• CA and CF keywords

    Whats the exact diff between CA and CF keywords, and how the system handles the difference between them? If possible please explain it with an example.

    Kar425 pointsBadges:
  • Duplex Printing from SAP

    Hello, We are having a printer which supports printing on both the side of paper. From windows we are using this functionality. Now, we would like to use this from SAP also. How to enable this duplex printing from SAP? Thanks in advance.

    Dharmeshd0 pointsBadges:
  • Trace an IP address

    Someone has hacked me. How can I trace an iPhone address to find out who it is?

    SkinnyMaryD15 pointsBadges:
  • Run antivirus software through command line

    Hi security experts, I have Kaspersky installed on my machine. Now I want to run it through my command line (CMD) and get the results from in the console. Is that possible?

    ITKE1,047,880 pointsBadges:
  • AS/400 Backups

    Hi team, Is it possible to backup AS/400 using Veritas Backup Exec tool?

    Gayathri123540 pointsBadges:
  • AS/400 – time limited user account

    Is it possible to create (or change existing) user account - active in limited time? We have to create accounts for users working for example 2 months

    chypcik30 pointsBadges:
  • Digiboard, Inc on my home network and I didn’t put it on there

    I did a security scan on my home network and found out this digiboard, inc was listed on my network. I have no idea why it is on there, who put it there, and I want it off my network.

    Firecraker5 pointsBadges:
  • Wireless security policy for organization

    What is the wireless security policy for any company?

    MAM19955 pointsBadges:
  • How to trace and prove who’s hacked my phone

    My phone was somehow accessed by a woman I met asking me to buy my used generator. She then used info from there to hack into my laptop, which uses a Wi-Fi router to get on line. She then began using my bank card to pay her bills, etc. Last year I finally changed my phone # (she was able to turn...

    ImSoConfused15 pointsBadges:
  • How to reinstall Wi-Fi service after removing malware

    I found out today that my Android Wi-Fi contains malware (not sure how it go there). If I were to uninstall it, how can I reinstall it? My AVG antivirus found malware but I'm scared to uninstall it because I'm not sure how to reinstall it. Any thoughts?

    ITKE1,047,880 pointsBadges:
  • Antivirus works on which layer of network

    For my antivirus, which layer of me network will it work on?

    Nikskor5 pointsBadges:
  • Certificate not signed by trusted authority

    We have been been communicating with Twitter from our iSeries. Recently Twitter increased their security and now required a digital certificate. We followed all the setup instructions but get this error on the green screen.  gsk_secure_soc_init() failed with rc = 6000 and errno = 0. 8 rc of 6000...

    WoodEngineer7,640 pointsBadges:
  • Security + Certification SYO-501

    I am looking for free videos and training material for Security + Certification SYO-501. Any advice would be appreciated. Thank you.

    thekid035 pointsBadges:
  • Tracking a lost Chromebook

    My friend recently told me that I could track my lost Chromebook through the 'Find your phone' section of my Google account. But I'm not seeing it there. But it is showing other devices. Is this not possible for a Chromebook?

    ITKE1,047,880 pointsBadges:
  • Who is legally liable for information on employee devices?

    If illegal software and images are on a BYOD who is liable. I have been involved in some cases and this involves my background working with police and computer forensics investigations. It is very clear to me that company directors and IT Management and directors have got this very wrong. Look...

    hrmp7775 pointsBadges:
  • Someone hacked into my Chromebook

    So I was just searching my bookmarks on my Chromebook and the I saw 5 bookmarks of pages I have never been to! How can I track the person down by myself?

    MelissaL5 pointsBadges:
  • External drive files deleted by unknown source

    Left my external hard drive at my office and a month after I noticed files were missing. IT forensics tried to recover, but they couldn’t find any trace. I believe someone accessed and deleted the files, but how can they leave no trace of deleted files? Is it also possible to see who actually did...

    Mazcav19785 pointsBadges:
  • Email accessed by opponent in lawsuit

    How can I tell whether someone accessed my gmail from my actual desktop, or remotely? And ex friend who I am involved in a lawsuit with, evidently got into my email account. How can I tell if it was accessed via my desktop, or by hacking? We will probably send my desktop to a forensic examiner for...

    Minnesotaqueen25 pointsBadges:
  • Is it possible to bypass an Internet blackout?

    Please, I would like to know if there is any possibility off bypassing an Internet blackout?

    mbindealen50 pointsBadges:
  • Reliability of a website?

    Can someone tell me if this is a reputable website for accurate information?

    anangelsfaith5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following