• What can I do to secure my phone?

    I have a message that tells me to check your phone is on trace or not by a no. When I check it, I know that my phone is being traced. What can I do to secure my phone?

  • Can employer see Internet usage on personal phone?

    I plug my iPhone into the USB port to charge during work. I own the phone, work owns the computer. Are they able to view and monitor my activity on my personal phone while charging on the laptop? (Email, Internet, text, etc)?

    Lalalucy15 pointsBadges:
  • Recover Windows 10 password

    I forgot my password to get into my laptop. It's running Windows 10 and I don't have a reset disk. Can you help me?

    tracy695 pointsBadges:
  • How to recover laptop password

    My laptop locked up because I couldn't remember my password so I can't access my laptop. How can I recover it.

    mogrov25 pointsBadges:
  • Outlook not storing passwords for extra accounts

    Microsoft Outlook is not storing passwords for extra accounts. What should I do?

    BiGDee765 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • MS SQL Server 2016 backup encryption

    SQL Server 2016 uses AES-256 symmetric encryption algorithm for backups. However, it uses an asymmetric key in conjunction with AES-256. As we know, asymmetric keys are not designed for large data encryption. Does the system, under the hood, generates a sort of symmetric session key and encrypts...

    radudba20165 pointsBadges:
  • How to hack a Twitter account?

    What programs do I need to hack? Can I hack a Twitter using my phone?

    Mitchiga045 pointsBadges:
  • Solution for picture/ information storage in containers

    I need help finding a solution that enable storage of pictures/ information of certain containers that are shipped from warehouses to customers. Readily accessing those pictures from warehouse facilities is vital. It also has to be able to centrally store these photos so that you do not have to go...

    agj42315325 pointsBadges:
  • How to get into a Facebook account

    My wife has secrets on Facebook. Can I get into her Facebook account?

    ricanhavoc5 pointsBadges:
  • How to remove AVG file

    This dt.dat is in an AVG file and I am trying to remove all AVG Free from my computer and am having a lot of trouble taking it off.

    emberblaze60 pointsBadges:
  • Are there any possible security attacks for App_secret?

    A particular app reveals app_secret but has server side verification, still there is little risk in revealing app_secret. Can anyone let me know the possible attacks that can be done using app_secret and proof of concept?

    someshandro25 pointsBadges:
  • How to open encrypted file

    I have formatted one PC, after re-installing all software system won't allow to open all excel,word files showing "file access denied...encrypted file or read only", though I logged through administrator with all rights. All files was encrypted by earlier user and created certificate, before...

    Pva15 pointsBadges:
  • Can a text message be sent from landline that is out of service

    An old friend said they received a text message from me, which I did not send. When I asked what number it came from, they gave me the number of an old land line that I had disconnected 3 or 4 years ago. I called the number and it is still out of service. I texted the number and received an error...

    trishtgu5 pointsBadges:
  • iOS: Merging PDF files

    For iOS, can I merge several PDF files? I need to join the pages of one PDF to the next PDF and save it to my disk. What's the best process to do that? Thank you.

    ITKE828,350 pointsBadges:
  • IFS Authority for symbolic links

    I have a problem with IFS security, I’m allowing users to create symbolic links to IFS files which they then cannot remove. I try to use CHGAUT on the link after creating it so the user have sufficient authority but this does not work, I am guessing this is because if you create a symbolic link...

    TMcNeil5 pointsBadges:
  • Was my Viber account hacked?

    How is my account hacked? How can I find out?

    Tomprasad20 pointsBadges:
  • Multiple logins in Internet Explorer

    This might be an odd question but it's necessary for me. I have two accounts for a specific website. Would I be able to login with both accounts if I used two different tabs (I'm using Internet Explorer)?

    ITKE828,350 pointsBadges:
  • Benefits of Configuration Management in Change Management

    How does Configuration Management benefit when trying to do Impact Analysis of a change request or request for change?

    hknanda5 pointsBadges:
  • How to stop a person from hacking my phone

    How can I stop a person from hacking my phone?

    Animelover1015 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following