• Give iSeries profile access to only one object

    I know there are ways to lock down an object but is there a way to lock down a user profile so that it can access only one object?

    Camgin80 pointsBadges:
  • Tracing a remote user activity

    Can the user activity for a file access on a remote machine be traceable? Example, If a user access files/folders on my machine through network (\\machine name\c$\folder\files), then can I trace the user activity on my machine?

    Santhoshk15 pointsBadges:
  • Certificate for Webpage Not Valid

    While using Safari, I frequently receive the message "Certficate Not Valid, may be directed to an external page". This happens when I try to access a page from a google search menu.  What does this mean and why does this happen?  It doesn't happen with the Chrome browser.

    nscott5155 pointsBadges:
  • Neighbor controls my computer

    How can I bump him off once and for all. He knows my passwords but even more he has studied this area of hacking? Can I take him to court and what will the govt do for if anything? Yes, I do have evidence.

    targeted35 pointsBadges:
  • What malware remover is out there for me?

    Is there a malware remover for Locky, Cryptowall, and Zepto malware?

    bolanleo35 pointsBadges:
  • How to evaluate database security tools in terms of security

    I want to evaluate these tools, by using something like protection profiles or common criteria, but I don't know how can I find some checkpoints for evaluation. Can anybody help me?

    Panizir5 pointsBadges:
  • Accidentally open a reverse TCP meterpreter connection

    Can I get in trouble for accidentally opening a reverse TCP meterpreter connection to a malware scanning website? I was testing out if my meterpreter exe file was detectable with some online sandbox analyser when I got a meterpreter session in armitage. I used clearev because I read that will erase...

    Kokolol995 pointsBadges:
  • How to trace and prove who’s hacked my phone

    My phone was somehow accessed by a woman I met asking me to buy my used generator. She then used info from there to hack into my laptop, which uses a Wi-Fi router to get on line. She then began using my bank card to pay her bills, etc. Last year I finally changed my phone # (she was able to turn...

    ImSoConfused15 pointsBadges:
  • Aligning cybersecurity incident plans with BCM

    How can I integrate cybersecurity practices into a BCM program?

    sbbaruch5 pointsBadges:
  • Have I been hacked?

    I found two tight VCN running. I see show my PC auto on firewall. How can I tell if I've been hacked?

    sararans5 pointsBadges:
  • Delete personal photos from another phone

    I need to delete personal photos from another person's phone? How can I do that?

    Nikhil4795 pointsBadges:
  • Call Reject list

    Ho, how can I tell if someone has placed me on their call reject list?

    JustLaur5 pointsBadges:
  • Can a keylogger-infected video be uploaded to Instagram?

    I was infected with a keylogger trojan on a brand new computer. The only thing I had done on that laptop online was download a video from someone's Instagram. Can someone bind a keylogger to a video and upload it to Instagram? If they can and I downloaded it, would I be infected?

    Ratscrapper25 pointsBadges:
  • How to setup Gmail encryption

    My friend is an accounting for a finance company and he asked me what's the best way to exchange several documents with his clients. I told him the best way to do it was through PGP but he just wants to send emails through Gmail. If there's a way, can he encrypt his emails through Gmail?

    ITKE978,245 pointsBadges:
  • External IT company auditing security and policies

    We have an external IT company auditing our security and policies. What kind of access should we give them? Should we be worried about auditing the auditors?

    Troubleshooter24755 pointsBadges:
  • Can someone see what I’m browsing through network server?

    If anyone knows my laptop's MAC address, will they able to see what I'm browsing when I'm connected to their network server?

    nazurul1235 pointsBadges:
  • My ex-husband is accessing my laptop remotely

    My ex-husband is accessing my laptop remotely to sign into my outlook email account. I know the sign in was not me, but it has the IP address for my laptop as the IP used. I signed out of the account at 6:40pm last night from the laptop and today I see a sign in attempt at 11:17pm using my IP...

    thesabrina65 pointsBadges:
  • Remove virus from USB pen drive

    I just noticed that my USB pen drive was infected by a virus. Now, everything is hidden in it. I had so much information on there. I tried the CMD attrib command but that didn't work. What can I do?

    ITKE978,245 pointsBadges:
  • Can I delete the VC_RED.MSI program?

    I have this program called VC_RED.MSI on my OS Drive. It is an annoyance to me, is it safe to delete this, and another called VC_RED.cab? Thanks for your help.

    Madbiker19605 pointsBadges:
  • Cisco CE500 Switch recovery iOS

    How can I recover the iOS of CE500 switch? It is console less.

    Imtiazali5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following