pointsBadges:
  • Is it possible to install antivirus in my external hard drive?

    Would it be possible for me to install antivirus on my external hard drive?

    kari7301205105 pointsBadges:
  • Best antivirus program for office environment

    Can I use Quick Heal Internet Security or Quick Heal Total Security in our office? What is a good quality antivirus for a 15 people office environment?

    nik15r70 pointsBadges:
  • What is a client-side attack?

    What is a client-side attack, and what are its potential effects (impact on confidentiality, integrity, and availability)?

    motseko5 pointsBadges:
  • Advantages of 3DES standard

    What are the advantages of the 3DES standard?

    sarankumar5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following