• Don’t know admin password for BOS e-Twin@x Controller

    I do not know admin password, how do I change back to default?

    JeffrLS20 pointsBadges:
  • Why is malware with keyloggers less effective than two-factor hardware tokens?

    Why malware with keyloggers are less effective on two-factor hardware tokens because of the additional protections from the hardware design? Can you explain more how HW design like CAC or Smart card or Alt-token in this case? Regards, Dzung Nguyen

    nrp02347475 pointsBadges:
  • How to remove free AVG 2014 from computer

    I have tried to remove free AVG 2014 from Programs and features. It will NOT remove, what now? I am on a Windows Vista operating system.

    Noriega5 pointsBadges:
  • Tracing person who put spyware on phone

    Hi, is it possible to trace the person who put spyware on your phone? Thank you.

    RRecali875 pointsBadges:
  • Command to open a local backdoor

    What's the command that needs to be entered to open a local backdoor (server mode) which listens on Port 2380 for incoming connections

    hemant785 pointsBadges:
  • How to decrypt PGP in CentOS

    I want to decrypt PGP in CentOS. How can I do that?

    AnkitJiniwal5 pointsBadges:
  • Resetting Password

    How do I reset my password?

    ljchambers525 pointsBadges:
  • My Dell Inspiron 1525 says HDD protected by password

    How do I access it, or find out what the password is?

    Rony0695 pointsBadges:
  • PGP development for AS/400 data encryption

    Has there been any recent PGP development for AS/400 data encryption?

    RichK1151130 pointsBadges:
  • Outlook security alert: A Program is trying to access e-mail addresses you have stored in Outlook

    In Outlook, I have a requirement of reading subject, sender address and message body (of the new message) in my inbox from a C# program. But I keep getting this security alert: A Program is trying to access e-mail addresses you have stored in Outlook. Do you want to allow this? I found some...

    ITKE354,225 pointsBadges:
  • Open IT Forum: What are your views on social networking platforms in your network?

    I chatted with David Sacks, CEO of Yammer, last week at Enterprise 2.0, and we talked about IT's changing attitude toward cloud-based offerings such as social networking platforms. I'd love to hear from practicing IT professionals about the impact of these platforms on the network, whether it's...

    MelanieYarbrough6,345 pointsBadges:
  • Does a password level change affect service accounts?

    I'm changing to password level change from 0 to 2. Does this affect service accounts?

    DCORDERO4720 pointsBadges:
  • Why a virtualized environment is safer?

    In the master's thesis I'm doing, I propose a security model based on virtualization. I have read about virtualization and I've found that a virtualized environment has also suffered many attacks. So I question whether a virtualized environment is safer than a virtualized environment without.

    rosamaria665 pointsBadges:
  • Move files from old to new hard drive

    Got the cryptowall 3.0, took my dell laptop in, no restore points, had to get a new hard drive, have files and pictures on my old hard drive. Surely by now we have developed a method or technology to recover these files?

    j54xm6320 pointsBadges:
  • How can I know if I’ve been hacked?

    Someone I've had an argument with on Twitter threatened to hack my PC and divulge sensitive information. Reliable sources tell me this person is an expert hacker, who has done this before. How can I know if I'm being hacked and how can I protect myself better? I've got basic Avast running on my...

    Roderickz5 pointsBadges:
  • What are vulnerabilities to municipalities offering free Wi-Fi?

    A municipality is considering offering free Wi-Fi in public areas with no security. What are the risks?

    jimherbert375 pointsBadges:
  • What are some of the risks of not securing a DMZ?

    A user has been included in an Organizations DMZ. What are the risks of this and how can damage be prevented?

    MwilaKangwa5 pointsBadges:
  • Methodology to test the applications in the cloud

    As quoted "SaaS vendors may choose to deploy the solution either by using a public cloud vendor or host it themselves. " If the vendor chooses to host it themselves, how to test the security? What methodology will be followed?

    MohdAqeelasif5 pointsBadges:
  • How many ethernet switches do you have?

    Download your exclusive copy of the expert guide, "Ethernet Switches," to find out what real IT pros think of today's top Ethernet solutions. To get your copy, complete this brief survey from TechTarget.

    Michael Tidmarsh35,320 pointsBadges:
  • Tape encryption for IBM iSeries server

    I need tape encryption solution for IBM iSeries 720 server. Do you guys know any solution other than BRMS?

    ashrafpantho40 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following