• What is this RF file?

    I have some RF files and the title of them are a bunch of numbers and letters is this bad for my computer? Is this a good thing? How would you get rid of them? Is it a virus? Is it going to screw up my computer?

    Dragoxx5 pointsBadges:
  • Single sign on, application risk

    Company uses single sign on, which is kept up to date in terms of the access rights granted to general users. However, access rights to certain key applications is not. IT indicates this is not a risk. Except from a general tidiness perspective, is there a risk that a deactivated AD user's, who has...

    Inachisio15 pointsBadges:
  • Should I go for CompTIA CASP?

    I'm currently studying for my Security Plus and was wondering whether doing the CompTIA CASP is worth it or would you go to CEH or CISSP instead?

    MichaelJames15 pointsBadges:
  • Is SCCM scalable with backup application servers?

    Does SCCM server is scalable with backup application servers for patch management?

    Selvaganesh10 pointsBadges:
  • Did someone hack into my screen?

    While I was watching a video, someone face appeared on my screen. It was dark and only the eyes were visible. It was like when you are on Skype and the other person on the cam having bad lights. This came for a sec and disappeared. Does anyone know what happened?

    somayyamagdyali5 pointsBadges:
  • I forgot my password

    I need a new password. My account name is captainsafarali

    captainsafdarali5 pointsBadges:
  • Implications for restructuring our roles in our organization

    We are a huge organization and we are having security issues within the business, losing customer data, fraud, breaches of security and a general overload of roles within teams. We need to reduce the amount of roles. I'm hoping for some advice on what the possible implications to this could be.

    Simran765 pointsBadges:
  • What is SFTP?

    I want to know about SFTP. Where should I start?

    KanakDwivedi5 pointsBadges:
  • Open IT Forum: Tell us your must-read IT blog or Twitter feed & earn 50 knowledge points!

    We're always looking for great resources to share with the community, so here's your chance to share what's in your own bag of tricks! Share your favorite IT blogs or Twitter personalities, what they write about, or a link to a post that taught you something you'll never forget. Don't have a...

    MelanieYarbrough6,345 pointsBadges:
  • Microsoft IT Scam

    Is there a simple HoneyPot setup that will allow assisting the detection of the "Microsoft IT Support Scam" instigators? These guys call on the phone monthly to thousands of individuals hoping to get someone to open a remote connection so they can drain private data and install spyware/ransomware....

    TexasGeek5 pointsBadges:
  • Is it secure to connect two hosts from different environments (Production/DMZ) to the same storage and what is the BP?

    Can someone tell me if it's secure to connect two hosts from different environments (Production/DMZ) to the same storage and what is the BP?

    AbuMohammed5 pointsBadges:
  • Gmail keeps detecting suspicious activity when I travel

    I travel a ton for my job but every time I go to a different location, Gmail notifies me that there may be suspicious activity. This is when I try to sign in. Is there a way to stop this? It usually doesn't recognize my password so I can't log in. Thank you for your help.

    ITKE440,495 pointsBadges:
  • Security options for compromised Yahoo mail

    I've been using Yahoo mail for quite some time and when I went into my account this week, Yahoo said it strongly believes that it was compromised. I've already reset the password / security questions. As of today, I don't see any spam. What else should I do?

    ITKE440,495 pointsBadges:
  • Fortigate IPmacbinding is not working

    I have a fortigate firewall(v5.2.3,build670) and I created two interfaces in the firewall. One interface is wired, connected to switch and wired client. Another interface is wireless, connected to fortiap(FortiAP-221C v5.2,build0240,150507). I want to enable ipmacbinding in fortigate firewall,...

    aflyfish703295 pointsBadges:
  • Master password for the Software Security device

    I'm getting a popup (looks like Microsoft format) asking for the master password for the Software Security Device. I never saw until about two weeks ago. Are you aware of a virus using this approach?

    rbres75 pointsBadges:
  • Can corporate data be remotely penetrated through the NAS device?

    How can our corporate data be remotely penetrated through our NAS device?

    mbopha5 pointsBadges:
  • What’s a wildcard SSL certificate?

    What's a wildcard SSL Certificate? Can anyone explain what is the benefits of it?

    KelvinS80 pointsBadges:
  • Digital signature concepts in Java

    how can we perform digital signature concepts in j2me?

    VeeraR10 pointsBadges:
  • Digital or blind signature to avoid side channel attack in cloud computing

    I confused in one point should we choose normal digital signature or blind signature to avoid side channel attack in cloud computing? Can you help me please?

    students201550 pointsBadges:
  • How can I protect my Gmail account?

    My friend recently had his Gmail compromised (someone took viable info from him) so that has me really worried about my account. What should I do to prevent the same thing happening to me? What kind of protection should I use on my account? Thanks!

    ITKE440,495 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.