• Operating system security devices

    What are operating system security devices/tools?

    yungmzuka885 pointsBadges:
  • How can I get into or gain access to a game server?

    I am trying to hack a server which is my friends. It's a game server. How would I get into the server? Can you guys please help me?

    hd6012520 pointsBadges:
  • Hacking through VPN

    My phone is picking up other people's microphones. Only when I call one number. It only does it while dialing out to a certain number. There is soft clicking on the line when it does ring out. I have checked almost everything on my phone and came to VPN. I have never used it and haven't even heard...

    Paigepaige5 pointsBadges:
  • How to block a hacker

    My ex boss once showed me how he hacks ex colleagues accounts. He showed me a software he used which could hack anyone's emails. Subsequently I informed him how disgusting this behavior was and soon left the company as more unusual characteristics were revealed. Please can someone tell me how I...

    ITclueless35 pointsBadges:
  • Security for the Internet of Things

    If I want to put security on Internet of Things, then which type of security should I choose?

    slathhiya45 pointsBadges:
  • Prevent myself from identity theft

    How does one prevent themselves from becoming a victim of identity theft?

    DexterNyamutumbu5 pointsBadges:
  • Email account hacked

    Someone received an abusive email from my account. Could my account be hacked? Is it possible that the hacker may have sent it from my computer using my IP address?

    VJHa255 pointsBadges:
  • Breach of HIPAA

    I had an auto accident, I was the victim. Went to a chiropractor; he encouraged me to sue for large settlement. I went to four 30 minute visits. He essentially charged me $800.00 an hr. Once I found out that he was charging me so much, I got scared and quit going afraid the insurance co would...

    MichelleWeiss5 pointsBadges:
  • How to tell if webpage components are lazy loaded?

    Out of 100 dependent components, how do I know if first 10 components are for the view port (fold) and rest 90 are lazy loaded. Is there a way to see in the Firefox- > firebug that what all resources have been loaded lazily?

    Alokgupta8425 pointsBadges:
  • What is TDoS?

    What is object of telephony denial of service attacks? Please!

    levytran5 pointsBadges:
  • How to use a MySQL password on the command line

    I have a PHP command line that I use to version our database. Whenever development adds a new database patch, that's run this script runs. Here's the script: system('mysql --user=xxx --password=xxx < patch.sql'); But now development is saying we're getting this error message: Warning: Using a...

    ITKE376,060 pointsBadges:
  • Automating SSH login with a password

    Is there a way to automate a SSH login with password? We're working on our test virtual machine so we don't need that much security (that's why we chose SSH). Thanks!

    ITKE376,060 pointsBadges:
  • Program written to block my user name from web in Windows 7

    How to hack into the program and make a small change, such as the spelling of my name?

    frostywade6915 pointsBadges:
  • How can we enable TLS connection on V5R4 iSeries LPAR?

    Hello, How can we enable TLS connection on V5R4 i series LPAR? I can able to see the details to Disable SSLv3 from SST, but how can we enable TLS on the same system which is running on V5R4? R540 – MF59387 R545 – MF59378 To change the System SSL settings with the Start System Service Tools...

    rajesh191055 pointsBadges:
  • How does the SSL decryption affects the PCI DSS compliance when data gets decrypted?

    I would tend to think that decrypted transactions are against PCI DSS - am I wrong on this? What would be good example of correct use of SSL decryption system which would not violate the PCI DSS requirements? Thanks for answers!

    krejpsky5 pointsBadges:
  • Netserver expert anyone?

    I'm trying to access windows folders on a server and I get this error: 'Error exchanging security information... Error Class:1, Code: 5 = Access denied. My passwords do match and I previously accesses these folders. The problem started when I changed my password.

    yaazhisai260 pointsBadges:
  • Call centers and ISO 9000 certification

    Are there case studies available about the benefit of ISO 9000 certification in call centers?

    skraybill5 pointsBadges:
  • Small network patching for SMBs

    I am looking for a Patching tool for small home based, and small business based networks with no servers. I used Retina, BigFix, SCCM and others in my last job, but I am doing some consulting for a small startup, and need a small scale solution. Would be optimal if I could access remotely, so as to...

    SgtGus135 pointsBadges:
  • Should I run antivirus software on our Linux DNS servers?

    We were recently audited and now we need to install new antivirus software for our DNS servers that are running Linux. The actually servers weren't compromised but it was a recommendation. Should we go through with this? If so, what antivirus should we use?

    ITKE376,060 pointsBadges:
  • Is there any possibility to combine any two of the encryption algorithms?

    Can we combine two algorithms to make the encryption works much better?

    MANPREET9115 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.