• Make SSL faster with Apache 2.4 and Linux CentOS 6

    colleagues!   Well, I am with a huge problem with the speed of SSL Authentication. Since I move my website to SSL, the GoogleBot reduce the indexing of my website, because the SSL Negotiation is with below value I got with WebPageTest.org:   URL:...

    espack5 pointsBadges:
  • How can I prove if I’ve been hacked?

    Hi, I have a Huawei Wi-Fi type HG523E home gateway and I'm suspicious over my national telecom company technician being hacked. I see my MAC address from the label device is different from when I detect with other third party software. Then sometimes, a few days ago, when I type Google.com but the...

    Lither5 pointsBadges:
  • Contingency plannning

    What is a the high-level plan for handling contingencies?

    Shomwele5 pointsBadges:
  • What is a hacker?

    Can someone tell me what is a hacker?

    Qinelinkosi5 pointsBadges:
  • Algorithm for removing the viruses

    Hi, I am looking for the name of algorithm that the antivirus software use it for "Removing" the viruses not for detecting. I just found a lot of algorithms for detecting the viruses, but I really want to know the process after detect a virus. Thanks in advance, Amjad

    AmjadAmer5 pointsBadges:
  • Did my friend hack into my PC?

    So we were 5 guys playing on the computer together one night and I went out for a second when I came back my friend had plugged an USB into my computer but I didn't noticed. By the time pictures and statuses came up on my Facebook and Instagram taken and wrote from his computer. What did that USB...

    Flasharra45 pointsBadges:
  • Administrator password on Dell laptop

    How do you get the administrator password to a dell laptop computer? I put my password in but it keep asking for the administrator password. Can you help me? Thank you.

    zariaa1220 pointsBadges:
  • sFTP to AS/400

    Hi, We are currently FTP'ing a file to an AS/400 system and then use QUOTE command to invoke their program. We are now moving to sFTP and would like to know if there is an alternative for QUOTE command in sFTP to trigger their program. Many thanks!!

    psrini19865 pointsBadges:
  • Change local administrator password

    How can I change the local administrator password?

    Raziel5 pointsBadges:
  • Disable Java security warning

    How to disable Java Security warning so I can play jsolitaire 40 thieves?

    Samm823515 pointsBadges:
  • Stop my cell phone from being spied on

    How can I stop my cell phone from being spied on? Thanks!

    Evarod15 pointsBadges:
  • Skype password doesn’t work

    My Skype password doesn't work. What should I do?

    bushraansari10 pointsBadges:
  • Whatsapp crypt7and8 file decryption of an stolen phone

    I have whatsapp database in my computer and it has crypt7 files in it, I have lost my phone. Can I access that database?

    ujhamre25 pointsBadges:
  • How to unblock SMB protocol manually?

    Internet facilities have blocked in to my system with Sonicwall security via SMB so I need to open. How can I do it?

    rohithrrk5 pointsBadges:
  • The IT Blog Top 10: Oct. 29, 2009

    10. Choosing a block size when creating VMFS datastores Eric Siebert has written a guide on how to choose the right size for VMFS datastores. 9. How to use command line arguments in VBScript via the Wscript.Arguments Object Jerry Lees explains a helpful VBScript trick. 8. Using VRDP to view...

    ITKE364,180 pointsBadges:
  • What are your thoughts on the implementation of a Demilitarized Zone (DMZ) to limit remote access?

    What are your thoughts on the implementation of a DMZ to limit remote access?

    baba91965 pointsBadges:
  • Security for hacked mobile devices

    For the past two years, I've been hacked on my cell phone, laptop and desktop. Can someone help me with more inept security as the person doing this is very intelligent, a tech and my ex.

    lullaby5 pointsBadges:
  • Pin number to mobile phone mistakenly given

    If someone gets your mobile pin number, what all can they do with that information? How far reaching is that?

    lindyindy5 pointsBadges:
  • Finding source of spoofed email

    How can I find the source the used my email in spoofing?

    bgill55025 pointsBadges:
  • Third party service providers requirement 12.8.2 – does it apply to clients?

    If a PCI compliant service provider hosts his technology to third party clients with the third party having only web access to a portal (with viewing cardholder data/debit/credit card permissions), does the client require to be PCI compliant since all storing/coding/encryption is performed by the...

    Dendeni25 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following