• Can I use private SSL for sub domain?

    Hello, I will be pleased if someone cloud tell me, can I use private SSL for sub domain? Thank you!

    harrythomas265 pointsBadges:
  • how can I remove Anti spoofing feature in the check point

    I need to remove the anti spoofing feature from my checkpoint /....what to do for it

    Ritesh2r5 pointsBadges:
  • What the main differences between site-to-site VPN and remote-access VPN?

    What are the main differences between site-to-site VPN and remote access VPN? In respect of requirements, how can it be implemented and which one is better?

    1380885 pointsBadges:
  • Wi-Fi connection without a computer

    How do I do this? Can I get a Wi-Fi connection without a computer?

    welto895 pointsBadges:
  • How to remove Firefox address bar

    I'm trying to remove the address bar in Firefox (so that I can have a larger main window). But recently, I did an update and now it won't allow me too. Is there an add-on that I could help? Can I do it using CSS? Thanks!

    ITKE1,060,060 pointsBadges:
  • JavaScript will not run on previous Firefox page

    Whenever I try to go back to a previous page in Firefox, the scripts won't run again for some reason. When I'm viewing that page for a second/third time, is there a resolution for having the scripts run again?

    ITKE1,060,060 pointsBadges:
  • Apache SSLCipherSuite continues to fail in PCI compliance scan

    We have a Fedora server that's running on Apache to pass a PCI DSS compliance scan by McAfee. Here's what we used for the default SSLCipherSuite and SSLProtocol. SSLProtocol ALL -SSLv2 SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP So it failed because of weak ciphers. We changed it...

    ITKE1,060,060 pointsBadges:
  • Why does the cloud still use AES or Blowfish encryption techniques?

    If homomorphic encryption is too good, why does the cloud still use AES or Blowfish encryption techniques?

    Ishu1235 pointsBadges:
  • Email spoof by attacker to spam others

    An attacker is using my email address to spam others mailbox. I keep receiving those email receiver unreachable. Some of the receiver email servers have blocked my email domain. May I know what is the countermeasure for this? DKMI, DMARC, SPF Check? How can I configure it?

    chiahong10025 pointsBadges:
  • Sandboxing and Baselining software

    I'm looking to baseline software (ie see what processes are started when installing/running certain software). I am doing it in my free time, and am looking for free/cheap end software to help with baselining. I've seen things like Timefreeze, but i am unsure to it's reliability in baselining....

    biers045 pointsBadges:
  • Can hackers change the location of my sign in to allow them to access iCloud from my stolen phone?

    My phone was stolen in Barcelona. It is in lost mode and the stolen phone sometimes appears on find my iPhone as 'iPhone has been found'. I then log on to check the location but this time the two factor identification said 'someone is requesting a sign in into your account in Barcelona'. Could the...

    tongeo25 pointsBadges:
  • How to monitor my coworkers

    How do I get a rat to fix up my workers and to have total control of its daily activities?

    director745 pointsBadges:
  • Forgot Firefox master password

    My apologizes about my 'beginner' question but I need help ASAP. I have forgotten my Firefox master password. I changed it a few weeks ago and now I can't do my job. Can anyone help?

    ITKE1,060,060 pointsBadges:
  • Recover password on Lenovo G550 laptop

    How can I recover my password - admin at turn on of computer. This is on a Lenovo G550 laptop.

    BruceMoore10 pointsBadges:
  • How to stop IP address from being hacked?

    I noticed that my IP address was hacked. My Internet connection has become very slow and it looks like he has access to my data. How can I stop this? Even a temporarily solution would help right now.

    ITKE1,060,060 pointsBadges:
  • Managing Orphaned SIDs on AD objects

    We discovered that many distribution groups have had individual permissions assigned using the security tab. Primarily this is because the 'managedBy' field allows only 1 manager to control membership of the group. Unfortunately when a user is removed from AD the SID is left behind on the various...

    Justthefacts15 pointsBadges:
  • Windows 10: Disable root certificate installation

    In Windows 10, how can I disable the installation of root certificates? Is it possible with registry or GPO? I haven't been able to find any way so far. Thank you.

    ITKE1,060,060 pointsBadges:
  • Can a keylogger-infected video be uploaded to Instagram?

    I was infected with a keylogger trojan on a brand new computer. The only thing I had done on that laptop online was download a video from someone's Instagram. Can someone bind a keylogger to a video and upload it to Instagram? If they can and I downloaded it, would I be infected?

    Ratscrapper25 pointsBadges:
  • Neighbor controls my computer

    How can I bump him off once and for all. He knows my passwords but even more he has studied this area of hacking? Can I take him to court and what will the govt do for if anything? Yes, I do have evidence.

    targeted35 pointsBadges:
  • Give iSeries profile access to only one object

    I know there are ways to lock down an object but is there a way to lock down a user profile so that it can access only one object?

    Camgin90 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following