• Decrypt Word (docx) password protected document

    HiĀ  how can I decrypt a Microsoft Word document that is password protected?

    mpexmabuya5 pointsBadges:
  • iPhone 6 Privacy

    Has there been any indication that the iPhone 6 is better at privacy than other iPhone versions? There is speculation because the iPhone 6 is being pushed so hard by the cell phone companies that it could have embedded monitoring or is more secure and that is why the FBI doesn't like it. (Per news...

    milesdoc5 pointsBadges:
  • Can I trust this website?

    I've never seen an email with "name@juumail.com" format. I want to buy something from them but don't know if I can trust this email. Any thoughts?

    Veciii4235 pointsBadges:
  • Uninstallation of Norton WMI update

    Respected recipient, I am currently having a trouble in uninstalling Norton anti-virus VMI update. My company got Norton anti virus software installed on the system from the Norton anti virus software CD and it was not Norton system works, just the Norton anti virus software. After somedays, it...

    Nishant70 pointsBadges:
  • Can anyone track your IP address through game I played?

    Hi, while I was playing clash of clan game, I had verbal fight with some in global chat. Stranger threatened me saying he will hack into the game and track my IP and will come to my place. Is this possible? Can he hack into game server to find my IP? I've deleted my clan because he said he is good...

    gman90115 pointsBadges:
  • Enable Windows 10 encryption

    I already know that Windows 10 doesn't support BitLocker but my friend told me that it does support something called 'device encryption' that provides full disk encryption. But I can't find it / enable it. Anyone know what I should do here? Thanks!

    ITKE440,485 pointsBadges:
  • My Microsoft Word Docx file got damaged due to a virus

    My word Docx file got damaged due to virus infected Docx file, I have crucial important data lost so how to repair corrupted Docx files. If you have any solution for recover and repair my corrupted Docx file, please assist me.

    KimiUzumake5 pointsBadges:
  • How to safely surf on the deep web

    How to safety surf on the deep web? I already got Tor, but I have found hard to navigate there since sites are addressed differently than on regular web. I want to be able to surf there safety and anonymously. I have no intention on doing anything illegal, just curious about it.

    Roberta100195 pointsBadges:
  • Blocking Internet access on Terminal Servers using using GPO’s

    Hi, I'm new. I found this guide http://searchwindowsserver.techtarget.com/tip/0,289483,sid68_gci1099219,00.html (Windows Server Tips: Block Internet Explorer Web surfing via Group Policy) on the site whilst trying to find a way to block internet access for certain users using Terminals Services. I...

    Bettynewb5 pointsBadges:
  • Error message has popped up on my computer stating the shut down may be fatal to my data and operating system

    I got an error message that popped up on my computer stating the shut down may be fatal to my data and operating system. It says to call at 1855 214-3513 - Is this a legit number to call?

    wedunn5 pointsBadges:
  • My smartphone might be corrupted

    Have found out of state locations in different areas of phones files. What is ERI File ID? My phone says this file is unavailable. Google gives different IP address than what's shown on my phone. Tasks won't shut down and unusual processes continue when tasks are killed. Gmail won't download files....

    rethom5 pointsBadges:
  • OS iOS image switch 6500

    When I try to configure switch 6500, it's not working due to trunk encapsulation dot1q.

    abraha5 pointsBadges:
  • Download Norton with only a product key

    How do I download my Norton with only a product key?

    sylwagga1315 pointsBadges:
  • Which attacks can SIEM detect, but another security product can’t?

    I'm trying to prepare a proposal for a project. I must first find some attacks that security products can't detect and after that by SIEM and customer correlation rules detect them, is there anyone that help me?

    1234567890120 pointsBadges:
  • Firewalls and Network Monitoring Tools

    What are the key key features differentiating network monitoring tools and firewalls/UTMS? If an organization runs cyberoam, for example, do they require a network monitoring tool for bandwidth and other security/network management aspects

    cosangori5 pointsBadges:
  • Linux security: Partition a box

    I recently purchased a new laptop and I'm thinking of installing Kali Linux it so I can learn more about network security. Can I partition a Linux box so it's resistant to any security risks? Thanks!

    ITKE440,485 pointsBadges:
  • Which choice is better for a certificate to be used metadata’s for SSO? Frequently changing or one that remains same over long duration?

    In our SAML SSO Setup, currently we are using tomcat certificate in Service Provider metadata for signing and encryption purpose, but since many CAs are providing certificate validity to be very less (30-60 days), It is getting painful to redo the cumbersome SSO Setup on our huge server cluster,...

    schhonker5 pointsBadges:
  • Network documentation/Diagram

    I am curious as to how others are documenting their network; both visually and configurations. I am familiar with MS Visio for drawing the network. Are there better options? What about documenting all equiptment? IP addresses? Settings? Changes? I am just using MS Excel/word to create all sorts of...

    Skepticals0 pointsBadges:
  • Network Connection Freezes

    For some reason, at random, among 20 PCs on my network, in the morning or during the day, the network connection stops responding for both intranet and internet communications. The only solution thus far is to remove the NIC from the Device Manager, reboot the PC, and let Windows XP Pro find the...

    DboiSOBE0 pointsBadges:
  • Make an url attack by SQL injection to display all data in the database

    Can you help me to make an URL attack by SQL injection to display all data in the database? For example by login form to display all registered users in the database. Thank you.

    noor199530 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.