• Add password to VNC

    This is more of a general understanding instead of a question - A friend of mine told me that VNC is not encrypted. Should I setup a password for it? I've read that it's not worth it. Is it really secure?

    ITKE1,050,855 pointsBadges:
  • How to trace and prove who’s hacked my phone

    My phone was somehow accessed by a woman I met asking me to buy my used generator. She then used info from there to hack into my laptop, which uses a Wi-Fi router to get on line. She then began using my bank card to pay her bills, etc. Last year I finally changed my phone # (she was able to turn...

    ImSoConfused15 pointsBadges:
  • iPhone hacked to read WhatsApp and gallery

    Hi , I received a link on my WhatsApp. On clicking it after a sec it transferred to google play store on safari as I am using iPhone 7 Plus. I am afraid my wife sent me this link as a hacking tool to monitor my phone, my question is: Can it be hacking link or just a normal link for kids educational...

    Ismailkhan855 pointsBadges:
  • Run two antivirus software at the same time

    My father always told me not to have two antivirus software on the same machine (working at the same time). And I just started it to notice it more often because Windows Defender always is disabled when it detects my other free software. Why can't both run at the same time? Is there a real reason...

    ITKE1,050,855 pointsBadges:
  • Endpoint security – Data leakage

    Sir, How do you do data set, data classification, model, methodology, and strategic plan to prevent data leakage.

    shivakumarat5 pointsBadges:
  • Most NGFW vendors offer HTTPS inspection at the gateway – but security experts tell me this is too complicated for most organizations to administer

    And some tell me that HTTPS inspection will soon be rendered obsolete as sites move to TLS 1.3 and/or pinned certificates. What role will HTTPS inspection on NGFW gateways play in the future?

    Joelhammond5 pointsBadges:
  • BitLocker Encryption and FIPS140-2 Compliance

    I am researching how to be FIPS140-2 level 1 compliant using BitLocker encryption on Windows 7 and Windows 10. My question regarding this is such, does BitLocker encryption need to be FDE (which Windows 7 only uses), but with Windows 10 does it require FDE or is used space only allow, and second...

    r3dmang5 pointsBadges:
  • Decrypt UFD2 hash

    Hello, I have recently forgotten my Facebook password and my account settings in Facebook for password reset is to send a link to my yahoo account. That account has been unfortunately deactivated so I tried to get my hash password instead. Could someone help me decrypt it please? I have read that...

    pkchurox715 pointsBadges:
  • Data Quality “Chicken and Egg” problem with Data Security

    Our Data Quality team has access to the data (considering that Data Quality, Data Security and Data Governance are all belong to Data Management team): Security matrix for Data Quality team: One of the Data Quality processes is to ensure the security of the data. At the same time Data Governance...

    natebit455 pointsBadges:
  • How to get password on w395

    How can I get a password on w395 mobile?

    Romel5 pointsBadges:
  • How to disable save as home page?

    How to disable save as homepage from visitor hack our code?

    oneonesip30 pointsBadges:
  • Who is legally liable for information on employee devices?

    If illegal software and images are on a BYOD who is liable. I have been involved in some cases and this involves my background working with police and computer forensics investigations. It is very clear to me that company directors and IT Management and directors have got this very wrong. Look...

    hrmp7775 pointsBadges:
  • Setup secure envelope on file

    Do anyone know how to set secure envelope on a file. The file are is a XML file that we today must upload at the bank's homepage. Nordea (Bank) also require SFTP communication but first the file must be encrypted with their digital certificate and the answer must be decrypted. If we need any third...

    PerTore15 pointsBadges:
  • Trace an IP address

    Someone has hacked me. How can I trace an iPhone address to find out who it is?

    SkinnyMaryD15 pointsBadges:
  • CA and CF keywords

    Whats the exact diff between CA and CF keywords, and how the system handles the difference between them? If possible please explain it with an example.

    Kar425 pointsBadges:
  • Duplex Printing from SAP

    Hello, We are having a printer which supports printing on both the side of paper. From windows we are using this functionality. Now, we would like to use this from SAP also. How to enable this duplex printing from SAP? Thanks in advance.

    Dharmeshd0 pointsBadges:
  • Run antivirus software through command line

    Hi security experts, I have Kaspersky installed on my machine. Now I want to run it through my command line (CMD) and get the results from in the console. Is that possible?

    ITKE1,050,855 pointsBadges:
  • AS/400 Backups

    Hi team, Is it possible to backup AS/400 using Veritas Backup Exec tool?

    Gayathri123625 pointsBadges:
  • AS/400 – time limited user account

    Is it possible to create (or change existing) user account - active in limited time? We have to create accounts for users working for example 2 months

    chypcik30 pointsBadges:
  • Digiboard, Inc on my home network and I didn’t put it on there

    I did a security scan on my home network and found out this digiboard, inc was listed on my network. I have no idea why it is on there, who put it there, and I want it off my network.

    Firecraker5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following