• What can I do to secure my phone?

    I have a message that tells me to check your phone is on trace or not by a no. When I check it, I know that my phone is being traced. What can I do to secure my phone?

  • How to get system password

    We replaced a power supply, air moving device assembly and SPCN board. However, after our Initial Program Load (IPL), the system went into a System Password Bypass menu asking us to enter the System Password that came with the system when we purchased it.

    tarealy5 pointsBadges:
  • How to remove AVG file

    This dt.dat is in an AVG file and I am trying to remove all AVG Free from my computer and am having a lot of trouble taking it off.

    emberblaze60 pointsBadges:
  • Is there anything Suspicious about this entry in the thttpd web server log?

    2002-12-27 00.46.21 cr036r01-2.sac2.fastsearch.net "GET /~hallgren/wget.cgi?before HTTP/1.0" 200 2408

    harsha0095 pointsBadges:
  • Securing PHP script on FTP server

    I have a PHP script and it will be connected to my FTP server. Is there a good way I can secure my script so I can login in multiple times without having to worry? To clarify - this is for the FTP server. I'm worried about a bruteforce attack.

    ITKE1,050,685 pointsBadges:
  • The limits of privacy protection for social media

    Hello, this is Muhannad Battikhi from Jordan. Sometimes the legal procedures need to race the personal and secrecy information of the networks participants to know the cyber crimes doers and that require some cooperation from the social networks companies to know some important and necessary...

    Muhannad5 pointsBadges:
  • Program to stop spam

    I need a spam program that works every well. Can anyone help?

    cogginscl310 pointsBadges:
  • How to recover ACCDB database password recovery

    How do I recover password of ACCDB database in Windows 7?

    sallooz5 pointsBadges:
  • Phone hacking remotely

    Can a phone be hacked and controlled from a remote location? Like from a laptop? Can you hack it and send and receive text from that phone but not be on it and not actually have it or access to it?

    Bsmith198835 pointsBadges:
  • Cyberbulling detection

    Is cyberbulling detection based on semantic enhancement?

    anuradha10410 pointsBadges:
  • Prevent users from saving PDF file locally

    On my website - obviously users view different information and documents. But on one PDF file - there's a bit of sensitive information on it. Would there be a way for me to prevent these users from saving it locally? Thank you.

    ITKE1,050,685 pointsBadges:
  • Bypass activation lock on iOS

    Can anyone help me find the link to bypass the activation lock on iOS?

    megnant1235 pointsBadges:
  • Recover Windows 10 password

    I forgot my password to get into my laptop. It's running Windows 10 and I don't have a reset disk. Can you help me?

    tracy695 pointsBadges:
  • Can employer see Internet usage on personal phone?

    I plug my iPhone into the USB port to charge during work. I own the phone, work owns the computer. Are they able to view and monitor my activity on my personal phone while charging on the laptop? (Email, Internet, text, etc)?

    Lalalucy15 pointsBadges:
  • How to recover laptop password

    My laptop locked up because I couldn't remember my password so I can't access my laptop. How can I recover it.

    mogrov25 pointsBadges:
  • Outlook not storing passwords for extra accounts

    Microsoft Outlook is not storing passwords for extra accounts. What should I do?

    BiGDee765 pointsBadges:
  • layer 2 & layer 3 switch

    Hi All, what is the basic difference between layer 2 & layer 3 switch. how can configure layer 2 & layer3 managable switch

    Psharma11760 pointsBadges:
  • MS SQL Server 2016 backup encryption

    SQL Server 2016 uses AES-256 symmetric encryption algorithm for backups. However, it uses an asymmetric key in conjunction with AES-256. As we know, asymmetric keys are not designed for large data encryption. Does the system, under the hood, generates a sort of symmetric session key and encrypts...

    radudba20165 pointsBadges:
  • Solution for picture/ information storage in containers

    I need help finding a solution that enable storage of pictures/ information of certain containers that are shipped from warehouses to customers. Readily accessing those pictures from warehouse facilities is vital. It also has to be able to centrally store these photos so that you do not have to go...

    agj42315325 pointsBadges:
  • Are there any possible security attacks for App_secret?

    A particular app reveals app_secret but has server side verification, still there is little risk in revealing app_secret. Can anyone let me know the possible attacks that can be done using app_secret and proof of concept?

    someshandro25 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.

Following