• Can a text message be sent from landline that is out of service

    An old friend said they received a text message from me, which I did not send. When I asked what number it came from, they gave me the number of an old land line that I had disconnected 3 or 4 years ago. I called the number and it is still out of service. I texted the number and received an error...

    trishtgu5 pointsBadges:
  • iOS: Merging PDF files

    For iOS, can I merge several PDF files? I need to join the pages of one PDF to the next PDF and save it to my disk. What's the best process to do that? Thank you.

    ITKE827,900 pointsBadges:
  • How to open encrypted file

    I have formatted one PC, after re-installing all software system won't allow to open all excel,word files showing "file access denied...encrypted file or read only", though I logged through administrator with all rights. All files was encrypted by earlier user and created certificate, before...

    Pva15 pointsBadges:
  • IFS Authority for symbolic links

    I have a problem with IFS security, I’m allowing users to create symbolic links to IFS files which they then cannot remove. I try to use CHGAUT on the link after creating it so the user have sufficient authority but this does not work, I am guessing this is because if you create a symbolic link...

    TMcNeil5 pointsBadges:
  • Was my Viber account hacked?

    How is my account hacked? How can I find out?

    Tomprasad20 pointsBadges:
  • Multiple logins in Internet Explorer

    This might be an odd question but it's necessary for me. I have two accounts for a specific website. Would I be able to login with both accounts if I used two different tabs (I'm using Internet Explorer)?

    ITKE827,900 pointsBadges:
  • How to remove AVG file

    This dt.dat is in an AVG file and I am trying to remove all AVG Free from my computer and am having a lot of trouble taking it off.

    emberblaze60 pointsBadges:
  • Solution for picture/ information storage in containers

    I need help finding a solution that enable storage of pictures/ information of certain containers that are shipped from warehouses to customers. Readily accessing those pictures from warehouse facilities is vital. It also has to be able to centrally store these photos so that you do not have to go...

    agj42315325 pointsBadges:
  • Benefits of Configuration Management in Change Management

    How does Configuration Management benefit when trying to do Impact Analysis of a change request or request for change?

    hknanda5 pointsBadges:
  • How to stop a person from hacking my phone

    How can I stop a person from hacking my phone?

    Animelover1015 pointsBadges:
  • How to trace and prove who’s hacked my phone

    My phone was somehow accessed by a woman I met asking me to buy my used generator. She then used info from there to hack into my laptop, which uses a Wi-Fi router to get on line. She then began using my bank card to pay her bills, etc. Last year I finally changed my phone # (she was able to turn...

    ImSoConfused15 pointsBadges:
  • What is Port 443? Why do SSL VPNs make use of it?

    I am setting up a Web SSL VPN for remote access across my WAN. Can someone explain why SSL VPNs use Port 443? Can I use any other port?

    SearchEnterpriseWAN1,535 pointsBadges:
  • Has my phone been hacked?

    Okay. I am not what you would call a "techy" at all. In all reality I am actually not that phone smart. I know the basics pretty much with just a very few secrets here & there but honestly not much! I have recently had all kinds of problems with my phone, it's an iPhone 6 Plus. I have suspected...

    SuspectedHackVictim10 pointsBadges:
  • Does my husband have a virus on his phone?

    Okay so I have a question, I recently started looking at my husband's phone and I went to his google search and there is a bunch of adult sites in the search. He also has adult sites saved in his phone memo. He said its a virus and his phone got hacked and why I'm concerned is because we have a lot...

    Alicia987915 pointsBadges:
  • Is it possible to ‘decode’ a sensored image?

    I recently covered a picture of mine with a really heavy digital stickers with an app called 'LINE photo' and a guy said that he could remove the stickers if he wanted to. Which I said it'd be impossible, but he said he can do it with some kind of program. Do any of you guys know what kind of...

    clara1212125 pointsBadges:
  • Is there an easy to use tool for me to check the security of my router?

    I checked the logs on my home router and found port attack form Russia, China, Spain, Brazil etc on my home router. Is there an easy to use tool for me to check the security of my router to ward off these attacks, or is there a way I can make my IP 'invisible' so the perpetrators of these attacks...

    ColinEssex5 pointsBadges:
  • Authentication and Identity Management

    Does a web services portal need a federated login, if the data accessible as at most Business Only?

    wsimpson5 pointsBadges:
  • Internet Explorer vs. Firefox

    Hello, I'm the Assistant Editor on SearchWindowsSecurity.com. I'm looking to start a discussion about what browser people are using and why. Also, is anyone considering switching from IE to Firefox, or are your plans to stay with IE? Here's some food for thought... As of Feb. 2005, an estimated 35...

    LMullen0 pointsBadges:
  • Are there any possible security attacks for App_secret?

    A particular app reveals app_secret but has server side verification, still there is little risk in revealing app_secret. Can anyone let me know the possible attacks that can be done using app_secret and proof of concept?

    someshandro25 pointsBadges:
  • Can employer see Internet usage on personal phone?

    I plug my iPhone into the USB port to charge during work. I own the phone, work owns the computer. Are they able to view and monitor my activity on my personal phone while charging on the laptop? (Email, Internet, text, etc)?

    Lalalucy15 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following