• Is PING.EXE a virus?

    I saw in my procceses a procces name ping.exe for 2 seconds. Is it a virus?

    8mmppp5 pointsBadges:
  • What malware remover is out there for me?

    Is there a malware remover for Locky, Cryptowall, and Zepto malware?

    bolanleo35 pointsBadges:
  • Why does my URL change when I click the “Mail” icon in yahoo?

    While using one of my yahoo accounts, I find that when I click on "mail", the url changes; one of my received e-mails, should not have a security code attached to it in the subject line and the nature of the e-mail is "sex-toys", something I would not be interested in.

    Pukiom215 pointsBadges:
  • csrss.exe

    Csrss.exe - I looked at this in my task manager, but I cannot click right and find its properties, everything else is fine and all have 'user name' But not this one. I found several copies in other folders but none in system 32 where it is supposed to be. The ones in the other folders all have...

    fcuku210 pointsBadges:
  • Secure login system for college database

    For my final year project I want to make a secure login system for my college database and lab system. So to implement such things, I want help of experts what can I do. I submitted my topic for Server Security system, but I don't have idea what to do. Please help me

    HarshalShende5 pointsBadges:
  • Why should I use a cloud antivirus for my PC?

    What is the difference between antivirus and cloud antivirus. Why should I use a cloud antivirus for my PC?

    matthewsstacey30 pointsBadges:
  • Cybersecurity courses for my career

    I am an undergraduate student of computer science from India and I am currently studying Bachelor of Computer Application. For further studies now I want to study cybersecurity. I want to be a cybersecurity expert or specialist. But I don't know from where I start to learn will you please provide...

    karanjoshi5 pointsBadges:
  • Free spam program

    Is there a free spam program that works?

    cogginscl310 pointsBadges:
  • Crippleware laws

    Are there laws protecting consumers from manufactures using crippleware to slow or disable there products so you are forced to upgrade or replace a for example a cell phone or car or any device using a computer?

    Tonysgs5 pointsBadges:
  • Business analyst role/job description

    Hi, What is the standard business analyst role/job description according to COBIT? Thanks and regards,

    cellepel5 pointsBadges:
  • Connecting to SQL Server using proxy server

    Can I actually connect to my SQL Server using a proxy server? If it is possible - how can I specify the proxy address and the port in the connection string. Thank you so much.

    ITKE971,060 pointsBadges:
  • How to disable save as home page?

    How to disable save as homepage from visitor hack our code?

    oneonesip30 pointsBadges:
  • Decrypt a password

    I have to decrypt a password. Can someone help me?

    rifrif5 pointsBadges:
  • Error backing up SharePoint 2013 server farm

    How do i get rid of Error "unable to query database meta-data"? I upgraded the application from Symantec Backup Exec 2014 to 2015 and the job completed successfully for 3 months and t\it back.

    thatosots5 pointsBadges:
  • Replicate backup to another site

    Hello Experts, I was wondering if there are best practice in terms of operation, security, management that I should follow when start replicating backup data from primary site to another site (I am using data domain and VERITAS).

    Hwahab5 pointsBadges:
  • Take hacker off my phone

    How do I take a tracker/hacker out/off my phone?

    Steviebrook5 pointsBadges:
  • Is there any software which automatically removes data on mobile device if offline for a certain period?

    How do I delete data from my mobile if lost or has no network connection? I.E if the SIM card is removed or airplane mode? Is there any software which can do the same?

    rana123455 pointsBadges:
  • Connect iOS application to Sybase database using ODBC

    I'm pretty new to mobile development (particular iOS). I need to make our new application connect to a Sybase database. I'm thinking of using ODBC. Does anyone know how to do this? Is there any documentation on this?

    ITKE971,060 pointsBadges:
  • Big data storage security

    What type of algorithm techniques are used for big data storage security in Hadoop?

    ezhilezhil5 pointsBadges:
  • Login to Entone STB using Port 10022 with SFTP

    I'm trying to login to Entone STB using port 10022 with SFTP, don't have a username or password. What should I do?

    hotlawx5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following