• Can corporate data be remotely penetrated through the NAS device?

    How can our corporate data be remotely penetrated through our NAS device?

    mbopha5 pointsBadges:
  • What’s a wildcard SSL certificate?

    What's a wildcard SSL Certificate? Can anyone explain what is the benefits of it?

    KelvinS80 pointsBadges:
  • Digital signature concepts in Java

    how can we perform digital signature concepts in j2me?

    VeeraR10 pointsBadges:
  • Digital or blind signature to avoid side channel attack in cloud computing

    I confused in one point should we choose normal digital signature or blind signature to avoid side channel attack in cloud computing? Can you help me please?

    students201550 pointsBadges:
  • How can I protect my Gmail account?

    My friend recently had his Gmail compromised (someone took viable info from him) so that has me really worried about my account. What should I do to prevent the same thing happening to me? What kind of protection should I use on my account? Thanks!

    ITKE440,705 pointsBadges:
  • Remove Dropbox access from an old computer

    I have several computers and Dropbox is installed on all of them. But as it turns out, I don't have access to one of them anymore so I need to remove access on that computer to my Dropbox account. I already changed the password but it's still installed. I'm a bit worried (from a security...

    ITKE440,705 pointsBadges:
  • Reset password for email

    How can I reset my password for my email?

    bullman15 pointsBadges:
  • Viber voice/video hacking

    Can you hack someone's Viber and record their calls or videos if you have access to their carrier services? let's say someone who might work at AT&T, they give someone else a hand into recording voice calls in my Viber number. Because my viber call disconnects and then show "recording". Please...

    itdontknowhow5 pointsBadges:
  • Gmail: Encrypt emails with GPG

    I'm using Gmail and I need to make my emails encrypted (particularly with GPG). How can I do this? Is there a tool I should use?

    ITKE440,705 pointsBadges:
  • SQL injection attack detection

    How can I find if my site is vulnerable for SQL injection attacks? Can anyone share the tips to prevent it?

    KelvinS80 pointsBadges:
  • How do I encrypt my Gmail?

    I would like to Send a message to other party, but what I am concern about that my message might leak or something like that. So my question is, how do I encrypt my Gmail? Many thanks.

    Ghazwa5 pointsBadges:
  • Implementation single sign-on using Microsoft

    I am supposed to login via web login, desktop, mobile, Proximity Card, Biometrics, IVRS to Web-based Applications / Client Server Applications / Mainframe Applications / .Net Applications / Java Applications / Legacy Applications using single sign-on feature. What are all my prerequisites?

    Swathibala5 pointsBadges:
  • Sanitize user input for a SQL injection using PHP

    What's the best way to sanitize user input for a SQL injection / XSS attack? I need it done with PHP too and it needs to still allow types of HTML tags. Thanks!

    ITKE440,705 pointsBadges:
  • Steps in conducting system audit logs

    Please, I need to ask whose duty is it to check system audit logs between the system auditor & the internal auditor? Secondly, what are the steps in conducting system audit logs?

    Oduguwa25 pointsBadges:
  • How can I get my Facebook password back?

    I could not open a new account on Facebook because the password. I could not open it. How can I get back my password?

    johnjaycob35 pointsBadges:
  • How to secure the host layer in IaaS?

    I would like to know that the security issues of host layer in IaaS. Thanks and Regards, Yex

    Yexlaynaing15 pointsBadges:
  • Crack password in Microsoft Word

    What tools or how to crack password in Microsoft Word?

    clavierz5 pointsBadges:
  • Security in cloud computing

    Even though we have authentication tools for the cloud, why do we have a lack of security in public cloud, private cloud and hybrid cloud?

    saikiranreddy20 pointsBadges:
  • How do I look for malware on my computer?

    I need advice. I know I have malware, or VPN/spyware. I think I got it by a former associate/employee. I have found, on accident, a hidden file. How can I search for these types of files and installations with moderate computer skills. What do I look for?

    TINASHEAVOITA15 pointsBadges:
  • Chrome prints to a PDF, Firefox and Safari say corrupt file

    Hello, A friend of mine can only print to a PDF in Chrome. When he prints to a PDF in Firefox or Safari, Acrobat won't open it, it says it's corrupt. What could be causing this?

    saborsko5 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.