• Phone hacking remotely

    Can a phone be hacked and controlled from a remote location? Like from a laptop? Can you hack it and send and receive text from that phone but not be on it and not actually have it or access to it?

    Bsmith198835 pointsBadges:
  • Cyberbulling detection

    Is cyberbulling detection based on semantic enhancement?

    anuradha10410 pointsBadges:
  • Prevent users from saving PDF file locally

    On my website - obviously users view different information and documents. But on one PDF file - there's a bit of sensitive information on it. Would there be a way for me to prevent these users from saving it locally? Thank you.

    ITKE829,015 pointsBadges:
  • Bypass activation lock on iOS

    Can anyone help me find the link to bypass the activation lock on iOS?

    megnant1235 pointsBadges:
  • Recover Windows 10 password

    I forgot my password to get into my laptop. It's running Windows 10 and I don't have a reset disk. Can you help me?

    tracy695 pointsBadges:
  • What can I do to secure my phone?

    I have a message that tells me to check your phone is on trace or not by a no. When I check it, I know that my phone is being traced. What can I do to secure my phone?

  • Can employer see Internet usage on personal phone?

    I plug my iPhone into the USB port to charge during work. I own the phone, work owns the computer. Are they able to view and monitor my activity on my personal phone while charging on the laptop? (Email, Internet, text, etc)?

    Lalalucy15 pointsBadges:
  • How to recover laptop password

    My laptop locked up because I couldn't remember my password so I can't access my laptop. How can I recover it.

    mogrov25 pointsBadges:
  • Outlook not storing passwords for extra accounts

    Microsoft Outlook is not storing passwords for extra accounts. What should I do?

    BiGDee765 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • MS SQL Server 2016 backup encryption

    SQL Server 2016 uses AES-256 symmetric encryption algorithm for backups. However, it uses an asymmetric key in conjunction with AES-256. As we know, asymmetric keys are not designed for large data encryption. Does the system, under the hood, generates a sort of symmetric session key and encrypts...

    radudba20165 pointsBadges:
  • How to hack a Twitter account?

    What programs do I need to hack? Can I hack a Twitter using my phone?

    Mitchiga045 pointsBadges:
  • Solution for picture/ information storage in containers

    I need help finding a solution that enable storage of pictures/ information of certain containers that are shipped from warehouses to customers. Readily accessing those pictures from warehouse facilities is vital. It also has to be able to centrally store these photos so that you do not have to go...

    agj42315325 pointsBadges:
  • How to get into a Facebook account

    My wife has secrets on Facebook. Can I get into her Facebook account?

    ricanhavoc5 pointsBadges:
  • How to remove AVG file

    This dt.dat is in an AVG file and I am trying to remove all AVG Free from my computer and am having a lot of trouble taking it off.

    emberblaze60 pointsBadges:
  • Are there any possible security attacks for App_secret?

    A particular app reveals app_secret but has server side verification, still there is little risk in revealing app_secret. Can anyone let me know the possible attacks that can be done using app_secret and proof of concept?

    someshandro25 pointsBadges:
  • How to open encrypted file

    I have formatted one PC, after re-installing all software system won't allow to open all excel,word files showing "file access denied...encrypted file or read only", though I logged through administrator with all rights. All files was encrypted by earlier user and created certificate, before...

    Pva15 pointsBadges:
  • Can a text message be sent from landline that is out of service

    An old friend said they received a text message from me, which I did not send. When I asked what number it came from, they gave me the number of an old land line that I had disconnected 3 or 4 years ago. I called the number and it is still out of service. I texted the number and received an error...

    trishtgu5 pointsBadges:
  • iOS: Merging PDF files

    For iOS, can I merge several PDF files? I need to join the pages of one PDF to the next PDF and save it to my disk. What's the best process to do that? Thank you.

    ITKE829,015 pointsBadges:
  • IFS Authority for symbolic links

    I have a problem with IFS security, I’m allowing users to create symbolic links to IFS files which they then cannot remove. I try to use CHGAUT on the link after creating it so the user have sufficient authority but this does not work, I am guessing this is because if you create a symbolic link...

    TMcNeil5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following