• How do I look for malware on my computer?

    I need advice. I know I have malware, or VPN/spyware. I think I got it by a former associate/employee. I have found, on accident, a hidden file. How can I search for these types of files and installations with moderate computer skills. What do I look for?

    TINASHEAVOITA15 pointsBadges:
  • Password Help

    I have Win 7 Ultimate. Used a 14 character random password. Some trick or tricks I used on it because it is taped to the keyboard. I can not get into the admin. account. I ran ophcrack on it and it stated it was disabled? Ophcrack did not find the password. What can I do?? This is what you get for...

    IlUVLINUX5 pointsBadges:
  • Security in cloud computing

    Even though we have authentication tools for the cloud, why do we have a lack of security in public cloud, private cloud and hybrid cloud?

    saikiranreddy20 pointsBadges:
  • Chrome prints to a PDF, Firefox and Safari say corrupt file

    Hello, A friend of mine can only print to a PDF in Chrome. When he prints to a PDF in Firefox or Safari, Acrobat won't open it, it says it's corrupt. What could be causing this?

    saborsko5 pointsBadges:
  • About acceptable use policy

    What is the reference of an acceptable use policy?

    Leahmae5 pointsBadges:
  • Unlock PC so I don’t have to put my password in

    How would I unlock my PC so I don't have to put my password word each time I sign it?

    janetcorn755 pointsBadges:
  • Use two computers: One for Internet and the other to work offline for safety

    How to I keep my main computer safe from malware by using two computers?

    duanebrown0495 pointsBadges:
  • Equipment needed to start as an ISP

    What is the equipment needed to start as an ISP, both outer and internal?

    kabba175 pointsBadges:
  • Internet security options for online shopping

    What are some strategies a company can use to build and maintain trust in consumers towards internet shopping?

    olufemi15 pointsBadges:
  • Why is it called ISO 14000?

    Can anyone tell me why is it called ISO 14000?

    elangovann5 pointsBadges:
  • Can I turn network routing and switching into a career within the next five years?

    I am a network engineer and I want to proceed with routing and switching but I'm afraid that this career won't be a required Career with the new technology of virtualization and cloud computing. Many thanks in advance. Regards, Yirga Tareke,

    yirgas5 pointsBadges:
  • McAfee Virus Scan Version

    Am running McAfee Agent on Windows Server 2003 and even though my workstations have different RAM capacities the processor's are experience practically the same amount of downtime almost as if McAfee is chewing resources rather than protecting. Help!

    Zhetmasta50 pointsBadges:
  • Which attacks can SIEM detect, but another security product can’t?

    I'm trying to prepare a proposal for a project. I must first find some attacks that security products can't detect and after that by SIEM and customer correlation rules detect them, is there anyone that help me?

    1234567890120 pointsBadges:
  • How to download Avast free antivirus software

    Every time I try to download, I get message "stub cannot download" - I have no idea how to proceed, even though I have purchased Avast's "cleanup" software (which needs the anti virus program to download it!)

    4677405 pointsBadges:
  • My email was hacked – it replies to different email

    I got hacked like 1 year ago and today I get to notice that when I send an email and they try to reply to me it shows a different address the same name but different @. How can I solve this problem? For example, I send an email with this email: unitedstates@yahoo.com Then the people that received...

    aaronmalca20 pointsBadges:
  • Placing a intranet website in the DMZ. Safe?

    I have an old school Cisco network guy. He is claiming best practice for our company intranet website to be placed on the dmz. Is this safe? Knowing the intranet website doesn't need access from the outside in?

    dnddon5 pointsBadges:
  • Email account hacked or was it?

    My parents have an Gmail account that I set up and they had an incident where someone used the email address to deceive their broker to sign over money. They say it was our account that was hacked, but I had no notification of any foul play and the hackers never sent anything else to anyone...plus...

    audreyworm5 pointsBadges:
  • Can work IT guys monitor mobile phone information?

    I use the Wi-Fi at my work to access the internet. I have a login and password through their WatchGuard system and am authorized to use the internet here. My question is, when I access the internet from my phone can the IT guys see what I'm looking at? The concern doesn't lie with me looking at...

    lukelava5 pointsBadges:
  • I need to configure applicationContext-externalAuth-preAuth-mt.xml file to token based authentication

    Here I need to map externel user in the token with internel user in jasper server. How can I do this?

    Prabhath1235 pointsBadges:
  • Data Protection and the internet

    Is it acceptable to upload a newsletter containing personal information about members onto a website without their knowledge?

    susanattheclub5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.