• Fingerprint recognition in mobile devices

    I have certain specific questions with fingerprint scanning as I look at it from a information security perspective. How does mobile fingerprint recognition actually work? Additionally, is there any specific method all manufacturers follow? What is the best way to make fingerprint recognition very...

    SNKulkarni25 pointsBadges:
  • Cisco CE500 Switch recovery iOS

    How can I recover the iOS of CE500 switch? It is console less.

    Imtiazali5 pointsBadges:
  • Should I go for CCNA security or CCSP?

    I have passed in CCNA R&S Exam. Next can you please advise which path to go to. Should I go for CCNA Security or CCSP? Please advise.

    akashmillan5 pointsBadges:
  • How do I DDoS a phone’s hotspot?

    How do I knock offline a phones hotspot? I got the software to do hit people offline but how do I do it to phones?

    josephmc5 pointsBadges:
  • Tracing person who put spyware on phone

    Hi, is it possible to trace the person who put spyware on your phone? Thank you.

    RRecali875 pointsBadges:
  • How to trace and prove who’s hacked my phone

    My phone was somehow accessed by a woman I met asking me to buy my used generator. She then used info from there to hack into my laptop, which uses a Wi-Fi router to get on line. She then began using my bank card to pay her bills, etc. Last year I finally changed my phone # (she was able to turn...

    ImSoConfused15 pointsBadges:
  • Track down scammers’ location

    How can I track down a scammers' exact location? I have his phone number but why cant he be tracked down? I thought police were able to trace phone numbers?

    ChrisVaughn5 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Two Factor Authentication and the different methods

    Its clear that 2FA will add security however with a variety of instances where 2FA has been compromised (think OTP by Text or other Token based Authentication). What is the view on using harder or more robust and hardware secured 2FA like PKI?

    RoryG1045 pointsBadges:
  • Cell hacked accessed remotely screen says FTM?

    My cell was hacked and accessed remotely since 7-21-16. Looking for solutions and help. Thanks!

    JimQuigley10 pointsBadges:
  • Can malware/spyware manipulate the time stamp on previously searched history?

    Hi I am having a problem with malware on my laptop. Is it possible that malware can change the date of previously researched history? Recently, I have seen websites that I visited last year pop in my history with a different time stamp. I also formatted my HDD a few months ago, is it possible that...

    Barend85 pointsBadges:
  • How to change ITKE password

    How do I change my password on this website? Could not find link to my profile

    gsalako5 pointsBadges:
  • Why do we have 10 keys for 128 bits in AES?

    I'm working on the project, making the information secure with the help of AES. I need to know a few details before I proceed into this project. Please provide me an easy to understand answer.

    twinki172435 pointsBadges:
  • PHP function to create super admins

    What is the way or specific function for denying access to a set of members on an organization software? I mean just to have a super admin who can add or delete other system users. Thanks!

    asma01techtarget5 pointsBadges:
  • How image encryption can be effectively done using symmetric as well as asymmetric?

    Can an image be encrypted using the combination of both the symmetric and asymmetric?

    divija15 pointsBadges:
  • Hacking email box

    Is possible hacking an email box like hotmail?

    Cesarbeltrambini5 pointsBadges:
  • Which firewall vendor to choose?

    My company is about to purchase a new firewall. We need to choice among H3C, Juniper (SSG) and Huawei products. We had an SSG and it worked pretty well, but now we are looking for new solutions.

    yiselmr5 pointsBadges:
  • Does EU privacy Directive 95/46 protect data of US citizens located on a server in Europe?

    Does EU privacy Directive 95/46 protect data of US citizens located on a server in Europe?

    mikegg5 pointsBadges:
  • MS SQL Server 2016 backup encryption

    SQL Server 2016 uses AES-256 symmetric encryption algorithm for backups. However, it uses an asymmetric key in conjunction with AES-256. As we know, asymmetric keys are not designed for large data encryption. Does the system, under the hood, generates a sort of symmetric session key and encrypts...

    radudba20165 pointsBadges:
  • How to recover lost password of windows 7

    I can't remember the right password of my computer. I need to access it now. What is the fastest way to recover or reset the password?Edit: It is a login password not BIOS password. Dell XPS 13.

    Vepuriz5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following