• Should I take my hard drive out of my laptop for security reasons?

    I recently bought a brand new laptop with the extended warranty. I have to sent it back through for repair - something got screwed up with the keyboard. Do you think I should remove the hard drive from it first before I send it back? I'm just nervous about all the data I have on it already. Not...

    ITKE1,000,485 pointsBadges:
  • Is this the right BYOD security plan?

    Dears, we have many users with mobile devices (not owned by The Business) need to check the Email, send report via Whatsِapp or other APP and they use direct connection to the internet as you know vulnerabilities with Android. They may be send message infected by malware to person on our local...

    Elyassalman5 pointsBadges:
  • Is it possible to install antivirus in my external hard drive?

    Would it be possible for me to install antivirus on my external hard drive?

    kari7301205105 pointsBadges:
  • Best antivirus program for office environment

    Can I use Quick Heal Internet Security or Quick Heal Total Security in our office? What is a good quality antivirus for a 15 people office environment?

    nik15r45 pointsBadges:
  • What is a client-side attack?

    What is a client-side attack, and what are its potential effects (impact on confidentiality, integrity, and availability)?

    motseko5 pointsBadges:
  • How can I catch the person who hacked my accounts?

    All my accounts were hacked and manipulated by someone who had access to my email username and passwords, my Verizon account (he could actually read all my texts). Also he started a Google voice account and synced my number to to read texts then used the hangout dialer to get transcripts of my...

    acbucciarelli15 pointsBadges:
  • Advantages of 3DES standard

    What are the advantages of the 3DES standard?

    sarankumar5 pointsBadges:
  • Best Firewall UTM for 2017

    What is the best firewall UTM for 2017?

    mahboabalighaleb30 pointsBadges:
  • What does a bad file look like?

    I'm trying to prank my mother by making a fake file that looks as if it has a virus. She's really into computers but I'm not. I wanted to know what a 'bad' file might look like?

    AlexandriaWolf20 pointsBadges:
  • Did someone hack me?

    Hi! About 10 years ago, I had a strange event occur on my PC. While watching an .avi file everything froze, the screen turned black and a scary face appeared while producing a sound that was similar to a hung up vinyl playing. It was not a pop-up or anything to do with a browser. The only thing...

    threepwood5 pointsBadges:
  • Reset startup password without reset disk

    How can I reset my password without the reset disk?

    pebbles89215 pointsBadges:
  • Block IP addresses on Windows Server 2012 R2 firewall

    For the past week, I've had to block many IP addresses because of attempted hacks. But when I'm using the Windows firewall, it's only slowing down the hack (not stopping it). I need them to be completed blocked. I'm using a Windows Server 2012 R2 firewall. Thanks.

    ITKE1,000,485 pointsBadges:
  • What is the difference in the CISSP and the CISA certification?

    What is the difference in the CISSP and the CISA certification?

    SAS70ExPERT125 pointsBadges:
  • Cybersecurity courses for my career

    I am an undergraduate student of computer science from India and I am currently studying Bachelor of Computer Application. For further studies now I want to study cybersecurity. I want to be a cybersecurity expert or specialist. But I don't know from where I start to learn will you please provide...

    karanjoshi5 pointsBadges:
  • How to trace and prove who’s hacked my phone

    My phone was somehow accessed by a woman I met asking me to buy my used generator. She then used info from there to hack into my laptop, which uses a Wi-Fi router to get on line. She then began using my bank card to pay her bills, etc. Last year I finally changed my phone # (she was able to turn...

    ImSoConfused15 pointsBadges:
  • Unified Threat Management or Firewall + Web security software

    I wish to know that, whether deployment of a single UTM box will do a better job then combination of both firewall & web security software in place together?

    System integration5 pointsBadges:
  • Add security to CloudSim

    Hi, Please, I want to know how can I include security, QoS, to cloudsim, I will be really thankful if any one know the codes and where I must but this codes.

    ShamsAlduha885 pointsBadges:
  • Cannot delete ISO files on Windows Server 2012

    In Windows Server 2012, I have multiple ISO files that I don't need anymore. They are located in a folder but I can't delete it. I'm an administrator on the files so I don't know what's going on. I tried using the Command Prompt but I keep getting this message: Access is denied. What can I do here?

    ITKE1,000,485 pointsBadges:
  • How to disable save as home page?

    How to disable save as homepage from visitor hack our code?

    oneonesip30 pointsBadges:
  • Did someone hack my email?

    Recently, I was sent a very eerie email: At first, I thought it was spam, and just for fun I wanted to find out who it was, but when I jokingly tried to log in as the account who sent me the email, I noticed that it was created using my phone number and alternate email. So, via that I actually...

    ITKE1,000,485 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following